{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:59:26Z","timestamp":1773154766452,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"DOI":"10.1145\/3411498.3419961","type":"proceedings-article","created":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T03:24:03Z","timestamp":1604460243000},"page":"25-30","source":"Crossref","is-referenced-by-count":10,"title":["A Statistical Analysis Framework for ICS Process Datasets"],"prefix":"10.1145","author":[{"given":"Federico","family":"Turrin","sequence":"first","affiliation":[{"name":"University of Padua, Padua, Italy"}]},{"given":"Alessandro","family":"Erba","sequence":"additional","affiliation":[{"name":"Saarland University, Saarbr\u00fccken, Germany"}]},{"given":"Nils Ole","family":"Tippenhauer","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua, Padua, Italy"}]}],"member":"320","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Kolmogorov-Smirnov test on 2 samples. https:\/\/docs.scipy.org\/doc\/scipy\/ reference\/generated\/scipy.stats.ks_2samp.html Last Accessed on: 2020-07-20.  [n.d.]. Kolmogorov-Smirnov test on 2 samples. https:\/\/docs.scipy.org\/doc\/scipy\/ reference\/generated\/scipy.stats.ks_2samp.html Last Accessed on: 2020-07-20."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196532"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055366.3055375"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23265"},{"key":"e_1_3_2_1_5_1","unstructured":"iTrust SUTD. 2017. WADI datatset. https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/dataset_info\/ Last accessed on: 2020-06-30.  iTrust SUTD. 2017. WADI datatset. https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/dataset_info\/ Last accessed on: 2020-06-30."},{"key":"e_1_3_2_1_6_1","unstructured":"Moshe Kravchik and Asaf Shabtai. 2019. Efficient cyber attacks detection in industrial control systems using lightweight neural networks. arXiv preprint arXiv:1907.01216 (2019).  Moshe Kravchik and Asaf Shabtai. 2019. Efficient cyber attacks detection in industrial control systems using lightweight neural networks. arXiv preprint arXiv:1907.01216 (2019)."},{"key":"e_1_3_2_1_8_1","volume-title":"2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater). 31--36","author":"Mathur A. P."},{"key":"e_1_3_2_1_9_1","volume-title":"Environmental Modelling Software. Environmental Modelling Software","volume":"112","author":"Taormina R.","year":"2019"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000969"},{"key":"e_1_3_2_1_11_1","volume-title":"Nature","volume":"174","author":"Weinberger Sharon","year":"2011"},{"key":"e_1_3_2_1_12_1","unstructured":"Giulio Zizzo Chris Hankin Sergio Maffeis and Kevin Jones. 2019. Intrusion detection for industrial control systems: Evaluation analysis and adversarial attacks. arXiv preprint arXiv:1911.04278 (2019).  Giulio Zizzo Chris Hankin Sergio Maffeis and Kevin Jones. 2019. Intrusion detection for industrial control systems: Evaluation analysis and adversarial attacks. arXiv preprint arXiv:1911.04278 (2019)."}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 Joint Workshop on CPS&amp;IoT Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411498.3419961","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411498.3419961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:41Z","timestamp":1750195901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411498.3419961"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":11,"alternative-id":["10.1145\/3411498.3419961","10.1145\/3411498"],"URL":"https:\/\/doi.org\/10.1145\/3411498.3419961","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]}}}