{"entities":{"Q6693369":{"pageid":14412348,"ns":120,"title":"Item:Q6693369","lastrevid":54733955,"modified":"2026-01-29T20:20:56Z","type":"item","id":"Q6693369","labels":{"en":{"language":"en","value":"On Practical Realization of Evasion Attacks for Industrial Control Systems"}},"descriptions":{"en":{"language":"en","value":"Dataset published at Zenodo repository."}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"dae155fd0809a7906855cd4fa50dd7d71bed552b","datavalue":{"value":{"entity-type":"item","numeric-id":56885,"id":"Q56885"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6693369$89DC30BC-DCB5-498B-B742-7098EEC88F60","rank":"normal"}],"P1459":[{"mainsnak":{"snaktype":"value","property":"P1459","hash":"a77413d24af92a5c20621e457f1596307e1962bf","datavalue":{"value":"Dataset related to the research paper \"On Practical Realization of Evasion Attacks for Industrial Control Systems\" published at RICSS 2024 workshop in conjunction with ACM CCS.  When using the code or the data please cite our work, you can find the bibtex entry in our github repository.","type":"string"},"datatype":"string"},"type":"statement","id":"Q6693369$7553E7A0-BCD2-4F1C-B4E0-6CE72DFADC2C","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"da39a8db929c85113bf984d8461e36d68d53cf60","datavalue":{"value":{"time":"+2024-09-05T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q6693369$4AB631DE-5092-4373-89E6-2A50A863FA79","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"e0e42981abc7850601284cac622f5b7cb2e9c9d7","datavalue":{"value":{"entity-type":"item","numeric-id":6693365,"id":"Q6693365"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6693369$569974C2-C17F-4783-BB08-D70EA50E057C","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"d4616872183332b3e3eaf2f04accb9a43bb7df76","datavalue":{"value":{"entity-type":"item","numeric-id":6693366,"id":"Q6693366"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6693369$861ACE04-2B46-4819-A11C-3032E66A5C81","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"2ee86ac31d6e5a675dc2a5d6b2b1aedbe7fce47e","datavalue":{"value":{"entity-type":"item","numeric-id":6693367,"id":"Q6693367"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6693369$384C3336-0920-4E79-A5D8-F21F5FDEEFFC","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"f426a691d28011c39627d8bf4e8430ee6555444f","datavalue":{"value":{"entity-type":"item","numeric-id":129801,"id":"Q129801"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6693369$8D57C6A7-6D9E-40B6-8A8E-0F6819B292D8","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"fe7fc98cd56c03cf724b9d9e30c0e877da2067f0","datavalue":{"value":{"entity-type":"item","numeric-id":6693368,"id":"Q6693368"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6693369$2D90854C-604A-4FC7-B545-3C496ED81C50","rank":"normal"}],"P227":[{"mainsnak":{"snaktype":"value","property":"P227","hash":"10c28372d91af0b14d4cecfce5ddabd505144ab8","datavalue":{"value":"13692004","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q6693369$0612F620-5E07-45B2-A160-C3A2C061AE14","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"e3f007a8da887938cea81f94d6777924875f7135","datavalue":{"value":"10.5281/zenodo.13692004","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q6693369$8BEBCA10-643F-4399-834B-F274CEC24593","rank":"normal"}],"P163":[{"mainsnak":{"snaktype":"value","property":"P163","hash":"45fcd4163b5f33e6e8c784f5522d7246c0a1a61e","datavalue":{"value":{"entity-type":"item","numeric-id":57056,"id":"Q57056"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6693369$83F1C827-2AE7-41CD-A415-7FF5DD5CBDC3","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"d1e8073b72a070520efd3d14d4b3d2d3d03859e2","datavalue":{"value":{"entity-type":"item","numeric-id":5984635,"id":"Q5984635"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6693369$A70430B2-FBC9-4394-B6A5-471D4A63EB99","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"On Practical Realization of Evasion Attacks for Industrial Control Systems","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/On_Practical_Realization_of_Evasion_Attacks_for_Industrial_Control_Systems"}}}}}