{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:59:36Z","timestamp":1773154776619,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Alberta Innovates"},{"name":"Wedge Networks, Inc."}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3560826.3563383","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T04:06:25Z","timestamp":1667534785000},"page":"55-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["CloudPAD"],"prefix":"10.1145","author":[{"given":"Sanjeev","family":"Rao","sequence":"first","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Majid","family":"Ghaderi","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Hongwen","family":"Zhang","sequence":"additional","affiliation":[{"name":"Wedge Networks, Inc., Calgary, AB, Canada"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"2017 IEEE Conf. Appl. Inf. Netw. Secur. (AINS). IEEE, 98--104","author":"Simon Duque Anton REFERENCES","year":"2017","unstructured":"REFERENCES [1] Simon Duque Anton , Daniel Fraunholz , Christoph Lipps , Frederic Pohl , Marc Zimmermann , and Hans D Schotten . 2017 . Two decades of SCADA exploitation: A brief history . In 2017 IEEE Conf. Appl. Inf. Netw. Secur. (AINS). IEEE, 98--104 . REFERENCES [1] Simon Duque Anton, Daniel Fraunholz, Christoph Lipps, Frederic Pohl, Marc Zimmermann, and Hans D Schotten. 2017. Two decades of SCADA exploitation: A brief history. In 2017 IEEE Conf. Appl. Inf. Netw. Secur. (AINS). IEEE, 98--104."},{"key":"e_1_3_2_2_2_1","unstructured":"Dzmitry Bahdanau Kyunghyun Cho and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. (2014). arXiv:arXiv:1409.0473  Dzmitry Bahdanau Kyunghyun Cho and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. (2014). arXiv:arXiv:1409.0473"},{"key":"e_1_3_2_2_3_1","unstructured":"Lukas Biewald. 2020. Experiment Tracking with Weights and Biases. https: \/\/www.wandb.com\/  Lukas Biewald. 2020. Experiment Tracking with Weights and Biases. https: \/\/www.wandb.com\/"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3107975"},{"key":"#cr-split#-e_1_3_2_2_5_1.1","unstructured":"William Falcon and The PyTorch Lightning team. 2019. PyTorch Lightning. https: \/\/doi.org\/10.5281\/zenodo.3828935 10.5281\/zenodo.3828935"},{"key":"#cr-split#-e_1_3_2_2_5_1.2","unstructured":"William Falcon and The PyTorch Lightning team. 2019. PyTorch Lightning. https: \/\/doi.org\/10.5281\/zenodo.3828935"},{"key":"e_1_3_2_2_6_1","volume-title":"stuxnet dossier. White paper, symantec corp., security response 5, 6","author":"Falliere Nicolas","year":"2011","unstructured":"Nicolas Falliere , Liam O Murchu , and Eric Chien . 2011. W32. stuxnet dossier. White paper, symantec corp., security response 5, 6 ( 2011 ), 29. Nicolas Falliere, Liam O Murchu, and Eric Chien. 2011. W32. stuxnet dossier. White paper, symantec corp., security response 5, 6 (2011), 29."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.34"},{"key":"e_1_3_2_2_8_1","unstructured":"Pavel Filonov Andrey Lavrentyev and Artem Vorontsov. 2016. Multivariate industrial time series with cyber-attack simulation: Fault detection using an lstm-based predictive data model. (2016). arXiv:arXiv:1612.06676  Pavel Filonov Andrey Lavrentyev and Artem Vorontsov. 2016. Multivariate industrial time series with cyber-attack simulation: Fault detection using an lstm-based predictive data model. (2016). arXiv:arXiv:1612.06676"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0871-4_10"},{"key":"e_1_3_2_2_10_1","unstructured":"Amir Gholami Zhewei Yao Sehoon Kim Michael W Mahoney and Kurt Keutzer. 2021. AI and Memory Wall. https:\/\/medium.com\/riselab\/ai-and-memory-wall2cb4265cb0b8  Amir Gholami Zhewei Yao Sehoon Kim Michael W Mahoney and Kurt Keutzer. 2021. AI and Memory Wall. https:\/\/medium.com\/riselab\/ai-and-memory-wall2cb4265cb0b8"},{"key":"e_1_3_2_2_11_1","volume-title":"Henrik Sandberg, and Richard Candell.","author":"Giraldo Jairo","year":"2018","unstructured":"Jairo Giraldo , David Urbina , Alvaro Cardenas , Junia Valente , Mustafa Faisal , Justin Ruths , Nils Ole Tippenhauer , Henrik Sandberg, and Richard Candell. 