{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T14:24:21Z","timestamp":1771856661770,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":140,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["390621612"],"award-info":[{"award-number":["390621612"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545968","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"510-525","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems"],"prefix":"10.1145","author":[{"given":"Konrad","family":"Wolsing","sequence":"first","affiliation":[{"name":"Fraunhofer FKIE, Germany and RWTH Aachen University, Germany"}]},{"given":"Eric","family":"Wagner","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Germany and RWTH Aachen University, Germany"}]},{"given":"Antoine","family":"Saillard","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany and Fraunhofer FKIE, Germany"}]},{"given":"Martin","family":"Henze","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany and Fraunhofer FKIE, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems. In Information and Communications Security.","author":"Abdelaty Maged","year":"2020","unstructured":"Maged Abdelaty , Roberto Doriguzzi-Corin , and Domenico Siracusa . 2020 . AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems. In Information and Communications Security. Maged Abdelaty, Roberto Doriguzzi-Corin, and Domenico Siracusa. 2020. AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems. In Information and Communications Security."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897855"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264893"},{"key":"e_1_3_2_1_4_1","article-title":"NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-Based Fingerprints","volume":"24","author":"Ahmed Chuadhry\u00a0Mujeeb","year":"2020","unstructured":"Chuadhry\u00a0Mujeeb Ahmed , Aditya\u00a0 P. Mathur , and Mart\u00edn Ochoa . 2020 . NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-Based Fingerprints . ACM Trans. Priv. Secur. 24 , 1, Article 2(2020). https:\/\/doi.org\/10.1145\/3410447 10.1145\/3410447 Chuadhry\u00a0Mujeeb Ahmed, Aditya\u00a0P. Mathur, and Mart\u00edn Ochoa. 2020. NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-Based Fingerprints. ACM Trans. Priv. Secur. 24, 1, Article 2(2020). https:\/\/doi.org\/10.1145\/3410447","journal-title":"ACM Trans. Priv. Secur."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384941.3409588"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053011"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055366.3055375"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399364"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274748"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2016.2641452"},{"key":"#cr-split#-e_1_3_2_1_11_1.1","doi-asserted-by":"crossref","unstructured":"Abdulmohsen Almalawi Xinghuo Yu Zahir Tari Adil Fahad and Ibrahim Khalil. 2014. An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. Computers & Security 46(2014). https:\/\/doi.org\/10.1016\/j.cose.2014.07.005 10.1016\/j.cose.2014.07.005","DOI":"10.1016\/j.cose.2014.07.005"},{"key":"#cr-split#-e_1_3_2_1_11_1.2","doi-asserted-by":"crossref","unstructured":"Abdulmohsen Almalawi Xinghuo Yu Zahir Tari Adil Fahad and Ibrahim Khalil. 2014. An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. Computers & Security 46(2014). https:\/\/doi.org\/10.1016\/j.cose.2014.07.005","DOI":"10.1016\/j.cose.2014.07.005"},{"key":"e_1_3_2_1_12_1","volume-title":"Security in Process: Detecting Attacks in Industrial Process Data(CECC","author":"Duque Anton Simon","year":"2019","unstructured":"Simon D.\u00a0 Duque Anton , Anna\u00a0Pia Lohfink , Christoph Garth , and Hans\u00a0Dieter Schotten . 2019. Security in Process: Detecting Attacks in Industrial Process Data(CECC 2019 ). https:\/\/doi.org\/10.1145\/3360664.3360669 10.1145\/3360664.3360669 Simon D.\u00a0Duque Anton, Anna\u00a0Pia Lohfink, Christoph Garth, and Hans\u00a0Dieter Schotten. 2019. Security in Process: Detecting Attacks in Industrial Process Data(CECC 2019). https:\/\/doi.org\/10.1145\/3360664.3360669"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM49955.2020.00065"},{"key":"e_1_3_2_1_14_1","volume-title":"Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests. In 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). https:\/\/doi.org\/10","author":"Anton D.","year":"2019","unstructured":"S.\u00a0D.\u00a0 D. Anton , S. Sinha , and H. Dieter Schotten . 2019 . Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests. In 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). https:\/\/doi.org\/10 .23919\/SOFTCOM. 2019 .8903672 10.23919\/SOFTCOM.2019.8903672 S.\u00a0D.\u00a0D. Anton, S. Sinha, and H. Dieter Schotten. 2019. Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests. In 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). https:\/\/doi.org\/10.23919\/SOFTCOM.2019.8903672"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2020.100377"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243781"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423349"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314212.3314217"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies Factory Automation (ETFA 2012","author":"Barbosa R.","year":"2012","unstructured":"R.