{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T20:10:06Z","timestamp":1755893406751,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"EDA Cyber R&T","award":["Cyber Electromagnetic Resilience Evaluation on Replicated Environment (CERERE)"],"award-info":[{"award-number":["Cyber Electromagnetic Resilience Evaluation on Replicated Environment (CERERE)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,19]]},"DOI":"10.1145\/3714393.3726006","type":"proceedings-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T18:38:47Z","timestamp":1749062327000},"page":"419-424","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Sherlock: A Dataset for Process-aware Intrusion Detection Research on Power Grid Networks: Dataset Paper"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3211-1015","authenticated-orcid":false,"given":"Eric","family":"Wagner","sequence":"first","affiliation":[{"name":"Fraunhofer FKIE, Wachtberg, Germany and RWTH Aachen University, Aachen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8549-1344","authenticated-orcid":false,"given":"Lennart","family":"Bader","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Wachtberg, Germany and RWTH Aachen University, Aachen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7571-0555","authenticated-orcid":false,"given":"Konrad","family":"Wolsing","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Wachtberg, Germany and RWTH Aachen University, Aachen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6925-5744","authenticated-orcid":false,"given":"Martin","family":"Serror","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Wachtberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"WADI: A Water Distribution Testbed for Research in the Design of Secure Cyber Physical Systems. In WS on Cyber-Physical Systems for Smart Water Networks.","author":"Chuadhry Mujeeb Ahmed","year":"2017","unstructured":"Chuadhry Mujeeb Ahmed et al. 2017. WADI: A Water Distribution Testbed for Research in the Design of Secure Cyber Physical Systems. In WS on Cyber-Physical Systems for Smart Water Networks."},{"key":"e_1_3_2_1_2_1","unstructured":"Chuadhry Mujeeb Ahmed and Nandha Kumar Kandasamy. 2021. A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning Based CPS Security Research. In CPS4CIP. Cham."},{"key":"e_1_3_2_1_3_1","volume-title":"Comput. Commun.","volume":"155","author":"Tejasvi","year":"2020","unstructured":"Tejasvi Alladi et al. 2020. Industrial control systems: Cyberattack trends and countermeasures. Comput. Commun., Vol. 155 (2020)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Wissam Aoudi et al. 2018. Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems. In ACM CCS.","DOI":"10.1145\/3243734.3243781"},{"key":"e_1_3_2_1_5_1","volume-title":"PowerOwl: A Deterministic Heuristical Approach for Power Grid Modeling. https:\/\/powerowl.org, last accessed","author":"Lennart Bader","year":"2024","unstructured":"Lennart Bader. 2024. PowerOwl: A Deterministic Heuristical Approach for Power Grid Modeling. https:\/\/powerowl.org, last accessed: December 13, 2024."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Lennart Bader et al. 2023. Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. In IEEE EuroS&P.","DOI":"10.1109\/EuroSP57164.2023.00066"},{"key":"e_1_3_2_1_7_1","volume-title":"Filtering Approach: Further Investigations","author":"Amaury Beaudet","year":"2020","unstructured":"Amaury Beaudet et al. 2020. Process-Aware Model-based Intrusion Detection System on Filtering Approach: Further Investigations. In IEEE ICIT."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Partha P Biswas et al. 2019. A Synthesized Dataset for Cybersecurity Study of IEC 61850 based Substation. In IEEE SmartGridComm.","DOI":"10.1109\/SmartGridComm.2019.8909783"},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE Commun. Surv. Tutor.","volume":"23","author":"Mauro","year":"2021","unstructured":"Mauro Conti et al. 2021. A Survey on Industrial Control System Testbeds and Datasets for Security Research. IEEE Commun. Surv. Tutor., Vol. 23, 4 (2021)."},{"key":"e_1_3_2_1_10_1","unstructured":"ESET Research. 2022. Industroyer2: Industroyer reloaded. https:\/\/www.welivesecurity.com\/2022\/04\/12\/industroyer2-industroyer-reloaded\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Sandro Etalle. 2017. From Intrusion Detection to Software Design. In ESORICS.","DOI":"10.1007\/978-3-319-66402-6_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Cheng Feng et al. 2019. A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems.. In NDSS.","DOI":"10.14722\/ndss.2019.23265"},{"key":"e_1_3_2_1_13_1","volume-title":"The State of IT Security in Germany","author":"Federal Office","year":"2023","unstructured":"Federal Office for Information Security (BSI). 2023. The State of IT Security in Germany in 2023. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/Securitysituation\/IT-Security-Situation-in-Germany-2023.html."},{"key":"e_1_3_2_1_14_1","volume-title":"The State of IT Security in Germany","author":"Federal Office","year":"2024","unstructured":"Federal Office for Information Security (BSI). 2024. The State of IT Security in Germany in 2024. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/Securitysituation\/IT-Security-Situation-in-Germany-2024.html."