{"id":"https://openalex.org/W3198258457","doi":"https://doi.org/10.1145/3474718.3474719","title":"Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed","display_name":"Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed","publication_year":2021,"publication_date":"2021-08-09","ids":{"openalex":"https://openalex.org/W3198258457","doi":"https://doi.org/10.1145/3474718.3474719","mag":"3198258457"},"language":"en","primary_location":{"id":"doi:10.1145/3474718.3474719","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3474718.3474719","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cyber Security Experimentation and Test Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024370085","display_name":"Hyeok-Ki Shin","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Hyeok-Ki Shin","raw_affiliation_strings":["The Affiliated Institute of ETRI, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"The Affiliated Institute of ETRI, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091855606","display_name":"Woomyo Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Woomyo Lee","raw_affiliation_strings":["The Affiliated Institute of ETRI, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"The Affiliated Institute of ETRI, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112052807","display_name":"Jeong-Han Yun","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jeong-Han Yun","raw_affiliation_strings":["The Affiliated Institute of ETRI, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"The Affiliated Institute of ETRI, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112135892","display_name":"Byung-Gil Min","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Byung-Gil Min","raw_affiliation_strings":["The Affiliated Institute of ETRI, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"The Affiliated Institute of ETRI, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5024370085"],"corresponding_institution_ids":["https://openalex.org/I142401562"],"apc_list":null,"apc_paid":null,"fwci":3.1885,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.91971436,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"36","last_page":"40"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.964991569519043},{"id":"https://openalex.org/keywords/contest","display_name":"CONTEST","score":0.8305310010910034},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.768080472946167},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7106977105140686},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.41482916474342346},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.41235822439193726},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.39082568883895874},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35429561138153076},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3435116112232208},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2960258722305298},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10781857371330261}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.964991569519043},{"id":"https://openalex.org/C2777582232","wikidata":"https://www.wikidata.org/wiki/Q5013414","display_name":"CONTEST","level":2,"score":0.8305310010910034},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.768080472946167},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7106977105140686},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.41482916474342346},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.41235822439193726},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.39082568883895874},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35429561138153076},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3435116112232208},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2960258722305298},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10781857371330261},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3474718.3474719","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3474718.3474719","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cyber Security Experimentation and Test Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2117435128","https://openalex.org/W2969330742","https://openalex.org/W2984333088","https://openalex.org/W2997993688","https://openalex.org/W3043921098"],"related_works":["https://openalex.org/W2076723621","https://openalex.org/W2150641169","https://openalex.org/W3123953333","https://openalex.org/W2904439179","https://openalex.org/W3161403725","https://openalex.org/W4223615774","https://openalex.org/W2977463399","https://openalex.org/W2355027202","https://openalex.org/W3141555268","https://openalex.org/W4401208620"],"abstract_inverted_index":{"Security":[0],"datasets":[1,66,99],"with":[2,53],"various":[3],"operating":[4],"characteristics":[5],"and":[6,37,80,111],"abnormal":[7],"situations":[8],"of":[9,57,124,130],"industrial":[10],"control":[11,21],"system":[12,22],"(ICS)":[13],"are":[14,67],"essential":[15],"to":[16,83,109],"develop":[17],"artificial":[18],"intelligence":[19],"(AI)-based":[20],"security":[23,40],"technology.":[24],"In":[25],"this":[26],"study,":[27],"we":[28,43],"built":[29],"a":[30,141],"hardware-in-the-loop":[31],"(HIL)-based":[32],"augmented":[33],"ICS":[34,39,115],"(HAI)":[35],"testbed":[36],"developed":[38,52,100],"datasets.":[41],"Here,":[42],"introduce":[44],"the":[45,54,58,97,122,125,131,135],"second":[46],"dataset":[47],"(HAI":[48,62],"21.03),":[49],"which":[50],"was":[51,74],"user":[55],"feedback":[56],"first":[59],"released":[60],"version":[61],"20.07).":[63],"All":[64],"HAI":[65,72,84,98,147],"publicly":[68],"available":[69],"at":[70],"https://github.com/icsdataset/hai.":[71],"21.03":[73],"expanded":[75],"by":[76],"adding":[77],"data":[78],"points":[79],"normal/attack":[81],"scenarios":[82],"20.07.":[85],"We":[86],"also":[87],"held":[88],"an":[89,107],"AI-based":[90],"anomaly":[91,116],"detection":[92,117],"contest":[93],"(HAICon":[94],"2020)":[95],"utilizing":[96],"so":[101],"far,":[102],"giving":[103],"many":[104],"AI":[105],"researchers":[106],"opportunity":[108],"discuss":[110],"share":[112],"ideas":[113],"for":[114],"research.":[118],"This":[119],"paper":[120],"presents":[121],"results":[123,129],"HAICon":[126],"2020.":[127],"The":[128],"top":[132],"teams":[133],"in":[134],"competition":[136],"can":[137],"be":[138],"used":[139],"as":[140],"performance":[142],"comparison":[143],"criterion":[144],"when":[145],"using":[146],"21.03.":[148]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":18},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-07T14:57:38.498316","created_date":"2025-10-10T00:00:00"}
