Cargando…
Dataset of anomalies and malicious acts in a cyber-physical subsystem
This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5536820/ https://www.ncbi.nlm.nih.gov/pubmed/28795096 http://dx.doi.org/10.1016/j.dib.2017.07.038 |
_version_ | 1783254083867508736 |
---|---|
author | Laso, Pedro Merino Brosset, David Puentes, John |
author_facet | Laso, Pedro Merino Brosset, David Puentes, John |
author_sort | Laso, Pedro Merino |
collection | PubMed |
description | This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastructure. Described data consist of temporal series representing five operational scenarios – Normal, aNomalies, breakdown, sabotages, and cyber-attacks – corresponding to 15 different real situations. The dataset is publicly available in the .zip file published with the article, to investigate and compare faulty operation detection and characterization methods for cyber-physical systems. |
format | Online Article Text |
id | pubmed-5536820 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | Elsevier |
record_format | MEDLINE/PubMed |
spelling | pubmed-55368202017-08-09 Dataset of anomalies and malicious acts in a cyber-physical subsystem Laso, Pedro Merino Brosset, David Puentes, John Data Brief Engineering This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastructure. Described data consist of temporal series representing five operational scenarios – Normal, aNomalies, breakdown, sabotages, and cyber-attacks – corresponding to 15 different real situations. The dataset is publicly available in the .zip file published with the article, to investigate and compare faulty operation detection and characterization methods for cyber-physical systems. Elsevier 2017-07-20 /pmc/articles/PMC5536820/ /pubmed/28795096 http://dx.doi.org/10.1016/j.dib.2017.07.038 Text en © 2017 The Authors http://creativecommons.org/licenses/by/4.0/ This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Engineering Laso, Pedro Merino Brosset, David Puentes, John Dataset of anomalies and malicious acts in a cyber-physical subsystem |
title | Dataset of anomalies and malicious acts in a cyber-physical subsystem |
title_full | Dataset of anomalies and malicious acts in a cyber-physical subsystem |
title_fullStr | Dataset of anomalies and malicious acts in a cyber-physical subsystem |
title_full_unstemmed | Dataset of anomalies and malicious acts in a cyber-physical subsystem |
title_short | Dataset of anomalies and malicious acts in a cyber-physical subsystem |
title_sort | dataset of anomalies and malicious acts in a cyber-physical subsystem |
topic | Engineering |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5536820/ https://www.ncbi.nlm.nih.gov/pubmed/28795096 http://dx.doi.org/10.1016/j.dib.2017.07.038 |
work_keys_str_mv | AT lasopedromerino datasetofanomaliesandmaliciousactsinacyberphysicalsubsystem AT brossetdavid datasetofanomaliesandmaliciousactsinacyberphysicalsubsystem AT puentesjohn datasetofanomaliesandmaliciousactsinacyberphysicalsubsystem |