\u00a0R.\u00a0 R. Barbosa , R. Sadre , and A. Pras . 2012. Towards periodicity based anomaly detection in SCADA networks . In Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies Factory Automation (ETFA 2012 ). https:\/\/doi.org\/10.1109\/ETFA. 2012 .6489745 10.1109\/ETFA.2012.6489745 R.\u00a0R.\u00a0R. Barbosa, R. Sadre, and A. Pras. 2012. Towards periodicity based anomaly detection in SCADA networks. In Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies Factory Automation (ETFA 2012). https:\/\/doi.org\/10.1109\/ETFA.2012.6489745"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2019.8909783"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2099234"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Andrea Carcano Igor\u00a0Nai Fovino Marcelo Masera and Alberto Trombetta. 2010. State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept. In Critical Information Infrastructures Security.  Andrea Carcano Igor\u00a0Nai Fovino Marcelo Masera and Alberto Trombetta. 2010. State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept. In Critical Information Infrastructures Security.","DOI":"10.1007\/978-3-642-14379-3_12"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732198.2732200"},{"key":"e_1_3_2_1_24_1","volume-title":"Modeling message sequences for intrusion detection in industrial control systems","author":"Caselli Marco","unstructured":"Marco Caselli , Emmanuele Zambon , Jonathan Petit , and Frank Kargl . 2015. Modeling message sequences for intrusion detection in industrial control systems . In Critical Infrastructure Protection IX. Springer . Marco Caselli, Emmanuele Zambon, Jonathan Petit, and Frank Kargl. 2015. Modeling message sequences for intrusion detection in industrial control systems. In Critical Infrastructure Protection IX. Springer."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"John\u00a0Henry Castellanos and Jianying Zhou. 2019. A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS. In Applied Cryptography and Network Security.  John\u00a0Henry Castellanos and Jianying Zhou. 2019. A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS. In Applied Cryptography and Network Security.","DOI":"10.1007\/978-3-030-21568-2_10"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00016"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the SCADA security scientific symposium.","author":"Cheung Steven","year":"2007","unstructured":"Steven Cheung , Bruno Dutertre , Martin Fong , Ulf Lindqvist , Keith Skinner , and Alfonso Valdes . 2007 . Using model-based intrusion detection for SCADA networks . In Proceedings of the SCADA security scientific symposium. Steven Cheung, Bruno Dutertre, Martin Fong, Ulf Lindqvist, Keith Skinner, and Alfonso Valdes. 2007. Using model-based intrusion detection for SCADA networks. In Proceedings of the SCADA security scientific symposium."},{"key":"#cr-split#-e_1_3_2_1_28_1.1","doi-asserted-by":"crossref","unstructured":"Hongjun Choi Wen-Chuan Lee Yousra Aafer Fan Fei Zhan Tu Xiangyu Zhang Dongyan Xu and Xinyan Deng. 2018. Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach(CCS '18). https:\/\/doi.org\/10.1145\/3243734.3243752 10.1145\/3243734.3243752","DOI":"10.1145\/3243734.3243752"},{"key":"#cr-split#-e_1_3_2_1_28_1.2","doi-asserted-by":"crossref","unstructured":"Hongjun Choi Wen-Chuan Lee Yousra Aafer Fan Fei Zhan Tu Xiangyu Zhang Dongyan Xu and Xinyan Deng. 2018. Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach(CCS '18). https:\/\/doi.org\/10.1145\/3243734.3243752","DOI":"10.1145\/3243734.3243752"},{"key":"e_1_3_2_1_29_1","unstructured":"[\n  29\n  ]  Justyna Chromik.2017. https:\/\/github.com\/jjchromik\/manipulateTraces\/.  [29] Justyna Chromik.2017. https:\/\/github.com\/jjchromik\/manipulateTraces\/."},{"key":"e_1_3_2_1_30_1","unstructured":"[\n  30\n  ]  Justyna Chromik.2019. https:\/\/github.com\/jjchromik\/intravis.  [30] Justyna Chromik.2019. https:\/\/github.com\/jjchromik\/intravis."},{"key":"e_1_3_2_1_31_1","volume-title":"Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model. Security and Communication Networks 2019","author":"Chu Ankang","year":"2019","unstructured":"Ankang Chu , Yingxu Lai , and Jing Liu . 2019. Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model. Security and Communication Networks 2019 ( 2019 ). Ankang Chu, Yingxu Lai, and Jing Liu. 2019. Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model. Security and Communication Networks 2019 (2019)."},{"key":"e_1_3_2_1_32_1","unstructured":"B. Claise. 2004. Cisco Systems NetFlow Services Export Version 9. RFC 3954. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc3954.txt http:\/\/www.rfc-editor.org\/rfc\/rfc3954.txt.  B. Claise. 2004. Cisco Systems NetFlow Services Export Version 9. RFC 3954. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc3954.txt http:\/\/www.rfc-editor.org\/rfc\/rfc3954.txt."