{"id":"https://openalex.org/W2805733812","doi":"https://doi.org/10.1145/3196494.3201589","title":"POSTER","display_name":"POSTER","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2805733812","doi":"https://doi.org/10.1145/3196494.3201589","mag":"2805733812"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3201589","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3201589","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071326404","display_name":"Seungoh Choi","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Seungoh Choi","raw_affiliation_strings":["The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea"],"affiliations":[{"raw_affiliation_string":"The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087712107","display_name":"Woomyo Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Woomyo Lee","raw_affiliation_strings":["The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea"],"affiliations":[{"raw_affiliation_string":"The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024370085","display_name":"Hyeok-Ki Shin","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyeok-Ki Shin","raw_affiliation_strings":["The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea"],"affiliations":[{"raw_affiliation_string":"The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112052807","display_name":"Jeong-Han Yun","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jeong-Han Yun","raw_affiliation_strings":["The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea"],"affiliations":[{"raw_affiliation_string":"The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054505447","display_name":"Sin-Kyu Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sin-Kyu Kim","raw_affiliation_strings":["The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea"],"affiliations":[{"raw_affiliation_string":"The Affiliated Institute of ETRI, Daejeon, Rebublic of Korea","institution_ids":["https://openalex.org/I142401562"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5071326404"],"corresponding_institution_ids":["https://openalex.org/I142401562"],"apc_list":null,"apc_paid":null,"fwci":0.1629,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.56968925,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"829","last_page":"831"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7053965330123901},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6141411066055298},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6013747453689575},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5875717401504517},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.580722451210022},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5069496631622314},{"id":"https://openalex.org/keywords/factory","display_name":"Factory (object-oriented programming)","score":0.497861385345459},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.45934778451919556},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.42322778701782227},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38132330775260925},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37042734026908875},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08690282702445984}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7053965330123901},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6141411066055298},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6013747453689575},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5875717401504517},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.580722451210022},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5069496631622314},{"id":"https://openalex.org/C40149104","wikidata":"https://www.wikidata.org/wiki/Q5620977","display_name":"Factory (object-oriented programming)","level":2,"score":0.497861385345459},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.45934778451919556},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.42322778701782227},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38132330775260925},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37042734026908875},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08690282702445984},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3196494.3201589","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3201589","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W195047088","https://openalex.org/W622304541","https://openalex.org/W2486864234","https://openalex.org/W2617969526","https://openalex.org/W2768947629","https://openalex.org/W3189981105"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W2384486034","https://openalex.org/W2546638913","https://openalex.org/W2209816623","https://openalex.org/W2968885840","https://openalex.org/W2963077982","https://openalex.org/W2008822734","https://openalex.org/W2325500789","https://openalex.org/W3135700974","https://openalex.org/W4313307484"],"abstract_inverted_index":{"Cyber-physical":[0],"systems":[1],"(CPSs)":[2],"are":[3,29,70],"used":[4],"in":[5],"a":[6,82,88,106],"variety":[7],"of":[8,56,97],"domains":[9],"such":[10],"as":[11],"critical":[12],"infrastructure,":[13],"smart":[14],"factory,":[15],"transportation,":[16],"etc.":[17],"Since":[18],"dependable":[19],"CPSs":[20,35],"tend":[21],"to":[22,34,46,61,72],"be":[23,123],"configured":[24],"for":[25,64,92],"specific":[26],"tasks":[27],"that":[28,52,86],"performed":[30],"repeatedly,":[31],"security":[32],"threats":[33],"have":[36],"started":[37],"increasing.":[38],"To":[39],"enhance":[40],"CPS":[41,65,93],"security,":[42,66,94],"it":[43],"is":[44],"necessary":[45,71],"realistically":[47],"reproduce":[48],"and":[49,105,119],"test":[50,120],"scenarios":[51,118],"reflect":[53],"the":[54,57,74,114],"characteristics":[55],"target":[58],"system.":[59],"Prior":[60],"developing":[62],"technologies":[63],"individual":[67],"experimental":[68,90],"environments":[69],"evaluate":[73],"developed":[75],"technologies.":[76],"In":[77],"this":[78],"paper,":[79],"we":[80],"propose":[81],"Controller-in-the-Middle":[83],"(CitM)":[84],"scheme":[85],"provides":[87],"flexible":[89],"environment":[91,121],"which":[95],"consists":[96],"an":[98],"independent":[99,111],"process":[100,108],"exchanged":[101],"between":[102],"field":[103],"devices":[104],"complex":[107],"combining":[109],"different":[110],"processes.":[112],"Using":[113],"proposed":[115],"scheme,":[116],"various":[117],"can":[122],"reproduced":[124],"flexibly.":[125]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2018-06-13T00:00:00"}
