{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T10:49:52Z","timestamp":1769165392532,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":97,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,14]],"date-time":"2022-02-14T00:00:00Z","timestamp":1644796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,14]]},"DOI":"10.1145\/3511616.3513098","type":"proceedings-article","created":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T00:21:13Z","timestamp":1647908473000},"page":"46-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Study Cybersecurity of Cyber Physical System in the Virtual Environment: A Survey and New Direction"],"prefix":"10.1145","author":[{"given":"Lei","family":"Shi","sequence":"first","affiliation":[{"name":"Swinburne University of Technology, Australia"}]},{"given":"Shanti","family":"Krishnan","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Australia"}]},{"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Australia"}]}],"member":"320","published-online":{"date-parts":[[2022,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"CPS security: vehicle platooning system identifying & modelling cyber-attacks. Ph.\u00a0D. Dissertation. Master Thesis","author":"Ali Abdul\u00a0Azim","unstructured":"Abdul\u00a0Azim Ali . 2016. CPS security: vehicle platooning system identifying & modelling cyber-attacks. Ph.\u00a0D. Dissertation. Master Thesis , Newcastle University . Abdul\u00a0Azim Ali. 2016. CPS security: vehicle platooning system identifying & modelling cyber-attacks. Ph.\u00a0D. Dissertation. Master Thesis, Newcastle University."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2013.6761301"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018981.3018988"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.002"},{"key":"e_1_3_2_1_5_1","volume-title":"14th Colloquium for Information System Security Education (CISSE).","author":"Andel R","unstructured":"Todd\u00a0 R Andel , Kyle\u00a0 E Stewart , and Jeffrey\u00a0 W Humphries . 2010. Using virtualization for cyber security education and experimentation . In 14th Colloquium for Information System Security Education (CISSE). Todd\u00a0R Andel, Kyle\u00a0E Stewart, and Jeffrey\u00a0W Humphries. 2010. Using virtualization for cyber security education and experimentation. In 14th Colloquium for Information System Security Education (CISSE)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994493"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808705.2808715"},{"key":"e_1_3_2_1_8_1","volume-title":"Cyber Physical Systems Security: Analysis, Challenges and Solutions. Computers & Security 68 (04","author":"Ashibani Yosef","year":"2017","unstructured":"Yosef Ashibani and Qusay Mahmoud . 2017. Cyber Physical Systems Security: Analysis, Challenges and Solutions. Computers & Security 68 (04 2017 ), 81\u201397. https:\/\/doi.org\/10.1016\/j.cose.2017.04.005 10.1016\/j.cose.2017.04.005 Yosef Ashibani and Qusay Mahmoud. 2017. Cyber Physical Systems Security: Analysis, Challenges and Solutions. Computers & Security 68 (04 2017), 81\u201397. https:\/\/doi.org\/10.1016\/j.cose.2017.04.005"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2015.7286615"},{"key":"e_1_3_2_1_10_1","unstructured":"Luca Attanasio Mauro Conti Denis Donadel and Federico Turrin. 2021. MiniV2G: An Electric Vehicle Charging Emulator.  Luca Attanasio Mauro Conti Denis Donadel and Federico Turrin. 2021. MiniV2G: An Electric Vehicle Charging Emulator."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2018.8402377"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/1548512915593528"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2018.07.148"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2017.15"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"e_1_3_2_1_16_1","volume-title":"First Workshop on Secure Control Systems. 