{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T16:50:59Z","timestamp":1777395059713,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T00:00:00Z","timestamp":1659916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Bundesministerium f\u00fcr Wirtschaft und Klimaschutz","award":["0350036I"],"award-info":[{"award-number":["0350036I"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,8]]},"DOI":"10.1145\/3546096.3546102","type":"proceedings-article","created":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T16:05:58Z","timestamp":1659629158000},"page":"49-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["PowerDuck: A GOOSE Data Set of Cyberattacks in Substations"],"prefix":"10.1145","author":[{"given":"Sven","family":"Zemanek","sequence":"first","affiliation":[{"name":"Fraunhofer FKIE, Germany"}]},{"given":"Immanuel","family":"Hacker","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany and Fraunhofer FIT, Germany"}]},{"given":"Konrad","family":"Wolsing","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Germany and RWTH Aachen University, Germany"}]},{"given":"Eric","family":"Wagner","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Germany and RWTH Aachen University, Germany"}]},{"given":"Martin","family":"Henze","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany and Fraunhofer FKIE, Germany"}]},{"given":"Martin","family":"Serror","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,8,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"CPS4CIP","author":"Ahmed Chuadhry\u00a0Mujeeb","unstructured":"Chuadhry\u00a0Mujeeb Ahmed and Nandha\u00a0Kumar Kandasamy . 2021. A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning Based CPS Security Research . In CPS4CIP . Springer Int\u2019l Pub ., Cham. Chuadhry\u00a0Mujeeb Ahmed and Nandha\u00a0Kumar Kandasamy. 2021. A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning Based CPS Security Research. In CPS4CIP. Springer Int\u2019l Pub., Cham."},{"key":"e_1_3_2_1_2_1","volume-title":"A Synthesized Dataset for Cybersecurity Study of IEC 61850 based Substation","author":"Biswas P.","unstructured":"Partha\u00a0 P. Biswas , Heng\u00a0Chuan Tan , Qingbo Zhu , 2019. A Synthesized Dataset for Cybersecurity Study of IEC 61850 based Substation . In IEEE SmartGridComm . Partha\u00a0P. Biswas, Heng\u00a0Chuan Tan, Qingbo Zhu, 2019. A Synthesized Dataset for Cybersecurity Study of IEC 61850 based Substation. In IEEE SmartGridComm."},{"key":"e_1_3_2_1_3_1","volume-title":"Critical Information Infrastructures Security","author":"Goh Jonathan","unstructured":"Jonathan Goh , Sridhar Adepu , Khurum\u00a0Nazir Junejo , and Aditya Mathur . 2017. A Dataset to Support Research in the Design of Secure Water Treatment Systems . In Critical Information Infrastructures Security . Springer Int\u2019l Pub ., Cham. Jonathan Goh, Sridhar Adepu, Khurum\u00a0Nazir Junejo, and Aditya Mathur. 2017. A Dataset to Support Research in the Design of Secure Water Treatment Systems. In Critical Information Infrastructures Security. Springer Int\u2019l Pub., Cham."},{"key":"e_1_3_2_1_4_1","volume-title":"Cybersecurity in Power Grids: Challenges and Opportunities. Sensors 21, 18","author":"Krause Tim","year":"2021","unstructured":"Tim Krause , Raphael Ernst , Benedikt Klaer , 2021. Cybersecurity in Power Grids: Challenges and Opportunities. Sensors 21, 18 ( 2021 ). Tim Krause, Raphael Ernst, Benedikt Klaer, 2021. Cybersecurity in Power Grids: Challenges and Opportunities. Sensors 21, 18 (2021)."},{"key":"e_1_3_2_1_5_1","volume-title":"Stuxnet: Dissecting a Cyberwarfare Weapon","author":"Langner Ralph","year":"2011","unstructured":"Ralph Langner . 2011 . Stuxnet: Dissecting a Cyberwarfare Weapon . IEEE Security & Privacy 9, 3 (2011). Ralph Langner. 2011. Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security & Privacy 9, 3 (2011)."},{"key":"e_1_3_2_1_6_1","volume-title":"International Conference on Artificial Neural Networks","author":"Li Dan","unstructured":"Dan Li , Dacheng Chen , Baihong Jin , 2019. MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks . In International Conference on Artificial Neural Networks . Springer , Cham . Dan Li, Dacheng Chen, Baihong Jin, 2019. MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks. In International Conference on Artificial Neural Networks. Springer, Cham."