{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:39Z","timestamp":1750221159419,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3201589","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"829-831","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Seungoh","family":"Choi","sequence":"first","affiliation":[{"name":"The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea"}]},{"given":"Woomyo","family":"Lee","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea"}]},{"given":"Hyeok-Ki","family":"Shin","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea"}]},{"given":"Jeong-Han","family":"Yun","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea"}]},{"given":"Sin-Kyu","family":"Kim","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Khurum Nazir Junejo, and Aditya Mathur","author":"Goh Jonathan","year":"2016","unstructured":"Jonathan Goh , Sridhar Adepu , Khurum Nazir Junejo, and Aditya Mathur . 2016 . A Dataset to Support Research in the Design of Secure Water Treatment Systems The 11th International Conference on Critical Information Infrastructures Security . Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, and Aditya Mathur . 2016. A Dataset to Support Research in the Design of Secure Water Treatment Systems The 11th International Conference on Critical Information Infrastructures Security."},{"volume-title":"Verification of Digital and Hybrid Systems","author":"Henzinger Thomas A","key":"e_1_3_2_1_2_1","unstructured":"Thomas A Henzinger . 2000. The theory of hybrid automata . In Verification of Digital and Hybrid Systems . Springer , 265--292. Thomas A Henzinger . 2000. The theory of hybrid automata. In Verification of Digital and Hybrid Systems. Springer, 265--292."},{"volume-title":"Providing SCADA network data sets for intrusion detection research 9th Workshop on Cyber Security Experimentation and Test (CSET 16)","author":"Lemay Antoine","key":"e_1_3_2_1_3_1","unstructured":"Antoine Lemay and Jos\u00e9 M Fernandez . 2016. Providing SCADA network data sets for intrusion detection research 9th Workshop on Cyber Security Experimentation and Test (CSET 16) . USENIX Association . Antoine Lemay and Jos\u00e9 M Fernandez . 2016. Providing SCADA network data sets for intrusion detection research 9th Workshop on Cyber Security Experimentation and Test (CSET 16). USENIX Association."},{"volume-title":"Industrial Control System Traffic Data Sets for Intrusion Detection Research Critical Infrastructure Protection VIII, bibfieldeditor","author":"Morris Thomas","key":"e_1_3_2_1_4_1","unstructured":"Thomas Morris and Wei Gao . 2014. Industrial Control System Traffic Data Sets for Intrusion Detection Research Critical Infrastructure Protection VIII, bibfieldeditor Jonathan Butts and Sujeet Shenoi (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 65--78. Thomas Morris and Wei Gao . 2014. Industrial Control System Traffic Data Sets for Intrusion Detection Research Critical Infrastructure Protection VIII, bibfieldeditorJonathan Butts and Sujeet Shenoi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 65--78."},{"key":"e_1_3_2_1_5_1","volume-title":"ICS-CERT Year in Review. (2016). deftempurl%https:\/\/ics-cert.us-cert.gov\/Year-Review-2016 Retrieved","author":"NCCIC","year":"2018","unstructured":"NCCIC . 2016. ICS-CERT Year in Review. (2016). deftempurl%https:\/\/ics-cert.us-cert.gov\/Year-Review-2016 Retrieved March 23, 2018 from tempurl NCCIC . 2016. ICS-CERT Year in Review. (2016). deftempurl%https:\/\/ics-cert.us-cert.gov\/Year-Review-2016 Retrieved March 23, 2018 from tempurl"},{"volume-title":"Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure Australasian Conference on Information Security and Privacy","author":"Rodofile Nicholas R","key":"e_1_3_2_1_6_1","unstructured":"Nicholas R Rodofile , Thomas Schmidt , Sebastian T Sherry , Christopher Djamaludin , Kenneth Radke , and Ernest Foo . 2017. Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure Australasian Conference on Information Security and Privacy . Springer , 452--459. Nicholas R Rodofile, Thomas Schmidt, Sebastian T Sherry, Christopher Djamaludin, Kenneth Radke, and Ernest Foo . 2017. Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure Australasian Conference on Information Security and Privacy. Springer, 452--459."}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3201589","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3201589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3201589"}},"subtitle":["CPS Security Testbed Development Using Controller-in-the-Middle"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":6,"alternative-id":["10.1145\/3196494.3201589","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3201589","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}