587\u2013592","author":"Chabukswar Rohan","year":"2010","unstructured":"Rohan Chabukswar , Bruno Sinopoli , Gabor Karsai , Annarita Giani , Himanshu Neema , and Andrew Davis . 2010 . Simulation of network attacks on SCADA systems . In First Workshop on Secure Control Systems. 587\u2013592 . Rohan Chabukswar, Bruno Sinopoli, Gabor Karsai, Annarita Giani, Himanshu Neema, and Andrew Davis. 2010. Simulation of network attacks on SCADA systems. In First Workshop on Secure Control Systems. 587\u2013592."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2014.6842244"},{"key":"e_1_3_2_1_18_1","unstructured":"CODESYS. [n. d.]. CODESYS Control. https:\/\/www.codesys.com\/products\/codesys-runtime\/control.html. Accessed: 2021-10-25.  CODESYS. [n. d.]. CODESYS Control. https:\/\/www.codesys.com\/products\/codesys-runtime\/control.html. Accessed: 2021-10-25."},{"key":"e_1_3_2_1_19_1","unstructured":"Digital\u00a0Twin Consortium. [n. d.]. Open-Source Digital Twin Consortiuml. https:\/\/www.digitaltwinconsortium.org\/initiatives\/open-source.htm. Accessed: 2022-1-28.  Digital\u00a0Twin Consortium. [n. d.]. Open-Source Digital Twin Consortiuml. https:\/\/www.digitaltwinconsortium.org\/initiatives\/open-source.htm. Accessed: 2022-1-28."},{"key":"e_1_3_2_1_20_1","unstructured":"L. Coppolino Salvatore D\u2019Antonio Valerio Formicola Vincenzo Giuliano and Giovanni Mazzeo. 2020. ICSrange: A Simulation-based Cyber Range Platform for Industrial Control Systems.  L. Coppolino Salvatore D\u2019Antonio Valerio Formicola Vincenzo Giuliano and Giovanni Mazzeo. 2020. ICSrange: A Simulation-based Cyber Range Platform for Industrial Control Systems."},{"key":"e_1_3_2_1_21_1","unstructured":"Violeta Damjanovic-Behrendt. 2018. A Digital Twin Architecture for Security Privacy and Safety.  Violeta Damjanovic-Behrendt. 2018. A Digital Twin Architecture for Security Privacy and Safety."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IS.2018.8710526"},{"key":"e_1_3_2_1_23_1","unstructured":"Violeta Damjanovic-Behrendt Michaela M\u00fchlberger Cristina de Luca Thomos Christos and Edin Arnautovic. 2018. IoT4CPS\u2013Trustworthy IoT for CPS. (2018).  Violeta Damjanovic-Behrendt Michaela M\u00fchlberger Cristina de Luca Thomos Christos and Edin Arnautovic. 2018. IoT4CPS\u2013Trustworthy IoT for CPS. (2018)."},{"key":"e_1_3_2_1_24_1","volume-title":"Unleashing the Digital Twin\u2019s Potential for ICS Security","author":"Dietz Marietheres","year":"2020","unstructured":"Marietheres Dietz and G\u00fcnther Pernul . 2020. Unleashing the Digital Twin\u2019s Potential for ICS Security . IEEE Security & Privacy( 2020 ). Marietheres Dietz and G\u00fcnther Pernul. 2020. Unleashing the Digital Twin\u2019s Potential for ICS Security. IEEE Security & Privacy(2020)."},{"key":"#cr-split#-e_1_3_2_1_25_1.1","doi-asserted-by":"crossref","unstructured":"Marietheres Dietz Manfred Vielberth and G\u00fcnther Pernul. 2020. Integrating Digital Twin Security Simulations in the Security Operations Center. https:\/\/doi.org\/10.1145\/3407023.3407039 10.1145\/3407023.3407039","DOI":"10.1145\/3407023.3407039"},{"key":"#cr-split#-e_1_3_2_1_25_1.2","doi-asserted-by":"crossref","unstructured":"Marietheres Dietz Manfred Vielberth and G\u00fcnther Pernul. 2020. Integrating Digital Twin Security Simulations in the Security Operations Center. https:\/\/doi.org\/10.1145\/3407023.3407039","DOI":"10.1145\/3407023.3407039"},{"key":"e_1_3_2_1_26_1","first-page":"52","article-title":"Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges.","volume":"9","author":"Eckhart Matthias","year":"2019","unstructured":"Matthias Eckhart , Bernhard Brenner , Andreas Ekelhart , and Edgar\u00a0 R Weippl . 2019 . Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges. J. Internet Serv. Inf. Secur. 9 , 3 (2019), 52 \u2013 73 . Matthias Eckhart, Bernhard Brenner, Andreas Ekelhart, and Edgar\u00a0R Weippl. 