{"id":"https://openalex.org/W2568772275","doi":"https://doi.org/10.1145/3018981.3018988","title":"Virtualization of Industrial Control System Testbeds for Cybersecurity","display_name":"Virtualization of Industrial Control System Testbeds for Cybersecurity","publication_year":2016,"publication_date":"2016-12-06","ids":{"openalex":"https://openalex.org/W2568772275","doi":"https://doi.org/10.1145/3018981.3018988","mag":"2568772275"},"language":"en","primary_location":{"id":"doi:10.1145/3018981.3018988","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3018981.3018988","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd Annual Industrial Control System Security Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103044958","display_name":"Thiago Alves","orcid":"https://orcid.org/0000-0003-4440-8959"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Thiago Alves","raw_affiliation_strings":["Computer Engineering, University of Alabama in Huntsville, USA"],"affiliations":[{"raw_affiliation_string":"Computer Engineering, University of Alabama in Huntsville, USA","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011362633","display_name":"Rishabh Das","orcid":"https://orcid.org/0009-0004-1843-746X"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rishabh Das","raw_affiliation_strings":["Computer Engineering, University of Alabama in Huntsville, USA"],"affiliations":[{"raw_affiliation_string":"Computer Engineering, University of Alabama in Huntsville, USA","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068153705","display_name":"Thomas H. Morris","orcid":"https://orcid.org/0000-0002-4854-5419"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thomas Morris","raw_affiliation_strings":["Computer Engineering, University of Alabama in Huntsville, USA"],"affiliations":[{"raw_affiliation_string":"Computer Engineering, University of Alabama in Huntsville, USA","institution_ids":["https://openalex.org/I82495205"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103044958"],"corresponding_institution_ids":["https://openalex.org/I82495205"],"apc_list":null,"apc_paid":null,"fwci":5.414,"has_fulltext":false,"cited_by_count":52,"citation_normalized_percentile":{"value":0.95950022,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"10","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.8813513517379761},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.8014857172966003},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.7436042428016663},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.7347419261932373},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6945803165435791},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.684412956237793},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.633176326751709},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5642415285110474},{"id":"https://openalex.org/keywords/control-system-security","display_name":"Control system security","score":0.5443673729896545},{"id":"https://openalex.org/keywords/system-of-systems","display_name":"System of systems","score":0.4183668792247772},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.367426335811615},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1985059380531311},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19240400195121765},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1660730242729187},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.15850743651390076},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.137378990650177},{"id":"https://openalex.org/keywords/systems-design","display_name":"Systems design","score":0.12536853551864624},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.09576880931854248}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.8813513517379761},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.8014857172966003},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.7436042428016663},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.7347419261932373},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6945803165435791},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.684412956237793},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.633176326751709},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5642415285110474},{"id":"https://openalex.org/C172862783","wikidata":"https://www.wikidata.org/wiki/Q5165888","display_name":"Control system security","level":5,"score":0.5443673729896545},{"id":"https://openalex.org/C87912763","wikidata":"https://www.wikidata.org/wiki/Q7663737","display_name":"System of systems","level":3,"score":0.4183668792247772},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.367426335811615},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1985059380531311},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19240400195121765},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1660730242729187},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.15850743651390076},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.137378990650177},{"id":"https://openalex.org/C31352089","wikidata":"https://www.wikidata.org/wiki/Q3750474","display_name":"Systems design","level":2,"score":0.12536853551864624},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.09576880931854248},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3018981.3018988","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3018981.3018988","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd Annual Industrial Control System Security Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1552238199","https://openalex.org/W2012446724","https://openalex.org/W2077290416","https://openalex.org/W2123883345","https://openalex.org/W2162783010","https://openalex.org/W2162998067","https://openalex.org/W2324338818","https://openalex.org/W2545605985"],"related_works":["https://openalex.org/W2265199518","https://openalex.org/W2902958991","https://openalex.org/W2614996178","https://openalex.org/W2516092834","https://openalex.org/W2309980522","https://openalex.org/W2198908836","https://openalex.org/W2783141896","https://openalex.org/W2184855233","https://openalex.org/W4247152228","https://openalex.org/W2801513872"],"abstract_inverted_index":{"With":[0],"an":[1,100],"immense":[2],"number":[3],"of":[4,21,49,87,93,159,174,177,182],"threats":[5],"pouring":[6],"in":[7],"from":[8,39,140],"nation":[9],"states":[10],"and":[11,17,56,125,169],"hacktivists":[12],"as":[13,15],"well":[14],"terrorists":[16],"cybercriminals,":[18],"the":[19,40,47,50,74,94,141,157,172,175,183],"requirement":[20],"a":[22,27,109,151,160,165],"globally":[23],"secure":[24],"infrastructure":[25,89],"becomes":[26],"major":[28],"obligation.":[29],"Most":[30],"critical":[31,61,79,88],"infrastructures":[32],"were":[33],"primarily":[34],"designed":[35],"to":[36,46,59,70,73,122,128,132,147,164],"work":[37],"isolated":[38],"normal":[41],"communication":[42,75],"network,":[43],"but":[44],"due":[45],"advent":[48],"\"Smart":[51],"Grid\"":[52],"that":[53],"uses":[54],"advanced":[55],"intelligent":[57],"approaches":[58],"control":[60,112],"infrastructure,":[62],"it":[63,144],"is":[64,90,115,145],"necessary":[65,146],"for":[66,171],"these":[67],"cyber-physical":[68],"systems":[69,80],"have":[71,81],"access":[72],"system.":[76],"Consequently,":[77],"such":[78],"become":[82],"prime":[83],"targets;":[84],"hence":[85],"security":[86,102],"currently":[91],"one":[92],"most":[95],"challenging":[96],"research":[97],"problems.":[98],"Performing":[99],"extensive":[101],"analysis":[103],"involving":[104],"experiments":[105],"with":[106],"cyber-attacks":[107],"on":[108,180],"live":[110],"industrial":[111],"system":[113],"(ICS)":[114],"not":[116],"possible.":[117],"Therefore,":[118],"researchers":[119],"generally":[120],"resort":[121],"test":[123,142,167],"beds":[124],"complex":[126],"simulations":[127],"answer":[129],"questions":[130],"related":[131],"SCADA":[133,162],"systems.":[134,184],"Since":[135],"all":[136],"conclusions":[137],"are":[138],"drawn":[139],"bed,":[143],"perform":[148],"validation":[149],"against":[150],"physical":[152,166],"model.":[153],"This":[154],"paper":[155],"examines":[156],"fidelity":[158],"virtual":[161],"testbed":[163],"bed":[168],"allows":[170],"study":[173],"effects":[176],"cyber-":[178],"attacks":[179],"both":[181]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":11},{"year":2017,"cited_by_count":3}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-10-10T00:00:00"}
