{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:28:38Z","timestamp":1760171318026,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","funder":[{"name":"European Union","award":["101070008"],"award-info":[{"award-number":["101070008"]}]},{"name":"French National Research Agency","award":["NF-HiSecANR-22-PEFT-0009"],"award-info":[{"award-number":["NF-HiSecANR-22-PEFT-0009"]}]},{"name":"Next Generation EU","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3709017.3737711","type":"proceedings-article","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T16:18:38Z","timestamp":1752596318000},"page":"6-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["SimProcess: High Fidelity Simulation of Noisy ICS Physical Processes"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7050-9369","authenticated-orcid":false,"given":"Denis","family":"Donadel","sequence":"first","affiliation":[{"name":"University of Verona, Verona, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1518-4465","authenticated-orcid":false,"given":"Gabriele","family":"Crestanello","sequence":"additional","affiliation":[{"name":"University of Padua, Padova, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3200-5334","authenticated-orcid":false,"given":"Giulio","family":"Morandini","sequence":"additional","affiliation":[{"name":"University of Padua, Padova, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9342-3920","authenticated-orcid":false,"given":"Daniele","family":"Antonioli","sequence":"additional","affiliation":[{"name":"EURECOM, Sophia Antipolis, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua, Padova, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1712-7492","authenticated-orcid":false,"given":"Massimo","family":"Merro","sequence":"additional","affiliation":[{"name":"University of Verona, Verona, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12786-2_3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2017.89"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274748"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808705.2808715"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243781"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/59.575722"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN52240.2021.9522219"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWMN.2019.8805036"},{"volume-title":"2016 IEEE Power and Energy Society General Meeting (PESGM). IEEE, 1--5.","author":"Brown Michael","key":"e_1_3_2_1_9_1","unstructured":"Michael Brown, Milan Biswal, Sukumar Brahma, Satish J Ranade, and Huiping Cao.2016. Characterizing and quantifying noise in PMU data. In 2016 IEEE Power and Energy Society General Meeting (PESGM). IEEE, 1--5."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2890106"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2017.12.020"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.03.067"},{"key":"e_1_3_2_1_14_1","volume-title":"A recurrent latent variable model for sequential data. Advances in neural information processing systems 28","author":"Chung Junyoung","year":"2015","unstructured":"Junyoung Chung, Kyle Kastner, Laurent Dinh, Kratarth Goel, Aaron C Courville, and Yoshua Bengio. 2015. A recurrent latent variable model for sequential data. Advances in neural information processing systems 28 (2015)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2018.8619753"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3094360"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC55209.2022.9851732"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2298\/SJEE2401113C"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/PEEIC.2018.8665443"},{"key":"e_1_3_2_1_20_1","unstructured":"Nicolas Falliere Liam O Murchu Eric Chien et al. 2011. W32. stuxnet dossier. White paper symantec corp. security response 5 6 (2011) 29."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106669"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958284"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2456852"},{"key":"e_1_3_2_1_24_1","volume-title":"Anton Konev, Tatiana Kosachenko, and Alexander Shelupanov.","author":"Jamal Alshaibi Ahmed","year":"2023","unstructured":"Alshaibi Ahmed Jamal, Al-Ani Mustafa Majid, Anton Konev, Tatiana Kosachenko, and Alexander Shelupanov. 2023. A review on security analysis of cyber physical systems using Machine learning. Materials today: proceedings 80 (2023), 2302--2306."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745468"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2957828"},{"key":"e_1_3_2_1_27_1","volume-title":"Development of Programmable Logic Controller Emulator With QEMU. In IEEE EUROCON 2023-20th International Conference on Smart Technologies. IEEE, 770--775","author":"Kova\u010d Petar","year":"2023","unstructured":"Petar Kova\u010d, Ardian Pantina, Stjepan Gro\u0161, and Damir Sumina. 2023. Development of Programmable Logic Controller Emulator With QEMU. In IEEE EUROCON 2023-20th International Conference on Smart Technologies. IEEE, 770--775."},{"key":"e_1_3_2_1_28_1","volume-title":"2013 11th IEEE International Conference on Industrial Informatics (INDIN). IEEE, 670--675","author":"Krotofil Maryna","year":"2013","unstructured":"Maryna Krotofil and Dieter Gollmann. 2013. Industrial control systems security: What is happening?. In 2013 11th IEEE International Conference on Industrial Informatics (INDIN). IEEE, 670--675."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12040787"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423356"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3604984"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2021.09.015"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.31763\/simple.v1i2.2"},{"volume-title":"Power system dynamics: stability and control","author":"Machowski Jan","key":"e_1_3_2_1_34_1","unstructured":"Jan Machowski, Zbigniew Lubosny, Janusz W Bialek, and James R Bumby. 