2019. Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges.J. Internet Serv. Inf. Secur. 9, 3 (2019), 52\u201373.","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264892"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3198458.3198464"},{"key":"#cr-split#-e_1_3_2_1_29_1.1","doi-asserted-by":"crossref","unstructured":"Matthias Eckhart and Andreas Ekelhart. 2019. Digital Twins for Cyber-Physical Systems Security: State of the Art and Outlook. 383-412. https:\/\/doi.org\/10.1007\/978-3-030-25312-7_14 10.1007\/978-3-030-25312-7_14","DOI":"10.1007\/978-3-030-25312-7_14"},{"key":"#cr-split#-e_1_3_2_1_29_1.2","doi-asserted-by":"crossref","unstructured":"Matthias Eckhart and Andreas Ekelhart. 2019. Digital Twins for Cyber-Physical Systems Security: State of the Art and Outlook. 383-412. https:\/\/doi.org\/10.1007\/978-3-030-25312-7_14","DOI":"10.1007\/978-3-030-25312-7_14"},{"key":"e_1_3_2_1_30_1","volume-title":"Security and Quality in Cyber-Physical Systems Engineering","author":"Eckhart Matthias","unstructured":"Matthias Eckhart and Andreas Ekelhart . 2019. Digital twins for cyber-physical systems security: State of the art and outlook . In Security and Quality in Cyber-Physical Systems Engineering . Springer , 383\u2013412. Matthias Eckhart and Andreas Ekelhart. 2019. Digital twins for cyber-physical systems security: State of the art and outlook. In Security and Quality in Cyber-Physical Systems Engineering. Springer, 383\u2013412."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2017.03.025"},{"key":"e_1_3_2_1_32_1","unstructured":"Pavel Filonov Andrey Lavrentyev and Artem Vorontsov. 2016. Multivariate industrial time series with cyber-attack simulation: Fault detection using an lstm-based predictive data model. arXiv preprint arXiv:1612.06676(2016).  Pavel Filonov Andrey Lavrentyev and Artem Vorontsov. 2016. Multivariate industrial time series with cyber-attack simulation: Fault detection using an lstm-based predictive data model. arXiv preprint arXiv:1612.06676(2016)."},{"key":"e_1_3_2_1_33_1","unstructured":"David Formby Milad Rad and Raheem Beyah. 2018. Lowering the Barriers to Industrial Control System Security with {GRFICS}. In 2018 {USENIX} Workshop on Advances in Security Education ({ASE} 18).  David Formby Milad Rad and Raheem Beyah. 2018. Lowering the Barriers to Industrial Control System Security with {GRFICS}. In 2018 {USENIX} Workshop on Advances in Security Education ({ASE} 18)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2013.111"},{"key":"#cr-split#-e_1_3_2_1_35_1.1","unstructured":"Robert Gillen Laura Anderson Christopher Craig Jordan Johnson Adam Columbia Rachel Anderson Andrew Craig and Stephen Scott. 2020. Design and Implementation of Industrial Control System Testbed for Assessing Cyber-Security Defenses Motivation and Background. https:\/\/doi.org\/10.13140\/RG.2.2.12818.27845 10.13140\/RG.2.2.12818.27845"},{"key":"#cr-split#-e_1_3_2_1_35_1.2","doi-asserted-by":"crossref","unstructured":"Robert Gillen Laura Anderson Christopher Craig Jordan Johnson Adam Columbia Rachel Anderson Andrew Craig and Stephen Scott. 2020. Design and Implementation of Industrial Control System Testbed for Assessing Cyber-Security Defenses Motivation and Background. https:\/\/doi.org\/10.13140\/RG.2.2.12818.27845","DOI":"10.1109\/WoWMoM49955.2020.00064"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2709310"},{"key":"e_1_3_2_1_37_1","volume-title":"10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17).","author":"Green Benjamin","unstructured":"Benjamin Green , Anhtuan Lee , Rob Antrobus , Utz Roedig , David Hutchison , and Awais Rashid . 2017. Pains , gains and PLCs: ten lessons from building an industrial control systems testbed for security research . In 10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17). Benjamin Green, Anhtuan Lee, Rob Antrobus, Utz Roedig, David Hutchison, and Awais Rashid. 