{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:19:23Z","timestamp":1771960763316,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Department of Energy","award":["DE-AC05-00OR22725"],"award-info":[{"award-number":["DE-AC05-00OR22725"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,11]]},"DOI":"10.1145\/3560833.3563564","type":"proceedings-article","created":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T22:34:50Z","timestamp":1667428490000},"page":"25-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Stealthy Cyber Anomaly Detection On Large Noisy Multi-material 3D Printer Datasets Using Probabilistic Models"],"prefix":"10.1145","author":[{"given":"Srikanth","family":"Yoginath","sequence":"first","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN, USA"}]},{"given":"Michael","family":"Iannacone","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN, USA"}]},{"given":"Varisara","family":"Tansakul","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN, USA"}]},{"given":"Ali","family":"Passian","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN, USA"}]},{"given":"Rob","family":"Jordan","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN, USA"}]},{"given":"Joel","family":"Asiamah","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN, USA"}]},{"given":"M. Nance","family":"Ericson","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN, USA"}]},{"given":"Gavin","family":"Long","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN, USA"}]},{"given":"Joel A.","family":"Dawson","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"3Dnatives staff. 2021. Why Choose Composite 3D Printing? Experts Give Their Advice! https:\/\/www.3dnatives.com\/en\/composite-3d-printing-experts-givetheir-advice-091120215\/  3Dnatives staff. 2021. Why Choose Composite 3D Printing? Experts Give Their Advice! https:\/\/www.3dnatives.com\/en\/composite-3d-printing-experts-givetheir-advice-091120215\/"},{"key":"e_1_3_2_1_2_1","unstructured":"3DPrintingIndustry. 2019. Vericor\u00e2's gas turbine to use Parker Aerospace 3D printed parts. https:\/\/3dprintingindustry.com\/news\/vericors-gas-turbine-touse-parker-aerospace-3d-printed-parts-157390\/ Section: Aerospace.  3DPrintingIndustry. 2019. Vericor\u00e2's gas turbine to use Parker Aerospace 3D printed parts. https:\/\/3dprintingindustry.com\/news\/vericors-gas-turbine-touse-parker-aerospace-3d-printed-parts-157390\/ Section: Aerospace."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1115\/1.4045547"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2851584"},{"key":"e_1_3_2_1_5_1","unstructured":"Sofia Belikovetsky Mark Yampolskiy Jinghui Toh Jacob Gatlin and Yuval Elovici. 2017. dr0wned -- Cyber-Physical Attack with Additive Manufacturing. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/belikovetsky  Sofia Belikovetsky Mark Yampolskiy Jinghui Toh Jacob Gatlin and Yuval Elovici. 2017. dr0wned -- Cyber-Physical Attack with Additive Manufacturing. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/belikovetsky"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310085"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858320"},{"key":"e_1_3_2_1_8_1","volume-title":"Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference","author":"Davidson-Pilon Cameron","unstructured":"Cameron Davidson-Pilon . 2015. Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference . Addison-Wesley Professional. Google- Books-ID : rMKiCgAAQBAJ. Cameron Davidson-Pilon. 2015. Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference. Addison-Wesley Professional. Google- Books-ID: rMKiCgAAQBAJ."},{"key":"e_1_3_2_1_9_1","volume-title":"Milton Nance Ericson, and Gavin Long","author":"Dawson Joel A.","year":"2021","unstructured":"Joel A. Dawson , Michael Iannacone , Srikanth Yoginath , Varisara Tansakul , Rob Jordan , Ali Passian , Joel Asiamah , Milton Nance Ericson, and Gavin Long . 