},{"key":"#cr-split#-e_1_3_2_1_33_1.1","doi-asserted-by":"crossref","unstructured":"Tanmoy\u00a0Kanti Das Sridhar Adepu and Jianying Zhou. 2020. Anomaly detection in Industrial Control Systems using Logical Analysis of Data. Computers & Security 96(2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101935 10.1016\/j.cose.2020.101935","DOI":"10.1016\/j.cose.2020.101935"},{"key":"#cr-split#-e_1_3_2_1_33_1.2","doi-asserted-by":"crossref","unstructured":"Tanmoy\u00a0Kanti Das Sridhar Adepu and Jianying Zhou. 2020. Anomaly detection in Industrial Control Systems using Logical Analysis of Data. Computers & Security 96(2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101935","DOI":"10.1016\/j.cose.2020.101935"},{"key":"#cr-split#-e_1_3_2_1_34_1.1","doi-asserted-by":"crossref","unstructured":"Derui Ding Qing-Long Han Yang Xiang Xiaohua Ge and Xian-Ming Zhang. 2018. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275(2018). https:\/\/doi.org\/10.1016\/j.neucom.2017.10.009 10.1016\/j.neucom.2017.10.009","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"#cr-split#-e_1_3_2_1_34_1.2","doi-asserted-by":"crossref","unstructured":"Derui Ding Qing-Long Han Yang Xiang Xiaohua Ge and Xian-Ming Zhang. 2018. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275(2018). https:\/\/doi.org\/10.1016\/j.neucom.2017.10.009","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"e_1_3_2_1_35_1","volume-title":"A plant-wide industrial process control problem. Computers & chemical engineering 17, 3","author":"Downs J","year":"1993","unstructured":"James\u00a0 J Downs and Ernest\u00a0 F Vogel . 1993. A plant-wide industrial process control problem. Computers & chemical engineering 17, 3 ( 1993 ). James\u00a0J Downs and Ernest\u00a0F Vogel. 1993. A plant-wide industrial process control problem. Computers & chemical engineering 17, 3 (1993)."},{"key":"e_1_3_2_1_36_1","unstructured":"Alessandro Erba and Nils\u00a0Ole Tippenhauer. 2020. No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems. CoRR abs\/2012.03586(2020). arxiv:2012.03586https:\/\/arxiv.org\/abs\/2012.03586  Alessandro Erba and Nils\u00a0Ole Tippenhauer. 2020. No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems. CoRR abs\/2012.03586(2020). arxiv:2012.03586https:\/\/arxiv.org\/abs\/2012.03586"},{"key":"#cr-split#-e_1_3_2_1_37_1.1","doi-asserted-by":"crossref","unstructured":"L. Faramondi F. Flammini S. Guarino and R. Setola. 2021. A Hardware-in-the-Loop Water Distribution Testbed Dataset for Cyber-Physical Security Testing. IEEE Access 9(2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3109465 10.1109\/ACCESS.2021.3109465","DOI":"10.1109\/ACCESS.2021.3109465"},{"key":"#cr-split#-e_1_3_2_1_37_1.2","doi-asserted-by":"crossref","unstructured":"L. Faramondi F. Flammini S. Guarino and R. Setola. 2021. A Hardware-in-the-Loop Water Distribution Testbed Dataset for Cyber-Physical Security Testing. IEEE Access 9(2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3109465","DOI":"10.1109\/ACCESS.2021.3109465"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.34"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Cheng Feng Venkata\u00a0Reddy Palleti Aditya Mathur and Deeph Chana. 2019. A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems.. In NDSS.  Cheng Feng Venkata\u00a0Reddy Palleti Aditya Mathur and Deeph Chana. 2019. A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems.. In NDSS.","DOI":"10.14722\/ndss.2019.23265"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Benedikt Ferling Justyna Chromik Marco Caselli and Anne Remke. 2018. Intrusion Detection for Sequence-Based Attacks with Reduced Traffic Models. In Measurement Modelling and Evaluation of Computing Systems.  Benedikt Ferling Justyna Chromik Marco Caselli and Anne Remke. 2018. Intrusion Detection for Sequence-Based Attacks with Reduced Traffic Models. In Measurement Modelling and Evaluation of Computing Systems.","DOI":"10.1007\/978-3-319-74947-1_4"},{"key":"e_1_3_2_1_41_1","unstructured":"Fraunhofer FKIE-CAD. 2022. IPAL - Datasets. https:\/\/github.com\/fkie-cad\/ipal_datasets.  Fraunhofer FKIE-CAD. 2022. IPAL - Datasets. https:\/\/github.com\/fkie-cad\/ipal_datasets."},{"key":"e_1_3_2_1_42_1","unstructured":"Fraunhofer FKIE-CAD. 2022. IPAL - Industrial Intrusion Detection Framework. https:\/\/github.com\/fkie-cad\/ipal_ids_framework.  Fraunhofer FKIE-CAD. 2022. IPAL - Industrial Intrusion Detection Framework. https:\/\/github.com\/fkie-cad\/ipal_ids_framework."},{"key":"e_1_3_2_1_43_1","unstructured":"Fraunhofer FKIE-CAD. 2022. IPAL - Transcriber. https:\/\/github.com\/fkie-cad\/ipal_transcriber.  Fraunhofer FKIE-CAD. 2022. IPAL - Transcriber. https:\/\/github.com\/fkie-cad\/ipal_transcriber."},{"key":"e_1_3_2_1_44_1","unstructured":"Open Information\u00a0Security Foundation. 2021. Suricata. https:\/\/suricata.io\/  Open Information\u00a0Security Foundation. 2021. Suricata. https:\/\/suricata.io\/"},{"key":"e_1_3_2_1_45_1","unstructured":"The Apache\u00a0Software Foundation. 2020. PLC4X. https:\/\/plc4x.apache.org\/  The Apache\u00a0Software Foundation. 2020. PLC4X. https:\/\/plc4x.apache.org\/"},{"key":"e_1_3_2_1_46_1","volume-title":"2010 24th IEEE International Conference on Advanced Information Networking and Applications. https:\/\/doi.org\/10","author":"Fovino N.","year":"2010","unstructured":"I.\u00a0 N. Fovino , A. Carcano , T. De Lacheze Murel, A. Trombetta, and M. Masera. 