2017. Pains, gains and PLCs: ten lessons from building an industrial control systems testbed for security research. In 10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994494"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852690"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3186318"},{"key":"e_1_3_2_1_41_1","volume-title":"Verifying attack graphs through simulation. In 2017 Resilience Week (RWS)","author":"Hill Zachary","unstructured":"Zachary Hill , William\u00a0 M Nichols , Mauricio Papa , John\u00a0 C Hale , and Peter\u00a0 J Hawrylak . 2017. Verifying attack graphs through simulation. In 2017 Resilience Week (RWS) . IEEE , 64\u201367. Zachary Hill, William\u00a0M Nichols, Mauricio Papa, John\u00a0C Hale, and Peter\u00a0J Hawrylak. 2017. Verifying attack graphs through simulation. In 2017 Resilience Week (RWS). IEEE, 64\u201367."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2013.6825196"},{"key":"e_1_3_2_1_44_1","volume-title":"Assessing DER Network Cybersecurity Defences in a Power-Communication Co-Simulation Environment. IET Cyber-Physical Systems: Theory & Applications 5 (03","author":"Johnson Jay","year":"2020","unstructured":"Jay Johnson , Ifeoma Onunkwo , Patricia Codeiro , Brian Wright , Nicholas Jacobs , and Christine Lai . 2020. Assessing DER Network Cybersecurity Defences in a Power-Communication Co-Simulation Environment. IET Cyber-Physical Systems: Theory & Applications 5 (03 2020 ). https:\/\/doi.org\/10.1049\/iet-cps.2019.0084 10.1049\/iet-cps.2019.0084 Jay Johnson, Ifeoma Onunkwo, Patricia Codeiro, Brian Wright, Nicholas Jacobs, and Christine Lai. 2020. Assessing DER Network Cybersecurity Defences in a Power-Communication Co-Simulation Environment. IET Cyber-Physical Systems: Theory & Applications 5 (03 2020). https:\/\/doi.org\/10.1049\/iet-cps.2019.0084"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirpj.2020.02.002"},{"key":"e_1_3_2_1_46_1","volume-title":"EPICTWIN: An Electric Power Digital Twin for Cyber Security Testing, Research and Education.","author":"Kandasamy Nandha\u00a0Kumar","year":"2021","unstructured":"Nandha\u00a0Kumar Kandasamy , Sarad Venugopalan , Tin Wong , and Leu Nicholas . 2021 . EPICTWIN: An Electric Power Digital Twin for Cyber Security Testing, Research and Education. Nandha\u00a0Kumar Kandasamy, Sarad Venugopalan, Tin Wong, and Leu Nicholas. 2021. EPICTWIN: An Electric Power Digital Twin for Cyber Security Testing, Research and Education."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897035.2897041"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2731741"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838298"},{"key":"e_1_3_2_1_50_1","volume-title":"Cy-Through: Toward a Cybersecurity Simulation for Supporting Live, Virtual, and Constructive Interoperability","author":"Lee Donghwan","year":"2021","unstructured":"Donghwan Lee , Donghwa Kim , Myung Ahn , Wonwoo Jang , and Wonjun Lee . 2021. Cy-Through: Toward a Cybersecurity Simulation for Supporting Live, Virtual, and Constructive Interoperability . IEEE Access PP ( 01 2021 ), 1\u20131. https:\/\/doi.org\/10.1109\/ACCESS.2021.3051072 10.1109\/ACCESS.2021.3051072 Donghwan Lee, Donghwa Kim, Myung Ahn, Wonwoo Jang, and Wonjun Lee. 2021. Cy-Through: Toward a Cybersecurity Simulation for Supporting Live, Virtual, and Constructive Interoperability. IEEE Access PP (01 2021), 1\u20131. https:\/\/doi.org\/10.1109\/ACCESS.2021.3051072"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/2735338.2735348"},{"key":"e_1_3_2_1_52_1","volume-title":"INFORMATIK 2019: 50 Jahre Gesellschaft f\u00fcr Informatik\u2013Informatik f\u00fcr Gesellschaft (Workshop-Beitr\u00e4ge). Gesellschaft f\u00fcr Informatik eV.","author":"Lou Xinxin","year":"2019","unstructured":"Xinxin Lou , Yun Guo , Yuan Gao , Karl Waedt , and Mithil Parekh . 