2021 . Control-Theory-Informed Feature Selection for Detecting Malicious Tampering in Additive Layer Manufacturing Processes. In International Conference on Cyber Warfare and Security. Academic Conferences International Limited , 55--XI. Joel A. Dawson, Michael Iannacone, Srikanth Yoginath, Varisara Tansakul, Rob Jordan, Ali Passian, Joel Asiamah, Milton Nance Ericson, and Gavin Long. 2021. Control-Theory-Informed Feature Selection for Detecting Malicious Tampering in Additive Layer Manufacturing Processes. In International Conference on Cyber Warfare and Security. Academic Conferences International Limited, 55--XI."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2017.03.004"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2019.06.115"},{"key":"e_1_3_2_1_12_1","article-title":"A cyber-physical attack taxonomy for production systems: a quality control perspective","author":"Elhabashy Ahmad E.","year":"2018","unstructured":"Ahmad E. Elhabashy , Lee J. Wells , Jaime A. Camelio , and William H. Woodall . 2018 . A cyber-physical attack taxonomy for production systems: a quality control perspective . Journal of Intelligent Manufacturing ( March 2018). https:\/\/doi.org\/10.1007\/s10845-018--1408--9 10.1007\/s10845-018--1408--9 Ahmad E. Elhabashy, Lee J. Wells, Jaime A. Camelio, and William H. Woodall. 2018. A cyber-physical attack taxonomy for production systems: a quality control perspective. Journal of Intelligent Manufacturing (March 2018). https:\/\/doi.org\/10.1007\/s10845-018--1408--9","journal-title":"Journal of Intelligent Manufacturing"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928005"},{"key":"#cr-split#-e_1_3_2_1_14_1.1","doi-asserted-by":"crossref","unstructured":"L. Graves W.E. King P. Carrion S. Shao N. Shamsaei and M. Yampolskiy. 2021. Sabotaging metal additive manufacturing: Powder delivery system manipulation and material-dependent effects. Additive Manufacturing 46 (Oct. 2021) 102029. https:\/\/doi.org\/10.1016\/j.addma.2021.102029 10.1016\/j.addma.2021.102029","DOI":"10.1016\/j.addma.2021.102029"},{"key":"#cr-split#-e_1_3_2_1_14_1.2","doi-asserted-by":"crossref","unstructured":"L. Graves W.E. King P. Carrion S. Shao N. Shamsaei and M. Yampolskiy. 2021. Sabotaging metal additive manufacturing: Powder delivery system manipulation and material-dependent effects. Additive Manufacturing 46 (Oct. 2021) 102029. https:\/\/doi.org\/10.1016\/j.addma.2021.102029","DOI":"10.1016\/j.addma.2021.102029"},{"key":"e_1_3_2_1_15_1","volume-title":"Characterizing and Defending Against Cyber Security Vulnerabilities in Additive Manufacturing-University of Virginia Library-Libra","author":"Kessel B.","unstructured":"B. Kessel . 2015. Characterizing and Defending Against Cyber Security Vulnerabilities in Additive Manufacturing-University of Virginia Library-Libra . University of Virginia (2015) . B. Kessel. 2015. Characterizing and Defending Against Cyber Security Vulnerabilities in Additive Manufacturing-University of Virginia Library-Libra. University of Virginia (2015)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1108\/RPJ-03-2017-0048"},{"key":"e_1_3_2_1_17_1","article-title":"3D Printing and the Law: The legal implications of our third industrial revolution. Intersect","volume":"11","author":"Ki Ma Venus Chui","year":"2017","unstructured":"Venus Chui Ki Ma . 2017 . 3D Printing and the Law: The legal implications of our third industrial revolution. Intersect : The Stanford Journal of Science, Technology, and Society 11 , 1 (2017). Venus Chui Ki Ma. 2017. 3D Printing and the Law: The legal implications of our third industrial revolution. Intersect: The Stanford Journal of Science, Technology, and Society 11, 1 (2017).","journal-title":"The Stanford Journal of Science, Technology, and Society"},{"key":"e_1_3_2_1_18_1","volume-title":"Bayesian Analysis with Python: Introduction to statistical modeling and probabilistic programming using PyMC3 and ArviZ","author":"Martin Osvaldo","unstructured":"Osvaldo Martin . 2018. Bayesian Analysis with Python: Introduction to statistical modeling and probabilistic programming using PyMC3 and ArviZ , 2 nd Edition. Packt Publishing Ltd. Google-Books-ID : 1Z2BDwAAQBAJ. Osvaldo Martin. 