2010. Modbus\/DNP3 State-Based Intrusion Detection System . In 2010 24th IEEE International Conference on Advanced Information Networking and Applications. https:\/\/doi.org\/10 .1109\/AINA. 2010 .86 10.1109\/AINA.2010.86 I.\u00a0N. Fovino, A. Carcano, T. De Lacheze Murel, A. Trombetta, and M. Masera. 2010. Modbus\/DNP3 State-Based Intrusion Detection System. In 2010 24th IEEE International Conference on Advanced Information Networking and Applications. https:\/\/doi.org\/10.1109\/AINA.2010.86"},{"key":"e_1_3_2_1_47_1","article-title":"On cyber attacks and signature based intrusion detection for modbus based industrial control systems","volume":"9","author":"Gao Wei","year":"2014","unstructured":"Wei Gao and Thomas\u00a0 H Morris . 2014 . On cyber attacks and signature based intrusion detection for modbus based industrial control systems . Journal of Digital Forensics, Security and Law 9 , 1 (2014). Wei Gao and Thomas\u00a0H Morris. 2014. On cyber attacks and signature based intrusion detection for modbus based industrial control systems. Journal of Digital Forensics, Security and Law 9, 1 (2014).","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"e_1_3_2_1_48_1","volume-title":"HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems(CPS-SPC \u201916). https:\/\/doi.org\/10.1145\/2994487.2994492","author":"Ghaeini Hamid\u00a0Reza","year":"2016","unstructured":"Hamid\u00a0Reza Ghaeini and Nils\u00a0Ole Tippenhauer . 2016 . HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems(CPS-SPC \u201916). https:\/\/doi.org\/10.1145\/2994487.2994492 10.1145\/2994487.2994492 Hamid\u00a0Reza Ghaeini and Nils\u00a0Ole Tippenhauer. 2016. HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems(CPS-SPC \u201916). https:\/\/doi.org\/10.1145\/2994487.2994492"},{"key":"e_1_3_2_1_49_1","volume-title":"A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. ACM Comput. Surv. 51, 4","author":"Giraldo Jairo","year":"2018","unstructured":"Jairo Giraldo , David Urbina , Alvaro Cardenas , Junia Valente , Mustafa Faisal , Justin Ruths , Nils\u00a0Ole Tippenhauer , Henrik Sandberg , and Richard Candell . 2018. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. ACM Comput. Surv. 51, 4 ( 2018 ). https:\/\/doi.org\/10.1145\/3203245 10.1145\/3203245 Jairo Giraldo, David Urbina, Alvaro Cardenas, Junia Valente, Mustafa Faisal, Justin Ruths, Nils\u00a0Ole Tippenhauer, Henrik Sandberg, and Richard Candell. 2018. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. ACM Comput. Surv. 51, 4 (2018). https:\/\/doi.org\/10.1145\/3203245"},{"key":"e_1_3_2_1_50_1","volume-title":"International conference on critical information infrastructures security. Springer.","author":"Goh Jonathan","year":"2016","unstructured":"Jonathan Goh , Sridhar Adepu , Khurum\u00a0Nazir Junejo , and Aditya Mathur . 2016 . A dataset to support research in the design of secure water treatment systems . In International conference on critical information infrastructures security. Springer. Jonathan Goh, Sridhar Adepu, Khurum\u00a0Nazir Junejo, and Aditya Mathur. 2016. A dataset to support research in the design of secure water treatment systems. In International conference on critical information infrastructures security. Springer."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.05.001"},{"key":"e_1_3_2_1_52_1","volume-title":"Innovative multi-layered architecture for heterogeneous automation and monitoring systems: Application case of a photovoltaic smart microgrid. Sustainability 13, 4","author":"Gonz\u00e1lez Isa\u00edas","year":"2021","unstructured":"Isa\u00edas Gonz\u00e1lez , Antonio\u00a0Jos\u00e9 Calder\u00f3n , and Jos\u00e9\u00a0Mar\u00eda Portalo . 2021. Innovative multi-layered architecture for heterogeneous automation and monitoring systems: Application case of a photovoltaic smart microgrid. Sustainability 13, 4 ( 2021 ). Isa\u00edas Gonz\u00e1lez, Antonio\u00a0Jos\u00e9 Calder\u00f3n, and Jos\u00e9\u00a0Mar\u00eda Portalo. 2021. Innovative multi-layered architecture for heterogeneous automation and monitoring systems: Application case of a photovoltaic smart microgrid. Sustainability 13, 4 (2021)."},{"key":"#cr-split#-e_1_3_2_1_53_1.1","doi-asserted-by":"crossref","unstructured":"Dina Had\u017eiosmanovi\u0107 Robin Sommer Emmanuele Zambon and Pieter\u00a0H. Hartel. 2014. Through the Eye of the PLC: Semantic Security Monitoring for Industrial Processes(ACSAC '14). https:\/\/doi.org\/10.1145\/2664243.2664277 10.1145\/2664243.2664277","DOI":"10.1145\/2664243.2664277"},{"key":"#cr-split#-e_1_3_2_1_53_1.2","doi-asserted-by":"crossref","unstructured":"Dina Had\u017eiosmanovi\u0107 Robin Sommer Emmanuele Zambon and Pieter\u00a0H. Hartel. 2014. Through the Eye of the PLC: Semantic Security Monitoring for Industrial Processes(ACSAC '14). https:\/\/doi.org\/10.1145\/2664243.2664277","DOI":"10.1145\/2664243.2664277"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3327961.3329530"},{"key":"#cr-split#-e_1_3_2_1_55_1.1","doi-asserted-by":"crossref","unstructured":"Kevin\u00a0E. Hemsley and Dr.\u00a0Ronald E.\u00a0Fisher. 2018. History of Industrial Control System Cyber Incidents. (2018). https:\/\/doi.org\/10.2172\/1505628 10.2172\/1505628","DOI":"10.2172\/1505628"},{"key":"#cr-split#-e_1_3_2_1_55_1.2","doi-asserted-by":"crossref","unstructured":"Kevin\u00a0E. Hemsley and Dr.