2019 . An idea of using Digital Twin to perform the functional safety and cybersecurity analysis . In INFORMATIK 2019: 50 Jahre Gesellschaft f\u00fcr Informatik\u2013Informatik f\u00fcr Gesellschaft (Workshop-Beitr\u00e4ge). Gesellschaft f\u00fcr Informatik eV. Xinxin Lou, Yun Guo, Yuan Gao, Karl Waedt, and Mithil Parekh. 2019. An idea of using Digital Twin to perform the functional safety and cybersecurity analysis. In INFORMATIK 2019: 50 Jahre Gesellschaft f\u00fcr Informatik\u2013Informatik f\u00fcr Gesellschaft (Workshop-Beitr\u00e4ge). Gesellschaft f\u00fcr Informatik eV."},{"key":"e_1_3_2_1_53_1","volume-title":"Simulating cyber-physical systems: Identifying vulnerabilities for design and manufacturing through simulated additive manufacturing environments. Additive Manufacturing 35 (05","author":"Mahan Tobias","year":"2020","unstructured":"Tobias Mahan and Jessica Menold . 2020. Simulating cyber-physical systems: Identifying vulnerabilities for design and manufacturing through simulated additive manufacturing environments. Additive Manufacturing 35 (05 2020 ), 101232. https:\/\/doi.org\/10.1016\/j.addma.2020.101232 10.1016\/j.addma.2020.101232 Tobias Mahan and Jessica Menold. 2020. Simulating cyber-physical systems: Identifying vulnerabilities for design and manufacturing through simulated additive manufacturing environments. Additive Manufacturing 35 (05 2020), 101232. https:\/\/doi.org\/10.1016\/j.addma.2020.101232"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"e_1_3_2_1_56_1","volume-title":"7th annual southeastern cyber security summit","author":"Morris H","year":"2015","unstructured":"Thomas\u00a0 H Morris , Zach Thornton , and Ian Turnipseed . 2015. Industrial control system simulation and data logging for intrusion detection system research . 7th annual southeastern cyber security summit ( 2015 ), 3\u20134. Thomas\u00a0H Morris, Zach Thornton, and Ian Turnipseed. 2015. Industrial control system simulation and data logging for intrusion detection system research. 7th annual southeastern cyber security summit (2015), 3\u20134."},{"key":"#cr-split#-e_1_3_2_1_57_1.1","doi-asserted-by":"crossref","unstructured":"Himanshu Neema Xenofon Koutsoukos Bradley Potteiger CheeYee Tang and Keith Stouffer. 2020. Simulation testbed for railway infrastructure security and resilience evaluation. 1-8. https:\/\/doi.org\/10.1145\/3384217.3385623 10.1145\/3384217.3385623","DOI":"10.1145\/3384217.3385623"},{"key":"#cr-split#-e_1_3_2_1_57_1.2","doi-asserted-by":"crossref","unstructured":"Himanshu Neema Xenofon Koutsoukos Bradley Potteiger CheeYee Tang and Keith Stouffer. 2020. Simulation testbed for railway infrastructure security and resilience evaluation. 1-8. https:\/\/doi.org\/10.1145\/3384217.3385623","DOI":"10.1145\/3384217.3385623"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167173"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3053135"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2367322"},{"key":"e_1_3_2_1_61_1","volume-title":"Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed. In 2017 Resilience Week (RWS)","author":"Potteiger Bradley","unstructured":"Bradley Potteiger , William Emfinger , Himanshu Neema , Xenofon Koutosukos , CheeYee Tang , and Keith Stouffer . 2017. Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed. In 2017 Resilience Week (RWS) . IEEE , 177\u2013183. Bradley Potteiger, William Emfinger, Himanshu Neema, Xenofon Koutosukos, CheeYee Tang, and Keith Stouffer. 2017. Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed. In 2017 Resilience Week (RWS). IEEE, 177\u2013183."},{"key":"#cr-split#-e_1_3_2_1_62_1.1","doi-asserted-by":"crossref","unstructured":"Qais Qassim Norziana Jamil Maslina Daud Norhamadi Ja'affar Wan Kamarulzaman and Mohammed Mahdi. 