{"id":"https://openalex.org/W4283819702","doi":"https://doi.org/10.23919/cycon55549.2022.9811000","title":"The Design of Cyber-Physical Exercises (CPXS)","display_name":"The Design of Cyber-Physical Exercises (CPXS)","publication_year":2022,"publication_date":"2022-05-31","ids":{"openalex":"https://openalex.org/W4283819702","doi":"https://doi.org/10.23919/cycon55549.2022.9811000"},"language":"en","primary_location":{"id":"doi:10.23919/cycon55549.2022.9811000","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon55549.2022.9811000","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077516856","display_name":"Siddhant Shrivastava","orcid":null},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Siddhant Shrivastava","raw_affiliation_strings":["Singapore University of Technology and Design,iTrust Centre for Research in Cybersecurity","iTrust Centre for Research in Cybersecurity, Singapore University of Technology and Design"],"affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design,iTrust Centre for Research in Cybersecurity","institution_ids":["https://openalex.org/I152815399"]},{"raw_affiliation_string":"iTrust Centre for Research in Cybersecurity, Singapore University of Technology and Design","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018245890","display_name":"Francisco Furtado","orcid":"https://orcid.org/0000-0003-3621-0459"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Francisco Furtado","raw_affiliation_strings":["Singapore University of Technology and Design,iTrust Centre for Research in Cybersecurity","iTrust Centre for Research in Cybersecurity, Singapore University of Technology and Design"],"affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design,iTrust Centre for Research in Cybersecurity","institution_ids":["https://openalex.org/I152815399"]},{"raw_affiliation_string":"iTrust Centre for Research in Cybersecurity, Singapore University of Technology and Design","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019054688","display_name":"Mark Goh","orcid":null},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Mark Goh","raw_affiliation_strings":["Singapore University of Technology and Design,iTrust Centre for Research in Cybersecurity","iTrust Centre for Research in Cybersecurity, Singapore University of Technology and Design"],"affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design,iTrust Centre for Research in Cybersecurity","institution_ids":["https://openalex.org/I152815399"]},{"raw_affiliation_string":"iTrust Centre for Research in Cybersecurity, Singapore University of Technology and Design","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041431658","display_name":"Aditya P. Mathur","orcid":"https://orcid.org/0000-0002-9356-6286"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Aditya Mathur","raw_affiliation_strings":["Singapore University of Technology and Design,iTrust Centre for Research in Cybersecurity","iTrust Centre for Research in Cybersecurity, Singapore University of Technology and Design"],"affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design,iTrust Centre for Research in Cybersecurity","institution_ids":["https://openalex.org/I152815399"]},{"raw_affiliation_string":"iTrust Centre for Research in Cybersecurity, Singapore University of Technology and Design","institution_ids":["https://openalex.org/I152815399"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5077516856"],"corresponding_institution_ids":["https://openalex.org/I152815399"],"apc_list":null,"apc_paid":null,"fwci":2.1237,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.89637848,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"348","last_page":"366"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9728000164031982,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9681000113487244,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.7764440178871155},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5999297499656677},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.5994315147399902},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5599128603935242},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5493655800819397},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5225738286972046},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4626657962799072},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and