},{"key":"e_1_3_2_1_15_1","volume-title":"Hancke","author":"Brendan Galloway P","year":"2013","unstructured":"Brendan Galloway and Gerhard P. Hancke. 2013. Introduction to Industrial Control Networks. IEEE Commun. Surv. Tutor., Vol. 15, 2 (2013)."},{"key":"e_1_3_2_1_16_1","unstructured":"Jonathan Goh et al. 2016. A Dataset to Support Research in the Design of Secure Water Treatment Systems. In CRITIS."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Won-Seok Hwang et al. 2022. ''Do You Know Existing Accuracy Metrics Overrate Time-Series Anomaly Detections?''. In ACM\/SIGAPP SAC.","DOI":"10.1145\/3477314.3507024"},{"volume-title":"Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks. In ESORICS Workshops. Springer.","author":"Jonguk","key":"e_1_3_2_1_18_1","unstructured":"Jonguk Kim et al. 2020. Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks. In ESORICS Workshops. Springer."},{"key":"e_1_3_2_1_19_1","unstructured":"Dominik Kus et al. 2022. A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection. In ACM CPSS."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Olav Lamberts et al. 2023. SoK: Evaluations in Industrial Intrusion Detection Research. Journal of Systems Research (2023).","DOI":"10.5070\/SR33162445"},{"key":"e_1_3_2_1_21_1","volume-title":"Energies","volume":"13","author":"Steffen","year":"2020","unstructured":"Steffen Meinecke et al. 2020. SimBench-A Benchmark Dataset of Electric Power Systems to Compare Innovative Solutions Based on Power Flow Analysis. Energies, Vol. 13, 12 (2020)."},{"key":"e_1_3_2_1_22_1","volume-title":"Rajkumar et al","author":"Vetrivel S.","year":"2023","unstructured":"Vetrivel S. Rajkumar et al. 2023. Cyber Attacks on Power Grids: Causes and Propagation of Cascading Failures. IEEE Access, Vol. 11 (2023)."},{"key":"e_1_3_2_1_23_1","article-title":"Challenges and Opportunities in Securing the Industrial Internet of Things","volume":"17","author":"Martin Serror","year":"2021","unstructured":"Martin Serror et al. 2021. Challenges and Opportunities in Securing the Industrial Internet of Things. IEEE Transactions on Industrial Informatics, Vol. 17, 5 (2021).","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_2_1_24_1","unstructured":"Hyeok-Ki Shin et al. 2020. HAI 1.0: HIL-based Augmented ICS Security Dataset. In CSET."},{"volume-title":"Developing Benchmark Models for Integrating Distributed Energy Resources. In Power Engineering Society General Meeting.","author":"Kai","key":"e_1_3_2_1_25_1","unstructured":"Kai Strunz et al. 2006. Developing Benchmark Models for Integrating Distributed Energy Resources. In Power Engineering Society General Meeting."},{"key":"e_1_3_2_1_26_1","article-title":"Battle of the Attack Detection Algorithms: Disclosing Cyber Attacks on Water Distribution Networks","volume":"144","author":"Riccardo Taormina","year":"2018","unstructured":"Riccardo Taormina et al. 2018. Battle of the Attack Detection Algorithms: Disclosing Cyber Attacks on Water Distribution Networks. Journal of Water Resources Planning and Management, Vol. 144, 8 (2018).","journal-title":"Journal of Water Resources Planning and Management"},{"key":"e_1_3_2_1_27_1","article-title":"Pandapower-An Open-Source Python Tool for Convenient Modeling, Analysis, and Optimization of Electric Power Systems","volume":"33","author":"Leon Thurner","year":"2018","unstructured":"Leon Thurner et al. 2018. Pandapower-An Open-Source Python Tool for Convenient Modeling, Analysis, and Optimization of Electric Power Systems. IEEE Transactions on Power Systems, Vol. 33, 6 (2018).","journal-title":"IEEE Transactions on Power Systems"},{"key":"e_1_3_2_1_28_1","volume-title":"Whitehead et al","author":"David E.","year":"2017","unstructured":"David E. Whitehead et al. 2017. Ukraine Cyber-induced Power Outage: Analysis and Practical Mitigation Strategies. In CPRE."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Konrad Wolsing et al. 2022a. Can Industrial Intrusion Detection Be SIMPLE?. In ESORICS.","DOI":"10.1007\/978-3-031-17143-7_28"},{"key":"e_1_3_2_1_30_1","volume-title":"IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems. In RAID.","author":"Konrad Wolsing","year":"2022","unstructured":"Konrad Wolsing et al. 2022b. IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems. In RAID."},{"key":"e_1_3_2_1_31_1","unstructured":"Konrad Wolsing et al. 2025. GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection. In USENIX Security."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Sven Zemanek et al. 2022. PowerDuck: A GOOSE Data Set of Cyberattacks in Substations. In CSET.","DOI":"10.1145\/3546096.3546102"}],"event":{"name":"CODASPY '25: Fifteenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Pittsburgh PA USA","acronym":"CODASPY '25"},"container-title":["Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3714393.3726006","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3714393.3726006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:54:46Z","timestamp":1755892486000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3714393.3726006"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,19]]},"references-count":32,"alternative-id":["10.1145\/3714393.3726006","10.1145\/3714393"],"URL":"https:\/\/doi.org\/10.1145\/3714393.3726006","relation":{},"subject":[],"published":{"date-parts":[[2024,6,19]]},"assertion":[{"value":"2025-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}