2018. Bayesian Analysis with Python: Introduction to statistical modeling and probabilistic programming using PyMC3 and ArviZ, 2nd Edition. Packt Publishing Ltd. Google-Books-ID: 1Z2BDwAAQBAJ.","edition":"2"},{"key":"e_1_3_2_1_19_1","volume-title":"Elegant SciPy: The Art of Scientific Python. \"O'Reilly Media","author":"Nunez-Iglesias Juan","unstructured":"Juan Nunez-Iglesias , St\u00c3fan van der Walt , and Harriet Dashnow . 2017. Elegant SciPy: The Art of Scientific Python. \"O'Reilly Media , Inc.\". Google-Books-ID : e5AwDwAAQBAJ. Juan Nunez-Iglesias, St\u00c3fan van der Walt, and Harriet Dashnow. 2017. Elegant SciPy: The Art of Scientific Python. \"O'Reilly Media, Inc.\". Google-Books-ID: e5AwDwAAQBAJ."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the \u00e216th IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (March","author":"Rais Muhammad","year":"2022","unstructured":"Muhammad Rais , Muhammad Ahsan , Vaibav Sharma , Radhika Barua , Rob Prins , and Irfan Ahmed . 2022 . Low-magnitude Infill Structure Manipulation Attacks on FFF-based 3D Printers\u00e2 . Proceedings of the \u00e216th IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (March 2022). https:\/\/scholar.google.com\/citations?viewop= view-citation&hl=en&user=JXrXUC4AAAAJ&sortby=pubdate&citationfor-view=JXrXUC4AAAAJ:4fKUyHm3Qg0C Muhammad Rais, Muhammad Ahsan, Vaibav Sharma, Radhika Barua, Rob Prins, and Irfan Ahmed. 2022. Low-magnitude Infill Structure Manipulation Attacks on FFF-based 3D Printers\u00e2. Proceedings of the \u00e216th IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (March 2022). https:\/\/scholar.google.com\/citations?viewop= view-citation&hl=en&user=JXrXUC4AAAAJ&sortby=pubdate&citationfor-view=JXrXUC4AAAAJ:4fKUyHm3Qg0C"},{"key":"e_1_3_2_1_21_1","volume-title":"Dynamic-thermal and localized filament-kinetic attacks on fused filament fabrication based 3D printing process. Additive Manufacturing 46 (Oct","author":"Rais Muhammad Haris","year":"2021","unstructured":"Muhammad Haris Rais , Ye Li , and Irfan Ahmed . 2021. Dynamic-thermal and localized filament-kinetic attacks on fused filament fabrication based 3D printing process. Additive Manufacturing 46 (Oct . 2021 ), 102200. https:\/\/doi.org\/10.1016\/j.addma.2021.102200 10.1016\/j.addma.2021.102200 Muhammad Haris Rais, Ye Li, and Irfan Ahmed. 2021. Dynamic-thermal and localized filament-kinetic attacks on fused filament fabrication based 3D printing process. Additive Manufacturing 46 (Oct. 2021), 102200. https:\/\/doi.org\/10.1016\/j.addma.2021.102200"},{"key":"e_1_3_2_1_22_1","volume-title":"Optimal Sabotage Attack on Composite Material Parts. arXiv:1810.03010 [cs] (Oct","author":"Ranabhat Bikash","year":"2018","unstructured":"Bikash Ranabhat , Joseph Clements , Jacob Gatlin , Kuang-Ting Hsiao , and Mark Yampolskiy . 2018. Optimal Sabotage Attack on Composite Material Parts. arXiv:1810.03010 [cs] (Oct . 2018 ). http:\/\/arxiv.org\/abs\/1810.03010 arXiv: 1810.03010. Bikash Ranabhat, Joseph Clements, Jacob Gatlin, Kuang-Ting Hsiao, and Mark Yampolskiy. 2018. Optimal Sabotage Attack on Composite Material Parts. arXiv:1810.03010 [cs] (Oct. 2018). http:\/\/arxiv.org\/abs\/1810.03010 arXiv: 1810.03010."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2017.05.007"},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"Secure Control Systems: A Quantitative Risk Management Approach","volume":"35","author":"Teixeira Andre","year":"2015","unstructured":"Andre Teixeira , Kin Cheong Sou , Henrik Sandberg , and Karl Henrik Johansson . 2015 . Secure Control Systems: A Quantitative Risk Management Approach . IEEE Control Systems Magazine 35 , 1 (Feb. 2015), 24--45. https:\/\/doi.org\/10.1109\/MCS. 2014.2364709 Conference Name: IEEE Control Systems Magazine. 10.1109\/MCS Andre Teixeira, Kin Cheong Sou, Henrik Sandberg, and Karl Henrik Johansson. 