2018 . A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. ACM Comput. Surv. 51, 4, Article 76 (jul 2018), 36 pages. https:\/\/doi.org\/10.1145\/ 3203245 Jairo Giraldo, David Urbina, Alvaro Cardenas, Junia Valente, Mustafa Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, and Richard Candell. 2018. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. ACM Comput. Surv. 51, 4, Article 76 (jul 2018), 36 pages. https:\/\/doi.org\/10.1145\/ 3203245"},{"key":"e_1_3_2_2_12_1","volume-title":"Int. Conf. on Crit. Inf. Infrastructures Secur. Springer, 88--99","author":"Goh Jonathan","year":"2016","unstructured":"Jonathan Goh , Sridhar Adepu , Khurum Nazir Junejo , and Aditya Mathur . 2016 . A dataset to support research in the design of secure water treatment systems . In Int. Conf. on Crit. Inf. Infrastructures Secur. Springer, 88--99 . Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, and Aditya Mathur. 2016. A dataset to support research in the design of secure water treatment systems. In Int. Conf. on Crit. Inf. Infrastructures Secur. Springer, 88--99."},{"key":"e_1_3_2_2_13_1","volume-title":"Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks. In 2017 IEEE 18th Int. Symp. High Assurance Syst. Eng. (HASE). 140--145","author":"Goh Jonathan","year":"2017","unstructured":"Jonathan Goh , Sridhar Adepu , Marcus Tan , and Zi Shan Lee . 2017 . Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks. In 2017 IEEE 18th Int. Symp. High Assurance Syst. Eng. (HASE). 140--145 . https:\/\/doi.org\/ 10.1109\/HASE.2017.36 10.1109\/HASE.2017.36 Jonathan Goh, Sridhar Adepu, Marcus Tan, and Zi Shan Lee. 2017. Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks. In 2017 IEEE 18th Int. Symp. High Assurance Syst. Eng. (HASE). 140--145. https:\/\/doi.org\/ 10.1109\/HASE.2017.36"},{"key":"e_1_3_2_2_14_1","volume-title":"Deep Learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow , Yoshua Bengio , and Aaron Courville . 2016. Deep Learning . MIT Press . http:\/\/www.deeplearningbook.org. Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT Press. http:\/\/www.deeplearningbook.org."},{"key":"e_1_3_2_2_15_1","unstructured":"Will Douglas Heaven. 2021. 2021 was the year of monster AI models. https:\/\/www.technologyreview.com\/2021\/12\/21\/1042835\/2021-was-the-yearof-monster-ai-models\/  Will Douglas Heaven. 2021. 2021 was the year of monster AI models. https:\/\/www.technologyreview.com\/2021\/12\/21\/1042835\/2021-was-the-yearof-monster-ai-models\/"},{"key":"e_1_3_2_2_16_1","unstructured":"Kevin E Hemsley E Fisher etal 2018. History of industrial control system cyber incidents. Technical Report. Idaho National Lab.(INL) Idaho Falls ID (United States).  Kevin E Hemsley E Fisher et al. 2018. History of industrial control system cyber incidents. Technical Report. Idaho National Lab.(INL) Idaho Falls ID (United States)."},{"key":"e_1_3_2_2_17_1","volume-title":"Long short-term memory. Neural computation 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber . 1997. Long short-term memory. Neural computation 9, 8 ( 1997 ), 1735--1780. Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.149"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1115\/1.2017-Mar-6"},{"key":"e_1_3_2_2_20_1","volume-title":"Comput. Secur","author":"Kim Jonguk","unstructured":"Jonguk Kim , Jeong-Han Yun , and Hyoung Chun Kim . 2019. Anomaly detection for industrial control systems using sequence-to-sequence neural networks . In Comput. Secur . Springer , 3--18. Jonguk Kim, Jeong-Han Yun, and Hyoung Chun Kim. 2019. Anomaly detection for industrial control systems using sequence-to-sequence neural networks. In Comput. Secur. Springer, 3--18."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.106017"},{"key":"e_1_3_2_2_22_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2014","unstructured":"Diederik P. Kingma and Jimmy Ba . 2014 . Adam : A Method for Stochastic Optimization . (2014). https:\/\/doi.org\/10.48550\/ARXIV.1412.6980 arXiv:arXiv:1412.6980 10.48550\/ARXIV.1412.6980 Diederik P. Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. (2014). https:\/\/doi.org\/10.48550\/ARXIV.1412.6980 arXiv:arXiv:1412.6980"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3412841.3441892"},{"key":"e_1_3_2_2_24_1","volume-title":"2016 Int. Workshop Cyberphysical Syst. Smart Water Netw. (CySWater). 31--36","author":"Aditya","year":"2016","unstructured":"Aditya P. Mathur and Nils Ole Tippenhauer. 2016. SWaT: a water treatment testbed for research and training on ICS security . In 2016 Int. Workshop Cyberphysical Syst. Smart Water Netw. (CySWater). 31--36 . https:\/\/doi.org\/10.1109\/ CySWater. 2016 .7469060 Aditya P. Mathur and Nils Ole Tippenhauer. 2016. SWaT: a water treatment testbed for research and training on ICS security. In 2016 Int. Workshop Cyberphysical Syst. Smart Water Netw. (CySWater). 31--36. https:\/\/doi.org\/10.1109\/ CySWater.2016.7469060"},{"key":"e_1_3_2_2_25_1","first-page":"1","article-title":"Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation","volume":"4","author":"Chuadhry Mujeeb Ahmed Gauthama Raman MR","year":"2021","unstructured":"Gauthama Raman MR , Chuadhry Mujeeb Ahmed , and Aditya Mathur . 2021 . Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation . J. Cybersecur. 4 , 1 (2021), 1 -- 12 . Gauthama Raman MR, Chuadhry Mujeeb Ahmed, and Aditya Mathur. 2021. Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation. J. Cybersecur. 4, 1 (2021), 1--12.","journal-title":"J. Cybersecur."},{"key":"e_1_3_2_2_26_1","unstructured":"The pandas development team. 2020. pandas-dev\/pandas: Pandas. https:\/\/doi. org\/10.5281\/zenodo.3509134  The pandas development team. 2020. pandas-dev\/pandas: Pandas. https:\/\/doi. org\/10.5281\/zenodo.3509134"},{"key":"e_1_3_2_2_27_1","volume-title":"PyTorch: An Imperative Style","author":"Paszke Adam","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Natalia Gimelshein , Luca Antiga , Alban Desmaison , Andreas Kopf , Edward Yang , Zachary DeVito , Martin Raison , Alykhan Tejani , Sasank Chilamkurthy , Benoit Steiner , Lu Fang , Junjie Bai , and Soumith Chintala . 2019. PyTorch: An Imperative Style , High-Performance Deep Learning Library . In Advances in Neural Inf. Process. Syst. 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., 8024--8035. http:\/\/papers.neurips.cc\/paper\/9015-pytorch-an-imperativestyle-high-performance-deep-learning-library.pdf Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Inf. Process. Syst. 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., 8024--8035. http:\/\/papers.neurips.cc\/paper\/9015-pytorch-an-imperativestyle-high-performance-deep-learning-library.pdf"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym12101583"},{"key":"e_1_3_2_2_29_1","unstructured":"Dmitry Shalyga Pavel Filonov and Andrey Lavrentyev. 2018. Anomaly detection for water treatment system based on neural network with automatic architecture optimization. (2018). arXiv:arXiv:1807.07282  Dmitry Shalyga Pavel Filonov and Andrey Lavrentyev. 2018. Anomaly detection for water treatment system based on neural network with automatic architecture optimization. (2018). arXiv:arXiv:1807.07282"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Riccardo Taormina and Stefano Galelli. 2018. Deep-learning approach to the detection and localization of cyber-physical attacks on water dist  Riccardo Taormina and Stefano Galelli. 2018. Deep-learning approach to the detection and localization of cyber-physical attacks on water dist","DOI":"10.1061\/(ASCE)WR.1943-5452.0000983"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 4th Workshop on CPS &amp; IoT Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560826.3563383","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3560826.3563383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:34Z","timestamp":1750186834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560826.3563383"}},"subtitle":["Managed Anomaly Detection for ICS"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":31,"alternative-id":["10.1145\/3560826.3563383","10.1145\/3560826"],"URL":"https:\/\/doi.org\/10.1145\/3560826.3563383","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}