{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T00:59:38Z","timestamp":1775523578125,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,9]]},"DOI":"10.1145\/3474718.3474719","type":"proceedings-article","created":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T16:42:08Z","timestamp":1631032928000},"page":"36-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed"],"prefix":"10.1145","author":[{"given":"Hyeok-Ki","family":"Shin","sequence":"first","affiliation":[{"name":"The Affiliated Institute of ETRI, Republic of Korea"}]},{"given":"Woomyo","family":"Lee","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Republic of Korea"}]},{"given":"Jeong-Han","family":"Yun","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Republic of Korea"}]},{"given":"Byung-Gil","family":"Min","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2021,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358118"},{"key":"e_1_3_2_1_2_1","volume-title":"Design techniques and applications of cyberphysical systems: A survey","author":"Khaitan Siddhartha\u00a0Kumar","unstructured":"Siddhartha\u00a0Kumar Khaitan and James\u00a0 D McCalley . 2014. Design techniques and applications of cyberphysical systems: A survey . In IEEE Systems Journal . Siddhartha\u00a0Kumar Khaitan and James\u00a0D McCalley. 2014. Design techniques and applications of cyberphysical systems: A survey. In IEEE Systems Journal."},{"key":"e_1_3_2_1_3_1","volume-title":"Implementation of Programmable CPS Testbed for Anomaly Detection. In 12th USENIX Workshop on Cyber Security Experimentation and Test(CSET 19)","author":"Shin Hyeok-Ki","year":"2019","unstructured":"Hyeok-Ki Shin , Woomyo Lee , Jeong-Han Yun , and HyoungChun Kim . 2019 . Implementation of Programmable CPS Testbed for Anomaly Detection. In 12th USENIX Workshop on Cyber Security Experimentation and Test(CSET 19) . Hyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, and HyoungChun Kim. 2019. Implementation of Programmable CPS Testbed for Anomaly Detection. In 12th USENIX Workshop on Cyber Security Experimentation and Test(CSET 19)."},{"key":"e_1_3_2_1_4_1","volume-title":"13th USENIX Workshop on Cyber Security Experimentation and Test(CSET 20)","author":"Shin H.-K.","year":"2020","unstructured":"H.-K. Shin , W. Lee , J.-H. Yun , and H.\u00a0 C. Kim . 2020 . HAI 1.0: HIL-based Augmented ICS Security Dataset . In 13th USENIX Workshop on Cyber Security Experimentation and Test(CSET 20) . H.-K. Shin, W. Lee, J.-H. Yun, and H.\u00a0C. Kim. 2020. HAI 1.0: HIL-based Augmented ICS Security Dataset. In 13th USENIX Workshop on Cyber Security Experimentation and Test(CSET 20)."}],"event":{"name":"CSET '21: Cyber Security Experimentation and Test Workshop","location":"Virtual CA USA","acronym":"CSET '21"},"container-title":["Cyber Security Experimentation and Test Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474718.3474719","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474718.3474719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:46Z","timestamp":1750191106000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474718.3474719"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":4,"alternative-id":["10.1145\/3474718.3474719","10.1145\/3474718"],"URL":"https:\/\/doi.org\/10.1145\/3474718.3474719","relation":{},"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"2021-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}