\u00a0Ronald E.\u00a0Fisher. 2018. History of Industrial Control System Cyber Incidents. (2018). https:\/\/doi.org\/10.2172\/1505628","DOI":"10.2172\/1505628"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3420016"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2018.8638027"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718794615"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358118"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.149"},{"key":"e_1_3_2_1_62_1","unstructured":"M. Iturbe. 2018. PASAD. https:\/\/github.com\/mikeliturbe\/pasad.  M. Iturbe. 2018. PASAD. https:\/\/github.com\/mikeliturbe\/pasad."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7039487"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899015.2899016"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/CoDIT.2019.8820602"},{"key":"e_1_3_2_1_66_1","volume-title":"SysDetect: A systematic approach to critical state determination for Industrial Intrusion Detection Systems using Apriori algorithm. Journal of Process Control 32","author":"Khalili Abdullah","year":"2015","unstructured":"Abdullah Khalili and Ashkan Sami . 2015. SysDetect: A systematic approach to critical state determination for Industrial Intrusion Detection Systems using Apriori algorithm. Journal of Process Control 32 ( 2015 ). https:\/\/doi.org\/10.1016\/j.jprocont.2015.04.005 10.1016\/j.jprocont.2015.04.005 Abdullah Khalili and Ashkan Sami. 2015. SysDetect: A systematic approach to critical state determination for Industrial Intrusion Detection Systems using Apriori algorithm. Journal of Process Control 32 (2015). https:\/\/doi.org\/10.1016\/j.jprocont.2015.04.005"},{"key":"e_1_3_2_1_67_1","unstructured":"J. Kim. 2019. swat-seq2seq. https:\/\/github.com\/jukworks\/swat-seq2seq\/.  J. Kim. 2019. swat-seq2seq. https:\/\/github.com\/jukworks\/swat-seq2seq\/."},{"key":"e_1_3_2_1_68_1","unstructured":"Jonguk Kim Jeong-Han Yun and Hyoung\u00a0Chun\u201d Kim. 2020. Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks. In Computer Security.  Jonguk Kim Jeong-Han Yun and Hyoung\u00a0Chun\u201d Kim. 2020. Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks. In Computer Security."},{"key":"e_1_3_2_1_69_1","volume-title":"Microgrids platform: A design and implementation of common platform for seamless microgrids operation. Electric Power Systems Research 167","author":"Kim Jun-Sung","year":"2019","unstructured":"Jun-Sung Kim , Seong\u00a0Min So , Joong-Tae Kim , Jung-Won Cho , Hee-Jeong Park , Fauzan\u00a0Hanif Jufri , and Jaesung Jung . 2019. Microgrids platform: A design and implementation of common platform for seamless microgrids operation. Electric Power Systems Research 167 ( 2019 ). https:\/\/doi.org\/10.1016\/j.epsr.2018.10.019 10.1016\/j.epsr.2018.10.019 Jun-Sung Kim, Seong\u00a0Min So, Joong-Tae Kim, Jung-Won Cho, Hee-Jeong Park, Fauzan\u00a0Hanif Jufri, and Jaesung Jung. 2019. Microgrids platform: A design and implementation of common platform for seamless microgrids operation. Electric Power Systems Research 167 (2019). https:\/\/doi.org\/10.1016\/j.epsr.2018.10.019"},{"key":"e_1_3_2_1_70_1","volume-title":"2015 IEEE 13th International Conference on Industrial Informatics (INDIN). https:\/\/doi.org\/10","author":"Kiss I.","year":"2015","unstructured":"I. Kiss , B. Genge , and P. Haller . 2015. A clustering-based approach to detect cyber attacks in process control systems . In 2015 IEEE 13th International Conference on Industrial Informatics (INDIN). https:\/\/doi.org\/10 .1109\/INDIN. 2015 .7281725 10.1109\/INDIN.2015.7281725 I. Kiss, B. Genge, and P. Haller. 2015. A clustering-based approach to detect cyber attacks in process control systems. In 2015 IEEE 13th International Conference on Industrial Informatics (INDIN). https:\/\/doi.org\/10.1109\/INDIN.2015.7281725"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243751"},{"key":"e_1_3_2_1_72_1","volume-title":"EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks.. In NDSS.","author":"Kneib Marcel","year":"2020","unstructured":"Marcel Kneib , Oleg Schell , and Christopher Huth . 2020 . EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks.. In NDSS. Marcel Kneib, Oleg Schell, and Christopher Huth. 2020. EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks.. In NDSS."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2585083"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2562059.2562146"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264896"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714599"},{"key":"e_1_3_2_1_77_1","volume-title":"The Heterogeneous Gateways in the Industrial Internet of Things. In 2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). https:\/\/doi.org\/10","author":"Kulik Viacheslav","year":"2018","unstructured":"Viacheslav Kulik and Ruslan Kirichek . 2018 . The Heterogeneous Gateways in the Industrial Internet of Things. In 2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). https:\/\/doi.org\/10 .1109\/ICUMT.2018.8631232 10.1109\/ICUMT.2018.8631232 Viacheslav Kulik and Ruslan Kirichek. 