{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T13:31:44Z","timestamp":1762608704234,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T00:00:00Z","timestamp":1650240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Sandia National Laboratories","award":["222442"],"award-info":[{"award-number":["222442"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,18]]},"DOI":"10.1145\/3510547.3517916","type":"proceedings-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T14:13:59Z","timestamp":1651155239000},"page":"3-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Cyber-Physical Experimentation Platform for Resilience Analysis"],"prefix":"10.1145","author":[{"given":"Jamie","family":"Thorpe","sequence":"first","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Raymond","family":"Fasano","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Meghan","family":"Galiardi Sahakian","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amanda","family":"Gonzales","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrew","family":"Hahn","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Joshua","family":"Morris","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Timothy","family":"Ortiz","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hannah","family":"Reinbolt","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eric D.","family":"Vugrin","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,4,28]]},"reference":[{"unstructured":"[n.d.]. Elastic Stack. http:\/\/www.elastic.co\/.  [n.d.]. Elastic Stack. http:\/\/www.elastic.co\/.","key":"e_1_3_2_2_1_1"},{"unstructured":"[n.d.]. Elasticsearch. https:\/\/www.elastic.co\/products\/elasticsearch.  [n.d.]. Elasticsearch. https:\/\/www.elastic.co\/products\/elasticsearch.","key":"e_1_3_2_2_2_1"},{"unstructured":"[n.d.]. Kibana. http:\/\/www.elastic.co\/products\/kibana.  [n.d.]. Kibana. http:\/\/www.elastic.co\/products\/kibana.","key":"e_1_3_2_2_3_1"},{"key":"e_1_3_2_2_6_1","volume-title":"2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601)","volume":"2","author":"Alpcan T.","unstructured":"T. Alpcan and T. Basar . 2004. A game theoretic analysis of intrusion detection in access control systems . In 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601) , Vol. 2 . 1568--1573 Vol.2. T. Alpcan and T. Basar. 2004. A game theoretic analysis of intrusion detection in access control systems. In 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601), Vol. 2. 1568--1573 Vol.2."},{"unstructured":"D. Bodeau R. Graubart W. Heinbockel and E. Laderman. 2015. Cyber Resiliency Engineering Aid --The Updated Cyber Resiliency Engineering Framework and Guidance on Applying Cyber Resiliency Techniques. Technical Report. MITRE Corporation Bedford MA.  D. Bodeau R. Graubart W. Heinbockel and E. Laderman. 2015. Cyber Resiliency Engineering Aid --The Updated Cyber Resiliency Engineering Framework and Guidance on Applying Cyber Resiliency Techniques. Technical Report. MITRE Corporation Bedford MA.","key":"e_1_3_2_2_7_1"},{"unstructured":"D. Bodeau R. Graubart R. McQuaid and J. Woodill. 2018. Cyber Resiliency Metrics and Scorind in Practice-- Use Case Methodlogy and Examples. Technical Report. MITRE Corporation Bedford MA.  D. Bodeau R. Graubart R. McQuaid and J. Woodill. 2018. Cyber Resiliency Metrics and Scorind in Practice-- Use Case Methodlogy and Examples. Technical Report. MITRE Corporation Bedford MA.","key":"e_1_3_2_2_8_1"},{"unstructured":"D. Bodeau R. Graubart R. McQuaid and J. Woodill. 2018. Cyber Resiliency Metrics Catalog. Technical Report. MITRE Corporation Bedford MA.  D. Bodeau R. Graubart R. McQuaid and J. Woodill. 2018. Cyber Resiliency Metrics Catalog. Technical Report. MITRE Corporation Bedford MA.","key":"e_1_3_2_2_9_1"},{"unstructured":"D. Bodeau R. Graubart R. McQuaid and J. Woodill. 2018. Cyber Resiliency Metrics Measures of Effectiveness and Scoring. Technical Report. MITRE Corporation Bedford MA.  D. Bodeau R. Graubart R. McQuaid and J. Woodill. 