2015. Secure Control Systems: A Quantitative Risk Management Approach. IEEE Control Systems Magazine 35, 1 (Feb. 2015), 24--45. https:\/\/doi.org\/10.1109\/MCS. 2014.2364709 Conference Name: IEEE Control Systems Magazine.","journal-title":"IEEE Control Systems Magazine"},{"key":"e_1_3_2_1_25_1","volume-title":"Justin Ruths, Richard Candell, and Henrik Sandberg.","author":"Urbina David I","year":"2016","unstructured":"David I Urbina , Jairo Giraldo , Alvaro A Cardenas , Junia Valente , Mustafa Faisal , Nils Ole Tippenhauer , Justin Ruths, Richard Candell, and Henrik Sandberg. 2016 . Survey and new directions for physics-based attack detection in control systems. Technical Report NIST GCR 16-010. National Institute of Standards and Technology , Gaithersburg, MD. NIST GCR 16--010 pages. https:\/\/doi.org\/10.6028\/NIST.GCR.16-010 10.6028\/NIST.GCR.16-010 David I Urbina, Jairo Giraldo, Alvaro A Cardenas, Junia Valente, Mustafa Faisal, Nils Ole Tippenhauer, Justin Ruths, Richard Candell, and Henrik Sandberg. 2016. Survey and new directions for physics-based attack detection in control systems. Technical Report NIST GCR 16-010. National Institute of Standards and Technology, Gaithersburg, MD. NIST GCR 16--010 pages. https:\/\/doi.org\/10.6028\/NIST.GCR.16-010"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2011.0441"},{"key":"e_1_3_2_1_27_1","volume-title":"Energetics of a driven Brownian harmonic oscillator. Journal of Statistical Mechanics: Theory and Experiment","author":"Yaghoubi Mohammad","year":"2017","unstructured":"Mohammad Yaghoubi , M. Ebrahim Foulaadvand , Antoine Balrut , and Jerzy Luczka . 2017. Energetics of a driven Brownian harmonic oscillator. Journal of Statistical Mechanics: Theory and Experiment 2017 , 11 (Nov. 2017), 113206. https:\/\/doi.org\/10.1088\/1742--5468\/aa9346 Publisher : IOP Publishing . 10.1088\/1742--5468 Mohammad Yaghoubi, M. Ebrahim Foulaadvand, Antoine Balrut, and Jerzy Luczka. 2017. Energetics of a driven Brownian harmonic oscillator. Journal of Statistical Mechanics: Theory and Experiment 2017, 11 (Nov. 2017), 113206. https:\/\/doi.org\/10.1088\/1742--5468\/aa9346 Publisher: IOP Publishing."},{"key":"e_1_3_2_1_28_1","volume-title":"Security of additive manufacturing: Attack taxonomy and survey. Additive Manufacturing 21 (May","author":"Yampolskiy Mark","year":"2018","unstructured":"Mark Yampolskiy , Wayne E. King , Jacob Gatlin , Sofia Belikovetsky , Adam Brown , Anthony Skjellum , and Yuval Elovici . 2018. Security of additive manufacturing: Attack taxonomy and survey. Additive Manufacturing 21 (May 2018 ), 431--457. https:\/\/doi.org\/10.1016\/j.addma.2018.03.015 10.1016\/j.addma.2018.03.015 Mark Yampolskiy, Wayne E. King, Jacob Gatlin, Sofia Belikovetsky, Adam Brown, Anthony Skjellum, and Yuval Elovici. 2018. Security of additive manufacturing: Attack taxonomy and survey. Additive Manufacturing 21 (May 2018), 431--457. https:\/\/doi.org\/10.1016\/j.addma.2018.03.015"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971947"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11837-016-1937-7"},{"key":"e_1_3_2_1_31_1","volume-title":"A newmethod for single-layer-part nesting in additive manufacturing. Rapid Prototyping Journal","author":"Zhang Yicha","year":"2018","unstructured":"Yicha Zhang , Alain Bernard , Ramy Harik , and Georges Fadel . 2018. A newmethod for single-layer-part nesting in additive manufacturing. Rapid Prototyping Journal ( 2018 ). Yicha Zhang, Alain Bernard, Ramy Harik, and Georges Fadel. 2018. A newmethod for single-layer-part nesting in additive manufacturing. Rapid Prototyping Journal (2018)."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560833.3563564","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3560833.3563564","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3560833.3563564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:34Z","timestamp":1750186834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560833.3563564"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":32,"alternative-id":["10.1145\/3560833.3563564","10.1145\/3560833"],"URL":"https:\/\/doi.org\/10.1145\/3560833.3563564","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}