{"id":"https://openalex.org/W2313529482","doi":"https://doi.org/10.1145/2897795.2897819","title":"Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation","display_name":"Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation","publication_year":2016,"publication_date":"2016-04-05","ids":{"openalex":"https://openalex.org/W2313529482","doi":"https://doi.org/10.1145/2897795.2897819","mag":"2313529482"},"language":"en","primary_location":{"id":"doi:10.1145/2897795.2897819","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2897795.2897819","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087064145","display_name":"Rayford B. Vaughn","orcid":null},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rayford B. Vaughn","raw_affiliation_strings":["Vice President for Research and Economic Development, Distinguished Professor of Computer Science, University of Alabama in Huntsville"],"affiliations":[{"raw_affiliation_string":"Vice President for Research and Economic Development, Distinguished Professor of Computer Science, University of Alabama in Huntsville","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050382531","display_name":"Tommy Morris","orcid":null},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tommy Morris","raw_affiliation_strings":["Center for Cybersecurity Research and Education, Electrical and Computer Engineering, University of Alabama in Huntsville"],"affiliations":[{"raw_affiliation_string":"Center for Cybersecurity Research and Education, Electrical and Computer Engineering, University of Alabama in Huntsville","institution_ids":["https://openalex.org/I82495205"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087064145"],"corresponding_institution_ids":["https://openalex.org/I82495205"],"apc_list":null,"apc_paid":null,"fwci":2.1424,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.87683818,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homeland-security","display_name":"Homeland security","score":0.6473591923713684},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6102790236473083},{"id":"https://openalex.org/keywords/test","display_name":"Test (biology)","score":0.5711086988449097},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5549104809761047},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5292125344276428},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5090565085411072},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5078635811805725},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4590829908847809},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.45714807510375977},{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.4458667039871216},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4334668815135956},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.4105531871318817},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.3661835193634033},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3435703217983246},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2878059148788452}],"concepts":[{"id":"https://openalex.org/C506469952","wikidata":"https://www.wikidata.org/wiki/Q181467","display_name":"Homeland security","level":3,"score":0.6473591923713684},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6102790236473083},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.5711086988449097},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5549104809761047},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5292125344276428},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5090565085411072},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5078635811805725},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4590829908847809},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.45714807510375977},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.4458667039871216},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4334668815135956},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.4105531871318817},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3661835193634033},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3435703217983246},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2878059148788452},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2897795.2897819","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2897795.2897819","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2028727038","https://openalex.org/W2061243822","https://openalex.org/W2076723621","https://openalex.org/W2082839525","https://openalex.org/W2586431523","https://openalex.org/W6670989820"],"related_works":["https://openalex.org/W2492005062","https://openalex.org/W2566743944","https://openalex.org/W79086336","https://openalex.org/W1983348766","https://openalex.org/W2047682402","https://openalex.org/W2614996178","https://openalex.org/W2783141896","https://openalex.org/W3019650871","https://openalex.org/W2355027202","https://openalex.org/W3141555268"],"abstract_inverted_index":{"This":[0],"paper":[1,66,101,127],"outlines":[2],"a":[3,37,45,103,112,167],"set":[4],"of":[5,39,84,94,99,123,131,143],"10":[6],"cyber":[7,33],"security":[8],"concerns":[9,17,62,117],"associated":[10],"with":[11],"Industrial":[12],"Control":[13],"Systems":[14],"(ICS).":[15],"The":[16,61,96,126],"address":[18,55,115],"software":[19],"and":[20,24,41,43,91,153],"hardware":[21],"development,":[22],"implementation,":[23],"maintenance":[25],"practices,":[26],"supply":[27],"chain":[28],"assurance,":[29],"the":[30,56,71,81,87,92,116,120,124,144,151,160],"need":[31,46],"for":[32,47,80,137],"forensics":[34],"in":[35,64,77,119,135],"ICS,":[36],"lack":[38],"awareness":[40],"training,":[42],"finally,":[44],"test":[48,105,132,146,162],"beds":[49,133,163],"which":[50,108],"can":[51],"be":[52],"used":[53],"to":[54,114,158,164],"first":[57,121],"9":[58],"cited":[59],"concerns.":[60],"documented":[63],"this":[65,78,100],"were":[67],"developed":[68,149],"based":[69],"on":[70],"authors'":[72],"combined":[73],"experience":[74],"conducting":[75],"research":[76],"field":[79],"US":[82],"Department":[83,93],"Homeland":[85],"Security,":[86],"National":[88],"Science":[89],"Foundation,":[90],"Defense.":[95],"second":[97],"half":[98,122],"documents":[102],"virtual":[104,145],"bed":[106,147],"platform":[107,148],"is":[109],"offered":[110],"as":[111,166],"tool":[113],"listed":[118],"paper.":[125],"discusses":[128],"various":[129],"types":[130],"proposed":[134],"literature":[136],"ICS":[138],"research,":[139],"provides":[140],"an":[141],"overview":[142],"by":[150],"authors,":[152],"lists":[154],"future":[155],"works":[156],"required":[157],"extend":[159],"existing":[161],"serve":[165],"development":[168],"platform.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