2018. The Heterogeneous Gateways in the Industrial Internet of Things. In 2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). https:\/\/doi.org\/10.1109\/ICUMT.2018.8631232"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494107.3522773"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3198458.3198460"},{"key":"e_1_3_2_1_80_1","volume-title":"Timing Patterns and Correlations in Spontaneous SCADA Traffic for Anomaly Detection. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019","author":"Lin Chih-Yuan","year":"2019","unstructured":"Chih-Yuan Lin and Simin Nadjm-Tehrani . 2019 . Timing Patterns and Correlations in Spontaneous SCADA Traffic for Anomaly Detection. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019 ). https:\/\/www.usenix.org\/conference\/raid2019\/presentation\/lin Chih-Yuan Lin and Simin Nadjm-Tehrani. 2019. Timing Patterns and Correlations in Spontaneous SCADA Traffic for Anomaly Detection. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). https:\/\/www.usenix.org\/conference\/raid2019\/presentation\/lin"},{"key":"e_1_3_2_1_81_1","volume-title":"Timing-Based Anomaly Detection in SCADA Networks. In International Conference on Critical Information Infrastructures Security.","author":"Lin Chih-Yuan","year":"2017","unstructured":"Chih-Yuan Lin , Simin Nadjm-Tehrani , and Mikael Asplund . 2017 . Timing-Based Anomaly Detection in SCADA Networks. In International Conference on Critical Information Infrastructures Security. Chih-Yuan Lin, Simin Nadjm-Tehrani, and Mikael Asplund. 2017. Timing-Based Anomaly Detection in SCADA Networks. In International Conference on Critical Information Infrastructures Security."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196546"},{"key":"#cr-split#-e_1_3_2_1_83_1.1","doi-asserted-by":"crossref","unstructured":"R. Lopez Perez F. Adamsky R. Soua and T. Engel. 2018. Machine Learning for Reliable Network Attack Detection in SCADA Systems. In 2018 17th IEEE International Conference On Trust Security And Privacy In Computing And Communications\/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00094 10.1109\/TrustCom","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00094"},{"key":"#cr-split#-e_1_3_2_1_83_1.2","doi-asserted-by":"crossref","unstructured":"R. Lopez Perez F. Adamsky R. Soua and T. Engel. 2018. Machine Learning for Reliable Network Attack Detection in SCADA Systems. In 2018 17th IEEE International Conference On Trust Security And Privacy In Computing And Communications\/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00094","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00094"},{"key":"#cr-split#-e_1_3_2_1_84_1.1","doi-asserted-by":"crossref","unstructured":"George Loukas Eirini Karapistoli Emmanouil Panaousis Panagiotis Sarigiannidis Anatolij Bezemskij and Tuan Vuong. 2019. A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks 84(2019). https:\/\/doi.org\/10.1016\/j.adhoc.2018.10.002 10.1016\/j.adhoc.2018.10.002","DOI":"10.1016\/j.adhoc.2018.10.002"},{"key":"#cr-split#-e_1_3_2_1_84_1.2","doi-asserted-by":"crossref","unstructured":"George Loukas Eirini Karapistoli Emmanouil Panaousis Panagiotis Sarigiannidis Anatolij Bezemskij and Tuan Vuong. 2019. A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks 84(2019). https:\/\/doi.org\/10.1016\/j.adhoc.2018.10.002","DOI":"10.1016\/j.adhoc.2018.10.002"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2014.6918252"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD46983.2019.9037882"},{"key":"e_1_3_2_1_87_1","volume-title":"7th annual southeastern cyber security summit","author":"Morris H","year":"2015","unstructured":"Thomas\u00a0 H Morris , Zach Thornton , and Ian Turnipseed . 2015. Industrial control system simulation and data logging for intrusion detection system research . 7th annual southeastern cyber security summit ( 2015 ). Thomas\u00a0H Morris, Zach Thornton, and Ian Turnipseed. 2015. Industrial control system simulation and data logging for intrusion detection system research. 7th annual southeastern cyber security summit (2015)."},{"key":"#cr-split#-e_1_3_2_1_88_1.1","doi-asserted-by":"crossref","unstructured":"David Myers Suriadi Suriadi Kenneth Radke and Ernest Foo. 2018. Anomaly detection for industrial control systems using process mining. Computers & Security 78(2018). https:\/\/doi.org\/10.1016\/j.cose.2018.06.002 10.1016\/j.cose.2018.06.002","DOI":"10.1016\/j.cose.2018.06.002"},{"key":"#cr-split#-e_1_3_2_1_88_1.2","doi-asserted-by":"crossref","unstructured":"David Myers Suriadi Suriadi Kenneth Radke and Ernest Foo. 2018. Anomaly detection for industrial control systems using process mining. Computers & Security 78(2018). https:\/\/doi.org\/10.1016\/j.cose.2018.06.002","DOI":"10.1016\/j.cose.2018.06.002"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2330796"},{"key":"e_1_3_2_1_90_1","volume-title":"Resilient machine learning for networked cyber physical systems: A survey for machine learning security to securing machine learning for cps","author":"Olowononi O","year":"2020","unstructured":"Felix\u00a0 O Olowononi , Danda\u00a0 B Rawat , and Chunmei Liu . 