},{"key":"e_1_3_2_1_7_1","volume-title":"RICSel21 Data Collection: Attacks in a Virtual Power Network","author":"Lin Chih-Yuan","unstructured":"Chih-Yuan Lin , August Fundin , Erik Westring , 2021. RICSel21 Data Collection: Attacks in a Virtual Power Network . In IEEE SmartGridComm . Chih-Yuan Lin, August Fundin, Erik Westring, 2021. RICSel21 Data Collection: Attacks in a Virtual Power Network. In IEEE SmartGridComm."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2697440"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958284"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023507"},{"key":"e_1_3_2_1_11_1","volume-title":"Generative Deep Learning for Internet of Things Network Traffic Generation. In IEEE Pacific Rim International Symposium on Dependable Computing.","author":"Shahid R.","year":"2020","unstructured":"Mustafizur\u00a0 R. Shahid , Gregory Blanc , Houda Jmila , 2020 . Generative Deep Learning for Internet of Things Network Traffic Generation. In IEEE Pacific Rim International Symposium on Dependable Computing. Mustafizur\u00a0R. Shahid, Gregory Blanc, Houda Jmila, 2020. Generative Deep Learning for Internet of Things Network Traffic Generation. In IEEE Pacific Rim International Symposium on Dependable Computing."},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Workshop on Cyber Security Experimentation and Test (CSET \u201920)","author":"Shin Hyeok-Ki","year":"2020","unstructured":"Hyeok-Ki Shin , Woomyo Lee , Jeong-Han Yun , and HyoungChun Kim . 2020 . HAI 1.0: HIL-based Augmented ICS Security Dataset . In USENIX Workshop on Cyber Security Experimentation and Test (CSET \u201920) . Hyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, and HyoungChun Kim. 2020. HAI 1.0: HIL-based Augmented ICS Security Dataset. In USENIX Workshop on Cyber Security Experimentation and Test (CSET \u201920)."},{"key":"e_1_3_2_1_13_1","volume-title":"Ukraine Cyber-Induced Power Outage: Analysis and Practical Mitigation Strategies. In IEEE Conference for Protective Relay Engineers.","author":"Whitehead E.","year":"2017","unstructured":"David\u00a0 E. Whitehead , Kevin Owens , Dennis Gammel , and Jess Smith . 2017 . Ukraine Cyber-Induced Power Outage: Analysis and Practical Mitigation Strategies. In IEEE Conference for Protective Relay Engineers. David\u00a0E. Whitehead, Kevin Owens, Dennis Gammel, and Jess Smith. 2017. Ukraine Cyber-Induced Power Outage: Analysis and Practical Mitigation Strategies. In IEEE Conference for Protective Relay Engineers."},{"key":"e_1_3_2_1_14_1","volume-title":"International Symposium on Research in Attacks, Intrusions and Defenses (RAID \u201922)","author":"Wolsing Konrad","year":"2022","unstructured":"Konrad Wolsing , Eric Wagner , Antoine Saillard , and Martin Henze . 2022 . IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems . In International Symposium on Research in Attacks, Intrusions and Defenses (RAID \u201922) . Konrad Wolsing, Eric Wagner, Antoine Saillard, and Martin Henze. 2022. IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID \u201922)."},{"key":"e_1_3_2_1_15_1","volume-title":"Security in Computing and Communications","author":"Yadav Tarun","unstructured":"Tarun Yadav and Arvind\u00a0Mallari Rao . 2015. Technical Aspects of Cyber Kill Chain . In Security in Computing and Communications . Springer Int\u2019l Pub ., Cham. Tarun Yadav and Arvind\u00a0Mallari Rao. 2015. Technical Aspects of Cyber Kill Chain. In Security in Computing and Communications. Springer Int\u2019l Pub., Cham."}],"event":{"name":"CSET 2022: Cyber Security Experimentation and Test Workshop","location":"Virtual CA USA","acronym":"CSET 2022"},"container-title":["Proceedings of the 15th Workshop on Cyber Security Experimentation and Test"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546096.3546102","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546096.3546102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:27Z","timestamp":1750183827000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546096.3546102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,8]]},"references-count":15,"alternative-id":["10.1145\/3546096.3546102","10.1145\/3546096"],"URL":"https:\/\/doi.org\/10.1145\/3546096.3546102","relation":{},"subject":[],"published":{"date-parts":[[2022,8,8]]},"assertion":[{"value":"2022-08-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}