2018. Cyber Resiliency Metrics Measures of Effectiveness and Scoring. Technical Report. MITRE Corporation Bedford MA.","key":"e_1_3_2_2_10_1"},{"key":"e_1_3_2_2_11_1","volume-title":"Retrieved","author":"MITRE Corporation","year":"2021","unstructured":"MITRE Corporation . 2021. ATT& CK. Retrieved December 8, 2021 from https: \/\/attack.mitre.org\/ MITRE Corporation. 2021. ATT&CK. Retrieved December 8, 2021 from https: \/\/attack.mitre.org\/"},{"key":"e_1_3_2_2_12_1","volume-title":"Retrieved","author":"MITRE Corporation","year":"2021","unstructured":"MITRE Corporation . 2021. CALDERA. Retrieved December 8, 2021 from https:\/\/www.mitre.org\/research\/technology-transfer\/open-sourcesoftware\/caldera%E2%84%A2 MITRE Corporation. 2021. CALDERA. Retrieved December 8, 2021 from https:\/\/www.mitre.org\/research\/technology-transfer\/open-sourcesoftware\/caldera%E2%84%A2"},{"key":"e_1_3_2_2_13_1","volume-title":"Proceedings of the International Conference on Nuclear Security","author":"Silva R. Busquim","year":"2019","unstructured":"R. Busquim e Silva . 2019 . Development of the Asherah Nuclear Power Plant Simulator for Cyber Security Assessment . In Proceedings of the International Conference on Nuclear Security 2020. R. Busquim e Silva. 2019. Development of the Asherah Nuclear Power Plant Simulator for Cyber Security Assessment. In Proceedings of the International Conference on Nuclear Security 2020."},{"volume-title":"ASME International Conference on Nuclear Engineering.","author":"Fasano R.","unstructured":"R. Fasano , C. Lamb , M. El Genk , T. Schreiner , and A. Hahn . 2020. Emulation methodology of programmable logic controllers for cybersecurity applications . In ASME International Conference on Nuclear Engineering. R. Fasano, C. Lamb, M. El Genk, T. Schreiner, and A. Hahn. 2020. Emulation methodology of programmable logic controllers for cybersecurity applications. In ASME International Conference on Nuclear Engineering.","key":"e_1_3_2_2_14_1"},{"volume-title":"Proceedings of the 2020 28th Conference on Nuclear Engineering & Joint With the ASME 2020 Power Conference.","author":"Galiardi M.","unstructured":"M. Galiardi , A. Gonzales , J. Thorpe , E. Vugrin , R. Fasano , and C. Lamb . 2020. Cyber Resilience Analysis of Scada Systems in Nuclear Power Plants . In Proceedings of the 2020 28th Conference on Nuclear Engineering & Joint With the ASME 2020 Power Conference. M. Galiardi, A. Gonzales, J. Thorpe, E. Vugrin, R. Fasano, and C. Lamb. 2020. Cyber Resilience Analysis of Scada Systems in Nuclear Power Plants. In Proceedings of the 2020 28th Conference on Nuclear Engineering & Joint With the ASME 2020 Power Conference.","key":"e_1_3_2_2_16_1"},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the Secure and Resilient Cyber Architectures Conference. McLean, Virginia, 422--431","author":"Goldman H.","year":"2010","unstructured":"H. Goldman . 2010 . Building Secure, Resilient Architectures for Cyber Mission Assurance . In Proceedings of the Secure and Resilient Cyber Architectures Conference. McLean, Virginia, 422--431 . https:\/\/doi.org\/99.9999\/woot07-S422 H. Goldman. 2010. Building Secure, Resilient Architectures for Cyber Mission Assurance. In Proceedings of the Secure and Resilient Cyber Architectures Conference. McLean, Virginia, 422--431. https:\/\/doi.org\/99.9999\/woot07-S422"},{"volume-title":"Proceedings of the 12th Nuclear Plant Instrumentation, Control and Human-Machine Interface Technologies Conference.","author":"Hahn A.","unstructured":"A. Hahn , D. Sandoval , R. Fasano , and C. Lamb . 2021. Automated Cyber Security Testing Platform for Industrial Control Systems . In Proceedings of the 12th Nuclear Plant Instrumentation, Control and Human-Machine Interface Technologies Conference. A. Hahn, D. Sandoval, R. Fasano, and C. Lamb. 2021. Automated Cyber Security Testing Platform for Industrial Control Systems. In Proceedings of the 12th Nuclear Plant Instrumentation, Control and Human-Machine Interface Technologies Conference.","key":"e_1_3_2_2_18_1"},{"key":"e_1_3_2_2_19_1","first-page":"301","article-title":"Cyber-Physical System Resilience. John Wiley and Sons, Ltd","volume":"12","author":"Haque M.","year":"2019","unstructured":"M. Haque , S. Shetty , and B. Krishnappa . 