control","score":0.43233299255371094},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15636450052261353}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.7764440178871155},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5999297499656677},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.5994315147399902},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5599128603935242},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5493655800819397},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5225738286972046},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4626657962799072},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.43233299255371094},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15636450052261353},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cycon55549.2022.9811000","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon55549.2022.9811000","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2243727816","https://openalex.org/W2340077410","https://openalex.org/W2549150182","https://openalex.org/W2766717610","https://openalex.org/W2905542721","https://openalex.org/W2954439267","https://openalex.org/W4200570960","https://openalex.org/W6690737040"],"related_works":["https://openalex.org/W2358245908","https://openalex.org/W4242728933","https://openalex.org/W2493430149","https://openalex.org/W2974890647","https://openalex.org/W4385452087","https://openalex.org/W4321484089","https://openalex.org/W2296060994","https://openalex.org/W4304097726","https://openalex.org/W2912641888","https://openalex.org/W4304097727"],"abstract_inverted_index":{"This":[0],"paper":[1],"explores":[2],"the":[3,84,120,137,164,178,199,218,225,237,241,271],"objectives,":[4],"tactics,":[5,262],"and":[6,12,72,80,89,95,100,124,135,157,169,176,185,196,231,243,249,255,263,275],"strategies":[7],"for":[8,29],"identifying,":[9],"planning,":[10],"conducting,":[11],"evaluating":[13],"an":[14],"international":[15],"cyber-physical":[16,48,214],"exercise":[17],"(CPX).":[18],"The":[19,62,160,187],"goal":[20],"of":[21,46,65,69,86,141,150,155,201,240],"a":[22,44,66,70,147,153],"CPX":[23,39],"is":[24,144],"to":[25,55,77,131,167,173,175,205,211,229,235,252,268],"improve":[26,177],"defense":[27,49],"capabilities":[28],"defending":[30],"national":[31],"critical":[32,110],"infrastructure":[33,111,234,251],"via":[34,146],"global":[35],"coordination.":[36],"Lessons":[37],"about":[38],"have":[40,223],"been":[41],"derived":[42],"from":[43,119,190,246,270],"series":[45],"annual":[47],"exercises":[50],"conducted":[51],"since":[52],"2015,":[53],"referred":[54],"as":[56],"Critical":[57],"Infrastructure":[58],"Security":[59],"Showdowns":[60],"(CISS).":[61],"cyber":[63],"range":[64],"CISS":[67,207,226],"consists":[68],"realistic":[71],"operational":[73,101],"enterprise":[74],"network":[75,250],"coupled":[76],"water":[78],"treatment":[79],"distribution":[81],"plants":[82],"in":[83,108,198,217],"form":[85,200],"physical":[87],"testbeds":[88],"digital":[90],"twins.":[91],"These":[92,221],"systems":[93,116],"simulate":[94],"integrate":[96],"information":[97],"technology":[98,102],"(IT)":[99],"(OT)":[103],"scenarios":[104,216],"that":[105],"are":[106,127,194],"ubiquitous":[107],"modern-day":[109],"controlled":[112],"by":[113,152],"industrial":[114],"control":[115],"(ICS).":[117],"Participants":[118],"red,":[121],"blue,":[122],"green,":[123],"white":[125],"teams":[126,166],"assigned":[128],"specific":[129,148],"roles":[130,143],"attack,":[132],"defend,":[133],"visualize,":[134],"manage":[136],"plant,":[138],"respectively.":[139],"Each":[140],"these":[142,191],"evaluated":[145],"set":[149],"metrics":[151],"panel":[154],"judges":[156],"automated":[158],"systems.":[159],"scoring":[161,253],"criteria":[162,254],"incentivize":[163],"red":[165],"design":[168,232],"launch":[170],"novel":[171,233],"attacks":[172],"contribute":[174],"cybersecurity":[179],"community\u2019s":[180],"knowledge":[181],"base":[182],"regarding":[183],"offense":[184],"defense.":[186],"lessons":[188],"distilled":[189],"positive-sum":[192],"games":[193],"analyzed":[195],"shared":[197],"post-event":[202],"reports.From":[203],"2015":[204],"2021,":[206],"has":[208],"constantly":[209],"evolved":[210],"mimic":[212],"contemporary":[213],"security":[215],"real":[219],"world.":[220],"evolutions":[222],"forced":[224],"organizing":[227],"team":[228],"adapt":[230],"support":[236],"changing":[238],"needs":[239],"event":[242],"its":[244],"stakeholders,":[245],"tooling,":[247],"logistics,":[248],"cross-disciplinary":[256],"collaboration.The":[257],"cited":[258],"reports":[259],"on":[260],"techniques,":[261],"procedures":[264],"will":[265],"be":[266],"valuable":[267],"stakeholders":[269],"military,":[272],"industry,":[273],"government,":[274],"academia.":[276]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5}],"updated_date":"2026-02-27T06:17:20.405678","created_date":"2025-10-10T00:00:00"}
