{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:21:45Z","timestamp":1769916105731,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3264888.3264893","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"24-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["CORGIDS"],"prefix":"10.1145","author":[{"given":"Ekta","family":"Aggarwal","sequence":"first","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Mehdi","family":"Karimibiuki","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Karthik","family":"Pattabiraman","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Andr\u00e9","family":"Ivanov","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_7"},{"key":"e_1_3_2_1_2_1","volume-title":"Julien Gascon-Samson, and Karthik Pattabiraman.","author":"Aliabadi Maryam Raiyat","year":"2017","unstructured":"Maryam Raiyat Aliabadi , Amita Ajith Kamath , Julien Gascon-Samson, and Karthik Pattabiraman. 2017 . ARTINALI : Dynamic Invariant Detection for Cyber-Physical System Security . (2017). Maryam Raiyat Aliabadi, Amita Ajith Kamath, Julien Gascon-Samson, and Karthik Pattabiraman. 2017. ARTINALI: Dynamic Invariant Detection for Cyber-Physical System Security. (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.29"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.38"},{"key":"e_1_3_2_1_5_1","volume-title":"Decision and Information Technologies (CoDIT), 2016 International Conference on. IEEE, 454--459","author":"Bernieri Giuseppe","year":"2016","unstructured":"Giuseppe Bernieri , Fabio Del Moro , Luca Faramondi , and Federica Pascucci . 2016 . A testbed for integrated fault diagnosis and cyber security investigation. In Control , Decision and Information Technologies (CoDIT), 2016 International Conference on. IEEE, 454--459 . Giuseppe Bernieri, Fabio Del Moro, Luca Faramondi, and Federica Pascucci. 2016. A testbed for integrated fault diagnosis and cyber security investigation. In Control, Decision and Information Technologies (CoDIT), 2016 International Conference on. IEEE, 454--459."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025151"},{"key":"e_1_3_2_1_7_1","volume-title":"USENIX Security Symposium","author":"Checkoway Stephen","year":"2011","unstructured":"Stephen Checkoway , Damon McCoy , Brian Kantor , Danny Anderson , Hovav Shacham , Stefan Savage , Karl Koscher , Alexei Czeskis , Franziska Roesner , Tadayoshi Kohno , 2011 . Comprehensive Experimental Analyses of Automotive Attack Surfaces .. In USENIX Security Symposium . San Francisco. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, et almbox. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces.. In USENIX Security Symposium . San Francisco."},{"key":"e_1_3_2_1_8_1","volume-title":"Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System. arXiv preprint arXiv:1801.00903","author":"Chen Yuqi","year":"2018","unstructured":"Yuqi Chen , Christopher M Poskitt , and Jun Sun . 2018. Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System. arXiv preprint arXiv:1801.00903 ( 2018 ). Yuqi Chen, Christopher M Poskitt, and Jun Sun. 2018. Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System. arXiv preprint arXiv:1801.00903 (2018)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.126"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348250.1348254"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368127"},{"key":"e_1_3_2_1_12_1","volume-title":"Hidden markov models. Current opinion in structural biology","author":"Eddy Sean R","year":"1996","unstructured":"Sean R Eddy . 1996. Hidden markov models. Current opinion in structural biology , Vol. 6 , 3 ( 1996 ), 361--365. Sean R Eddy. 1996. Hidden markov models. Current opinion in structural biology , Vol. 6, 3 (1996), 361--365."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2046654"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.015"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:20000826"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453150"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806806"},{"key":"e_1_3_2_1_18_1","volume-title":"On the feasibility of distinguishing between process disturbances and intrusions in process control systems using multivariate statistical process control. arXiv preprint arXiv:1706.01679","author":"Iturbe Mikel","year":"2017","unstructured":"Mikel Iturbe , Jos\u00e9 Camacho , Inaki Garitano , Urko Zurutuza , and Roberto Uribeetxeberria . 2017. On the feasibility of distinguishing between process disturbances and intrusions in process control systems using multivariate statistical process control. arXiv preprint arXiv:1706.01679 ( 2017 ). Mikel Iturbe, Jos\u00e9 Camacho, Inaki Garitano, Urko Zurutuza, and Roberto Uribeetxeberria. 2017. On the feasibility of distinguishing between process disturbances and intrusions in process control systems using multivariate statistical process control. arXiv preprint arXiv:1706.01679 (2017)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459914"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714599"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.237"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.71"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.3.04"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248326.2248334"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2265083"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2312327"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2283171"},{"key":"e_1_3_2_1_28_1","volume-title":"Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014","author":"Pleban Johann-Sebastian","unstructured":"Johann-Sebastian Pleban , Ricardo Band , and Reiner Creutzburg . 2014. Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy . In Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014 , Vol. 9030 . International Society for Optics and Photonics , 90300L. Johann-Sebastian Pleban, Ricardo Band, and Reiner Creutzburg. 2014. Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy. In Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014 , Vol. 9030. International Society for Optics and Photonics, 90300L."},{"key":"e_1_3_2_1_29_1","volume-title":"Black Hat Conference presentation slides","volume":"2011","author":"Radcliffe Jerome","year":"2011","unstructured":"Jerome Radcliffe . 2011 . Hacking medical devices for fun and insulin: Breaking the human SCADA system . In Black Hat Conference presentation slides , Vol. 2011 . Jerome Radcliffe. 2011. Hacking medical devices for fun and insulin: Breaking the human SCADA system. In Black Hat Conference presentation slides, Vol. 2011."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502939"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.12720\/sgce.1.1.22-28"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134325"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840763"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264888.3264893","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264888.3264893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:58Z","timestamp":1750212478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264888.3264893"}},"subtitle":["A Correlation-based Generic Intrusion Detection System"],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":34,"alternative-id":["10.1145\/3264888.3264893","10.1145\/3264888"],"URL":"https:\/\/doi.org\/10.1145\/3264888.3264893","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}