2020. Power system dynamics: stability and control. John Wiley & Sons."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2006.270827"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2020.106424"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S58398.2023.00024"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2020.02.084"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906943"},{"key":"e_1_3_2_1_40_1","volume-title":"Md Rafiqul Islam, Farah Diyana Abdul Rahman, and Mohammad Tahir.","author":"Mubarak Sinil","year":"2021","unstructured":"Sinil Mubarak, Mohamed Hadi Habaebi, Md Rafiqul Islam, Farah Diyana Abdul Rahman, and Mohammad Tahir. 2021. Anomaly Detection in ICS Datasets with Machine Learning Algorithms. Computer Systems Science & Engineering 37, 1 (2021)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2409775"},{"key":"e_1_3_2_1_42_1","volume-title":"Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12","author":"Pedregosa Fabian","year":"2011","unstructured":"Fabian Pedregosa, Ga\u00ebl Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, et al. 2011. Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12 (2011), 2825--2830."},{"volume-title":"10th dfn-cert workshop, hamburg, germany","author":"Provos Niels","key":"e_1_3_2_1_43_1","unstructured":"Niels Provos. 2003. Honeyd-a virtual honeypot daemon. In 10th dfn-cert workshop, hamburg, germany, Vol. 2. 4."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"R. Rajkumar L. Lee I. Sha and J. A. Stankovic. 2010. Cyber-physical systems: the next computing revolution. In DAC. ACM 731--736.","DOI":"10.1145\/1837274.1837461"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00162"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3690134.3694813"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SGMS.2011.6089027"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2207468"},{"key":"e_1_3_2_1_49_1","first-page":"115","article-title":"Blackenergy-malware for cyber-physical attacks","volume":"74","author":"Shrivastava Siddhant","year":"2016","unstructured":"Siddhant Shrivastava. 2016. Blackenergy-malware for cyber-physical attacks. Singapore 74 (2016), 115.","journal-title":"Singapore"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3198458.3198461"},{"key":"e_1_3_2_1_51_1","volume-title":"Evolution of ICS attacks and the prospects for future disruptive events","author":"Slowik Joseph","year":"2019","unstructured":"Joseph Slowik. 2019. Evolution of ICS attacks and the prospects for future disruptive events. Threat Intelligence Centre Dragos Inc (2019)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584976"},{"key":"e_1_3_2_1_53_1","volume-title":"Materials & Continua 65, 2","author":"Sun Yanbin","year":"2020","unstructured":"Yanbin Sun, Xiaojun Pan, Chao Xu, Penggang Sun, Quanlong Guan, Mohan Li, and Men Han. 2020. Identifying Honeypots from ICS Devices Using Lightweight Fuzzy Testing. Computers, Materials & Continua 65, 2 (2020)."},{"key":"e_1_3_2_1_54_1","volume-title":"Daisuke Mashima, and Zbigniew Kalbarczyk.","author":"Tan Heng Chuan","year":"2024","unstructured":"Heng Chuan Tan, Md Adeeb Hossain, Daisuke Mashima, and Zbigniew Kalbarczyk. 2024. High-fidelity Intrusion Detection Datasets for Smart Grid Cybersecurity Research. In 2024 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, 340--346."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm57358.2023.10333917"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2829021"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2009.2026617"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2017.2762927"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2004.843096"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSC63484.2024.00089"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372318.3372322"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSTE.2013.2280246"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Ning Zhou Zhenyu Huang Da Meng Stephen T Elbert Shaobu Wang and Ruisheng Diao. 2014. Capturing dynamics in the power grid: Formulation of dynamic state estimation through data assimilation. Technical Report. Pacific Northwest National Lab.(PNNL) Richland WA (United States).","DOI":"10.2172\/1172467"},{"key":"e_1_3_2_1_64_1","volume-title":"HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory Testing","author":"Zhu Hengye","year":"2024","unstructured":"Hengye Zhu, Mengxiang Liu, Binbin Chen, Xin Che, Peng Cheng, and Ruilong Deng. 2024. HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory Testing. IEEE Transactions on Information Forensics and Security (2024)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1021\/acs.accounts.0c00868"}],"event":{"name":"ASIA CCS '25: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Hanoi Vietnam","acronym":"ASIA CCS '25"},"container-title":["Proceedings of the 11th ACM Cyber-Physical System Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3709017.3737711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T16:20:17Z","timestamp":1758817217000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709017.3737711"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,25]]},"references-count":65,"alternative-id":["10.1145\/3709017.3737711","10.1145\/3709017"],"URL":"https:\/\/doi.org\/10.1145\/3709017.3737711","relation":{},"subject":[],"published":{"date-parts":[[2025,8,25]]},"assertion":[{"value":"2025-08-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}