2020. Resilient machine learning for networked cyber physical systems: A survey for machine learning security to securing machine learning for cps . IEEE Communications Surveys & Tutorials 23, 1 ( 2020 ). Felix\u00a0O Olowononi, Danda\u00a0B Rawat, and Chunmei Liu. 2020. Resilient machine learning for networked cyber physical systems: A survey for machine learning security to securing machine learning for cps. IEEE Communications Surveys & Tutorials 23, 1 (2020)."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2409775"},{"key":"e_1_3_2_1_92_1","first-page":"3","article-title":"A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems","volume":"7","author":"Panigrahi Ranjit","year":"2018","unstructured":"Ranjit Panigrahi and Samarjeet Borah . 2018 . A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems . International Journal of Engineering & Technology 7 , 3 .24(2018). Ranjit Panigrahi and Samarjeet Borah. 2018. A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems. International Journal of Engineering & Technology 7, 3.24(2018).","journal-title":"International Journal of Engineering & Technology"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443793"},{"key":"e_1_3_2_1_94_1","unstructured":"The\u00a0Zeek Project. 2021. Zeek. https:\/\/zeek.org\/  The\u00a0Zeek Project. 2021. Zeek. https:\/\/zeek.org\/"},{"key":"e_1_3_2_1_95_1","volume-title":"SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Quinonez Raul","year":"2020","unstructured":"Raul Quinonez , Jairo Giraldo , Luis Salazar , Erick Bauman , Alvaro Cardenas , and Zhiqiang Lin . 2020 . SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. In 29th USENIX Security Symposium (USENIX Security 20) . Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin. 2020. SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. In 29th USENIX Security Symposium (USENIX Security 20)."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409314"},{"key":"e_1_3_2_1_97_1","unstructured":"R. Raj. 2020. PyPASAD. https:\/\/github.com\/rahulrajpl\/PyPASAD\/.  R. Raj. 2020. PyPASAD. https:\/\/github.com\/rahulrajpl\/PyPASAD\/."},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18082491"},{"key":"e_1_3_2_1_99_1","unstructured":"Rocio. 2021. ML-NIDS-for-SCADA. https:\/\/github.com\/Rocionightwater\/ML-NIDS-for-SCADA.  Rocio. 2021. ML-NIDS-for-SCADA. https:\/\/github.com\/Rocionightwater\/ML-NIDS-for-SCADA."},{"key":"e_1_3_2_1_100_1","unstructured":"Martin Roesch 1999. Snort: Lightweight intrusion detection for networks.. In Lisa Vol.\u00a099.  Martin Roesch 1999. Snort: Lightweight intrusion detection for networks.. In Lisa Vol.\u00a099."},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459960.3459963"},{"key":"e_1_3_2_1_102_1","volume-title":"Stephen Reese, and Hoda Mehrpouyan.","author":"Sapkota Subin","year":"2020","unstructured":"Subin Sapkota , A\u00a0K M\u00a0Nuhil Mehdy , Stephen Reese, and Hoda Mehrpouyan. 2020 . FALCON : Framework for Anomaly Detection in Industrial Control Systems. Electronics 9, 8 (2020). https:\/\/doi.org\/10.3390\/electronics9081192 10.3390\/electronics9081192 Subin Sapkota, A\u00a0K M\u00a0Nuhil Mehdy, Stephen Reese, and Hoda Mehrpouyan. 2020. FALCON: Framework for Anomaly Detection in Industrial Control Systems. Electronics 9, 8 (2020). https:\/\/doi.org\/10.3390\/electronics9081192"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017971.3017978"},{"key":"e_1_3_2_1_104_1","volume-title":"13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20)","author":"Shin Hyeok-Ki","year":"2020","unstructured":"Hyeok-Ki Shin , Woomyo Lee , Jeong-Han Yun , and HyoungChun Kim . 2020 . HAI 1.0: HIL-based Augmented ICS Security Dataset . In 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20) . https:\/\/www.usenix.org\/conference\/cset20\/presentation\/shin Hyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, and HyoungChun Kim. 2020. HAI 1.0: HIL-based Augmented ICS Security Dataset. In 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20). https:\/\/www.usenix.org\/conference\/cset20\/presentation\/shin"},{"key":"e_1_3_2_1_105_1","unstructured":"J. Smith. 2016. ICS-pcap. https:\/\/github.com\/automayt\/ICS-pcap\/blob\/master\/Additional Captures\/4SICS-GeekLounge-151022\/4SICS-GeekLounge-151022.pcap.  J. Smith. 2016. ICS-pcap. https:\/\/github.com\/automayt\/ICS-pcap\/blob\/master\/Additional Captures\/4SICS-GeekLounge-151022\/4SICS-GeekLounge-151022.pcap."},{"key":"e_1_3_2_1_106_1","volume-title":"Bro: An open source network intrusion detection system. In Security, E-learning, E-Services, 17. DFN-Arbeitstagung \u00fcber Kommunikationsnetze.","author":"Sommer Robin","year":"2003","unstructured":"Robin Sommer . 2003 . Bro: An open source network intrusion detection system. In Security, E-learning, E-Services, 17. DFN-Arbeitstagung \u00fcber Kommunikationsnetze. Robin Sommer. 2003. Bro: An open source network intrusion detection system. In Security, E-learning, E-Services, 17. DFN-Arbeitstagung \u00fcber Kommunikationsnetze."},{"key":"e_1_3_2_1_107_1","volume-title":"Spicy: A unified deep packet inspection framework dissecting all your data. Technical report, Tech. rep.","author":"Sommer Robin","year":"2015","unstructured":"Robin Sommer , Johanna Amann , and Seth Hall . 