2021. Compromising the Data Integrity of an Electrical Power Grid SCADA System. 604-626. https:\/\/doi.org\/10.1007\/978-981-33-6835-4_40 10.1007\/978-981-33-6835-4_40","DOI":"10.1007\/978-981-33-6835-4_40"},{"key":"#cr-split#-e_1_3_2_1_62_1.2","doi-asserted-by":"crossref","unstructured":"Qais Qassim Norziana Jamil Maslina Daud Norhamadi Ja'affar Wan Kamarulzaman and Mohammed Mahdi. 2021. Compromising the Data Integrity of an Electrical Power Grid SCADA System. 604-626. https:\/\/doi.org\/10.1007\/978-981-33-6835-4_40","DOI":"10.1007\/978-981-33-6835-4_40"},{"key":"#cr-split#-e_1_3_2_1_63_1.1","doi-asserted-by":"crossref","unstructured":"Gelli Ravikumar Burhan Hyder and Manimaran Govindarasu. 2020. Hardware-in-the-Loop CPS Security Architecture for DER Monitoring and Control Applications. 1-5. https:\/\/doi.org\/10.1109\/TPEC48276.2020.9042578 10.1109\/TPEC48276.2020.9042578","DOI":"10.1109\/TPEC48276.2020.9042578"},{"key":"#cr-split#-e_1_3_2_1_63_1.2","doi-asserted-by":"crossref","unstructured":"Gelli Ravikumar Burhan Hyder and Manimaran Govindarasu. 2020. Hardware-in-the-Loop CPS Security Architecture for DER Monitoring and Control Applications. 1-5. https:\/\/doi.org\/10.1109\/TPEC48276.2020.9042578","DOI":"10.1109\/TPEC48276.2020.9042578"},{"key":"e_1_3_2_1_64_1","volume-title":"Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems. Symmetry 13 (03","author":"Robles Andres","year":"2021","unstructured":"Andres Robles , Naghmeh Moradpoor , James McWhinnie , Gordon Russell , and Jorge Porcel-Bustamante . 2021. Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems. Symmetry 13 (03 2021 ), 519. https:\/\/doi.org\/10.3390\/sym13030519 10.3390\/sym13030519 Andres Robles, Naghmeh Moradpoor, James McWhinnie, Gordon Russell, and Jorge Porcel-Bustamante. 2021. Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems. Symmetry 13 (03 2021), 519. https:\/\/doi.org\/10.3390\/sym13030519"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3000958"},{"key":"e_1_3_2_1_66_1","unstructured":"Abhijeet Sahu Patrick Wlazlo Zeyu Mao Hao Huang Ana Goulart Katherine Davis and Saman Zonouz. 2020. Design and Evaluation of A Cyber-Physical Resilient Power System Testbed.  Abhijeet Sahu Patrick Wlazlo Zeyu Mao Hao Huang Ana Goulart Katherine Davis and Saman Zonouz. 2020. Design and Evaluation of A Cyber-Physical Resilient Power System Testbed."},{"key":"#cr-split#-e_1_3_2_1_67_1.1","doi-asserted-by":"crossref","unstructured":"Luis Salazar Neil Ortiz Xi Qin and Alvaro Cardenas. 2020. Towards a High-Fidelity Network Emulation of IEC 104 SCADA Systems. 3-12. https:\/\/doi.org\/10.1145\/3411498.3419969 10.1145\/3411498.3419969","DOI":"10.1145\/3411498.3419969"},{"key":"#cr-split#-e_1_3_2_1_67_1.2","doi-asserted-by":"crossref","unstructured":"Luis Salazar Neil Ortiz Xi Qin and Alvaro Cardenas. 2020. Towards a High-Fidelity Network Emulation of IEC 104 SCADA Systems. 3-12. https:\/\/doi.org\/10.1145\/3411498.3419969","DOI":"10.1145\/3411498.3419969"},{"key":"e_1_3_2_1_68_1","volume-title":"CYBERSECURITY VULNERABILITY ANALYSIS VIA VIRTUALIZATION.Issues in Information Systems 18, 4","author":"Savaglia Jorge","year":"2017","unstructured":"Jorge Savaglia and Ping Wang . 2017. CYBERSECURITY VULNERABILITY ANALYSIS VIA VIRTUALIZATION.Issues in Information Systems 18, 4 ( 2017 ). Jorge Savaglia and Ping Wang. 2017. CYBERSECURITY VULNERABILITY ANALYSIS VIA VIRTUALIZATION.Issues in Information Systems 18, 4 (2017)."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SysEng.2016.7753162"},{"key":"e_1_3_2_1_70_1","volume-title":"Validation of Complex Control Systems with Heterogeneous Digital Models in Industry 4.0 Framework. Machines 9 (03","author":"Semenkov Kirill","year":"2021","unstructured":"Kirill Semenkov , Vitaly Promyslov , Alexey Poletykin , and Nadir Mengazetdinov . 