2019 . Cyber-Physical System Resilience. John Wiley and Sons, Ltd , Chapter 12 , 301 -- 337 . M. Haque, S. Shetty, and B. Krishnappa. 2019. Cyber-Physical System Resilience. John Wiley and Sons, Ltd, Chapter 12, 301--337.","journal-title":"Chapter"},{"key":"e_1_3_2_2_20_1","volume-title":"Retrieved","author":"Sandia National Laboratories. 2016. SCEPTRE.","year":"2021","unstructured":"Sandia National Laboratories. 2016. SCEPTRE. Retrieved December 8, 2021 from https:\/\/www.osti.gov\/servlets\/purl\/1376989 Sandia National Laboratories. 2016. SCEPTRE. Retrieved December 8, 2021 from https:\/\/www.osti.gov\/servlets\/purl\/1376989"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_21_1","DOI":"10.1007\/s10669-013-9485-y"},{"key":"e_1_3_2_2_22_1","volume-title":"Retrieved","author":"Paganini Pierluigi","year":"2014","unstructured":"Pierluigi Paganini . 2014 . Malware based attack hit Japanese Monju Nuclear Power Plant . Retrieved December 16, 2021 from https: \/\/securityaffairs.co\/wordpress\/21109\/malware\/malware-based-attack-hitjapanese-monju-nuclear-power-plant.html Pierluigi Paganini. 2014. Malware based attack hit Japanese Monju Nuclear Power Plant. Retrieved December 16, 2021 from https: \/\/securityaffairs.co\/wordpress\/21109\/malware\/malware-based-attack-hitjapanese-monju-nuclear-power-plant.html"},{"key":"e_1_3_2_2_23_1","volume-title":"Retrieved","author":"Pipeline Colonial","year":"2021","unstructured":"Colonial Pipeline . 2021 . Media Statement Update: Colonial Pipeline System Disruption . Retrieved November 18, 2021 from https:\/\/www.colpipe.com\/news\/ press-releases\/media-statement-colonial-pipeline-system-disruption Colonial Pipeline. 2021. Media Statement Update: Colonial Pipeline System Disruption. Retrieved November 18, 2021 from https:\/\/www.colpipe.com\/news\/ press-releases\/media-statement-colonial-pipeline-system-disruption"},{"doi-asserted-by":"crossref","unstructured":"D. Snyder L. Mayer G. Weichenberg D. Tarraf B. Fox M. Hura S. Genc and J. Welburn. 2020. Measuring Cybersecurity and Cyber Resiliency. Technical Report. RAND Corporation Santa Monica CA.  D. Snyder L. Mayer G. Weichenberg D. Tarraf B. Fox M. Hura S. Genc and J. Welburn. 2020. Measuring Cybersecurity and Cyber Resiliency. Technical Report. RAND Corporation Santa Monica CA.","key":"e_1_3_2_2_26_1","DOI":"10.7249\/RR2703"},{"volume-title":"Proceedings of the 7th Symposium on Hot Topics in the Science of Security. ACM.","author":"Vugrin E. D.","unstructured":"E. D. Vugrin , J. Cruz , C. Reedy , T. Tarman , and A. Pinar . 2020. Cyber threat modeling and validation: port scanning and detection . In Proceedings of the 7th Symposium on Hot Topics in the Science of Security. ACM. E. D. Vugrin, J. Cruz, C. Reedy, T. Tarman, and A. Pinar. 2020. Cyber threat modeling and validation: port scanning and detection. In Proceedings of the 7th Symposium on Hot Topics in the Science of Security. ACM.","key":"e_1_3_2_2_27_1"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CODASPY '22","name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","location":"Baltimore MD USA"},"container-title":["Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510547.3517916","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510547.3517916","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510547.3517916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:19Z","timestamp":1750191139000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510547.3517916"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,18]]},"references-count":22,"alternative-id":["10.1145\/3510547.3517916","10.1145\/3510547"],"URL":"https:\/\/doi.org\/10.1145\/3510547.3517916","relation":{},"subject":[],"published":{"date-parts":[[2022,4,18]]},"assertion":[{"value":"2022-04-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}