2015 . Spicy: A unified deep packet inspection framework dissecting all your data. Technical report, Tech. rep. , ICSI, 2015. TR- 15\u2013004 (2015). Robin Sommer, Johanna Amann, and Seth Hall. 2015. Spicy: A unified deep packet inspection framework dissecting all your data. Technical report, Tech. rep., ICSI, 2015. TR-15\u2013004 (2015)."},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"#cr-split#-e_1_3_2_1_109_1.1","unstructured":"Bruno Sousa Tiago Cruz Vasco Pereira and Miguel Arieiro. 2021. Denial of Service and Man in The Middle attacks in Programmable Logic Controllers. https:\/\/doi.org\/10.21227\/mewp-g646 10.21227\/mewp-g646"},{"key":"#cr-split#-e_1_3_2_1_109_1.2","unstructured":"Bruno Sousa Tiago Cruz Vasco Pereira and Miguel Arieiro. 2021. Denial of Service and Man in The Middle attacks in Programmable Logic Controllers. https:\/\/doi.org\/10.21227\/mewp-g646"},{"key":"e_1_3_2_1_110_1","volume-title":"Computer security: principles and practice","author":"Stallings William","unstructured":"William Stallings and Lawrie Brown . 2015. Computer security: principles and practice ( third edition ed.). Pearson . William Stallings and Lawrie Brown. 2015. Computer security: principles and practice(third edition ed.). Pearson."},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411498.3419961"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411498.3419961"},{"key":"e_1_3_2_1_113_1","volume-title":"Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments. In Annual Computer Security Applications Conference (ACSAC \u201921)","author":"Uetz Rafael","year":"2021","unstructured":"Rafael Uetz , Christian Hemminghaus , Louis Hackl\u00e4nder , Philipp Schlipper , and Martin Henze . 2021 . Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments. In Annual Computer Security Applications Conference (ACSAC \u201921) . Rafael Uetz, Christian Hemminghaus, Louis Hackl\u00e4nder, Philipp Schlipper, and Martin Henze. 2021. Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments. In Annual Computer Security Applications Conference (ACSAC \u201921)."},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2009.5168010"},{"key":"e_1_3_2_1_116_1","unstructured":"Cybersecurity Ventures. 2019. 2019 Official Annual Cybercrime Report.  Cybersecurity Ventures. 2019. 2019 Official Annual Cybercrime Report."},{"key":"e_1_3_2_1_117_1","unstructured":"VirusTotal. 2021. YARA. https:\/\/virustotal.github.io\/yara\/  VirusTotal. 2021. YARA. https:\/\/virustotal.github.io\/yara\/"},{"key":"#cr-split#-e_1_3_2_1_118_1.1","doi-asserted-by":"crossref","unstructured":"Eric Wagner Jan Bauer and Martin Henze. 2022. Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes. (2022). https:\/\/doi.org\/10.1145\/3507657.3528539 10.1145\/3507657.3528539","DOI":"10.1145\/3507657.3528539"},{"key":"#cr-split#-e_1_3_2_1_118_1.2","doi-asserted-by":"crossref","unstructured":"Eric Wagner Jan Bauer and Martin Henze. 2022. Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes. (2022). https:\/\/doi.org\/10.1145\/3507657.3528539","DOI":"10.1145\/3507657.3528539"},{"key":"e_1_3_2_1_119_1","unstructured":"Jie Wang. 2009. The Art of Intrusion Detection. In Computer Network Security: Theory and Practice.  Jie Wang. 2009. The Art of Intrusion Detection. In Computer Network Security: Theory and Practice."},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3401025.3401764"},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3420019"},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2016.2603339"},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.14722\/sent.2014.23012"},{"key":"e_1_3_2_1_124_1","unstructured":"Jeong-Han Yun Yoonho Hwang Woomyo Lee Hee-Kap Ahn and Sin-Kyu Kim. 2018. Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances. In Research in Attacks Intrusions and Defenses.  Jeong-Han Yun Yoonho Hwang Woomyo Lee Hee-Kap Ahn and Sin-Kyu Kim. 2018. Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances. In Research in Attacks Intrusions and Defenses."},{"key":"e_1_3_2_1_125_1","doi-asserted-by":"crossref","unstructured":"Philipp Zehnder P. Wiener T. Straub and D. Riemer. 2020. StreamPipes Connect: Semantics-Based Edge Adapters for the IIoT. In ESWC. Springer.  Philipp Zehnder P. Wiener T. Straub and D. Riemer. 2020. StreamPipes Connect: Semantics-Based Edge Adapters for the IIoT. In ESWC. Springer.","DOI":"10.1007\/978-3-030-49461-2_39"},{"key":"e_1_3_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546096.3546102"},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2600630"},{"key":"e_1_3_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2415763"}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Limassol Cyprus","acronym":"RAID 2022"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545968","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545968","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:27Z","timestamp":1750188627000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545968"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":140,"alternative-id":["10.1145\/3545948.3545968","10.1145\/3545948"],"URL":"https:\/\/doi.org\/10.1145\/3545948.3545968","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}