2021. Validation of Complex Control Systems with Heterogeneous Digital Models in Industry 4.0 Framework. Machines 9 (03 2021 ), 62. https:\/\/doi.org\/10.3390\/machines9030062 10.3390\/machines9030062 Kirill Semenkov, Vitaly Promyslov, Alexey Poletykin, and Nadir Mengazetdinov. 2021. Validation of Complex Control Systems with Heterogeneous Digital Models in Industry 4.0 Framework. Machines 9 (03 2021), 62. https:\/\/doi.org\/10.3390\/machines9030062"},{"key":"e_1_3_2_1_71_1","volume-title":"Comprehensive fault simulation method in active distribution network with the consideration of cyber security. IET Cyber-Physical Systems: Theory & Applications 6 (02","author":"Sheng Wanxing","year":"2021","unstructured":"Wanxing Sheng , Keyan Liu , and Ying Liang . 2021. Comprehensive fault simulation method in active distribution network with the consideration of cyber security. IET Cyber-Physical Systems: Theory & Applications 6 (02 2021 ). https:\/\/doi.org\/10.1049\/cps2.12003 10.1049\/cps2.12003 Wanxing Sheng, Keyan Liu, and Ying Liang. 2021. Comprehensive fault simulation method in active distribution network with the consideration of cyber security. IET Cyber-Physical Systems: Theory & Applications 6 (02 2021). https:\/\/doi.org\/10.1049\/cps2.12003"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37352-8_53"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2287188"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3198458.3198461"},{"key":"e_1_3_2_1_75_1","volume-title":"GridAttackSim: A Cyber Attack Simulation Framework for Smart Grids. Electronics 9 (07","author":"Tan Le","year":"2020","unstructured":"Le Tan , Adnan Anwar , Seng Loke , Razvan Beuran , and Yasuo Tan . 2020. GridAttackSim: A Cyber Attack Simulation Framework for Smart Grids. Electronics 9 (07 2020 ), 21. https:\/\/doi.org\/10.3390\/electronics9081218 10.3390\/electronics9081218 Le Tan, Adnan Anwar, Seng Loke, Razvan Beuran, and Yasuo Tan. 2020. GridAttackSim: A Cyber Attack Simulation Framework for Smart Grids. Electronics 9 (07 2020), 21. https:\/\/doi.org\/10.3390\/electronics9081218"},{"key":"e_1_3_2_1_76_1","volume-title":"Assessment of Cyber Physical System Risks with Domain Specific Modelling and Simulation. SPIIRAS Proceedings 4 (08","author":"Teilans Artis","year":"2018","unstructured":"Artis Teilans , Andrejs Romanovs , Yuri Merkuryev , Pjotrs Dorogovs , Arnis Kleins , and Semyon Potryasaev . 2018 . Assessment of Cyber Physical System Risks with Domain Specific Modelling and Simulation. SPIIRAS Proceedings 4 (08 2018), 115. https:\/\/doi.org\/10.15622\/sp.59.5 10.15622\/sp.59.5 Artis Teilans, Andrejs Romanovs, Yuri Merkuryev, Pjotrs Dorogovs, Arnis Kleins, and Semyon Potryasaev. 2018. Assessment of Cyber Physical System Risks with Domain Specific Modelling and Simulation. SPIIRAS Proceedings 4 (08 2018), 115. https:\/\/doi.org\/10.15622\/sp.59.5"},{"key":"e_1_3_2_1_77_1","volume-title":"Vol.\u00a01","author":"Tharayanil Midhun\u00a0Babu","unstructured":"Midhun\u00a0Babu Tharayanil , Gill Whitney , Mahdi Aiash , and Chafika Benzaid . 2015. Virtualization and cyber security: arming future security practitioners. In 2015 IEEE Trustcom\/BigDataSE\/ISPA , Vol.\u00a01 . IEEE , 1398\u20131402. Midhun\u00a0Babu Tharayanil, Gill Whitney, Mahdi Aiash, and Chafika Benzaid. 2015. Virtualization and cyber security: arming future security practitioners. In 2015 IEEE Trustcom\/BigDataSE\/ISPA, Vol.\u00a01. IEEE, 1398\u20131402."},{"key":"e_1_3_2_1_78_1","first-page":"41","article-title":"CLaaS: Cybersecurity Lab as a Service.J","volume":"5","author":"Tunc Cihan","year":"2015","unstructured":"Cihan Tunc and Salim Hariri . 2015 . CLaaS: Cybersecurity Lab as a Service.J . Internet Serv. Inf. Secur. 5 , 4 (2015), 41 \u2013 59 . Cihan Tunc and Salim Hariri. 2015. CLaaS: Cybersecurity Lab as a Service.J. Internet Serv. Inf. Secur. 5, 4 (2015), 41\u201359.","journal-title":"Internet Serv. Inf. Secur."},{"key":"e_1_3_2_1_79_1","unstructured":"Wago. [n. d.]. WagoPLC. https:\/\/www.wago.com\/au\/automation-technology\/discover-plcs\/pfc200. Accessed: 2021-10-25.  Wago. [n. d.]. WagoPLC. https:\/\/www.wago.com\/au\/automation-technology\/discover-plcs\/pfc200. Accessed: 2021-10-25."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2015.7301644"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA.2010.603"},{"key":"#cr-split#-e_1_3_2_1_82_1.1","doi-asserted-by":"crossref","unstructured":"Aaron Werth and Thomas Morris. 2021. Prototyping PLCs and IoT Devices in an HVAC Virtual Testbed to Study Impacts of Cyberattacks. 612-623. https:\/\/doi.org\/10.1007\/978-981-15-5856-6_62 10.1007\/978-981-15-5856-6_62","DOI":"10.1007\/978-981-15-5856-6_62"},{"key":"#cr-split#-e_1_3_2_1_82_1.2","doi-asserted-by":"crossref","unstructured":"Aaron Werth and Thomas Morris. 2021. Prototyping PLCs and IoT Devices in an HVAC Virtual Testbed to Study Impacts of Cyberattacks. 612-623. https:\/\/doi.org\/10.1007\/978-981-15-5856-6_62","DOI":"10.1007\/978-981-15-5856-6_62"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"crossref","unstructured":"Patrick Wlazlo Abhijeet Sahu Zeyu Mao Hao Huang Ana Goulart Katherine Davis and Saman Zonouz. 2021. Man-in-The-Middle Attacks and Defense in a Power System Cyber-Physical Testbed.  Patrick Wlazlo Abhijeet Sahu Zeyu Mao Hao Huang Ana Goulart Katherine Davis and Saman Zonouz. 2021. Man-in-The-Middle Attacks and Defense in a Power System Cyber-Physical Testbed.","DOI":"10.1049\/cps2.12014"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2011.63"},{"key":"#cr-split#-e_1_3_2_1_85_1.1","doi-asserted-by":"crossref","unstructured":"Qinghua Xu Shuai Wang and Tao Yue. 2021. Digital Twin-based Anomaly Detection in Cyber-physical Systems. 205-216. https:\/\/doi.org\/10.1109\/ICST49551.2021.00031 10.1109\/ICST49551.2021.00031","DOI":"10.1109\/ICST49551.2021.00031"},{"key":"#cr-split#-e_1_3_2_1_85_1.2","doi-asserted-by":"crossref","unstructured":"Qinghua Xu Shuai Wang and Tao Yue. 2021. Digital Twin-based Anomaly Detection in Cyber-physical Systems. 205-216. https:\/\/doi.org\/10.1109\/ICST49551.2021.00031","DOI":"10.1109\/ICST49551.2021.00031"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890566"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185519"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.5555\/3069621.3069649"},{"key":"e_1_3_2_1_89_1","first-page":"391","article-title":"Digital twin framework and its application to power grid online analysis","volume":"5","author":"Zhou Mike","year":"2019","unstructured":"Mike Zhou , Jianfeng Yan , and Donghao Feng . 2019 . Digital twin framework and its application to power grid online analysis . CSEE Journal of Power and Energy Systems 5 , 3 (2019), 391 \u2013 398 . Mike Zhou, Jianfeng Yan, and Donghao Feng. 2019. Digital twin framework and its application to power grid online analysis. CSEE Journal of Power and Energy Systems 5, 3 (2019), 391\u2013398.","journal-title":"CSEE Journal of Power and Energy Systems"}],"event":{"name":"ACSW 2022: Australasian Computer Science Week 2022","location":"Brisbane Australia","acronym":"ACSW 2022"},"container-title":["Australasian Computer Science Week 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511616.3513098","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3511616.3513098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:47Z","timestamp":1750191107000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511616.3513098"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,14]]},"references-count":97,"alternative-id":["10.1145\/3511616.3513098","10.1145\/3511616"],"URL":"https:\/\/doi.org\/10.1145\/3511616.3513098","relation":{},"subject":[],"published":{"date-parts":[[2022,2,14]]},"assertion":[{"value":"2022-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}