{"response":{"docs":[{"system_create_dtsi":"2026-05-19T14:02:12Z","system_modified_dtsi":"2026-05-19T14:03:19Z","has_model_ssim":["Article"],"id":"8c97ks31m","accessControl_ssim":["fd8e9da6-b57e-4a1c-88fd-78642c19730b"],"hasRelatedMediaFragment_ssim":["sx61dn967"],"hasRelatedImage_ssim":["sx61dn967"],"depositor_ssim":["mandalrt@ucmail.uc.edu"],"depositor_tesim":["mandalrt@ucmail.uc.edu"],"title_tesim":["Virtual cybersecurity testbeds for industrial Internet of Things"],"date_uploaded_dtsi":"2026-05-19T14:02:10Z","date_modified_dtsi":"2026-05-19T14:02:11Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.1515/9783111436548-012"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Mandalapu, Rohit"],"publisher_tesim":["De Gruyter"],"language_tesim":["English"],"description_tesim":["Modern industrial equipment are networked to interact with both internal and external systems, enabling automated decision-making with minimal or no human intervention. While this new environment creates efficiencies, it exposes the environment to cyber threats. This chapter explores the use of cybersecurity testbeds to study best practices in architecting and defending environments that contain industrial systems. Cybersecurity testbeds – physical, virtual, and hybrid – are used in different sectors for research and validation. Virtual testbeds hold promise as they enable design flexibility, reconfiguration, and scale to support various types of research studies. This chapter discusses the value of virtual cybersecurity testbeds and demonstrates a case study on the use of virtual testbeds using a simple industrial control system and a common attack. The concepts apply to more complex set ups and more complex attack structures. Virtual cybersecurity testbed can support researchers, practitioners, and educators interested in defending critical infrastructure environments and industrial systems."],"license_tesim":["http://opendatacommons.org/licenses/dbcl/1.0/"],"related_url_tesim":["https://www.degruyterbrill.com/document/doi/10.1515/9783111436548-012/html#Vancouver"],"thumbnail_path_ss":"/downloads/sx61dn967?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["sx61dn967"],"member_of_collections_ssim":["Rohit Mandalapu's Research Papers"],"member_of_collection_ids_ssim":["k930bz68p"],"file_set_ids_ssim":["sx61dn967"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"VIRTUAL CYBERSECURITY TESTBEDS FOR INDUSTRIAL INTERNET OF THINGS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["mandalrt@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["k930bz68p"],"nesting_collection__parent_ids_ssim":["k930bz68p"],"nesting_collection__pathnames_ssim":["k930bz68p/8c97ks31m"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1865625839385706496,"timestamp":"2026-05-19T14:04:07.046Z","score":0.00049999997},{"system_create_dtsi":"2025-01-17T22:03:58Z","system_modified_dtsi":"2025-01-17T22:05:29Z","has_model_ssim":["Article"],"id":"m326m3288","accessControl_ssim":["a7ce3ed4-de15-45a6-ba3c-8cea11df5d28"],"hasRelatedMediaFragment_ssim":["ww72bd058"],"hasRelatedImage_ssim":["ww72bd058"],"depositor_ssim":["mandalrt@ucmail.uc.edu"],"depositor_tesim":["mandalrt@ucmail.uc.edu"],"title_tesim":["Towards a Virtual Cloud-Based Smart Factory Testbed for Cybersecurity"],"date_uploaded_dtsi":"2025-01-17T22:03:56Z","date_modified_dtsi":"2025-01-17T22:03:56Z","isPartOf_ssim":["admin_set/default"],"journal_title_tesim":["2023 Congress in Computer Science, Computer Engineering, \u0026 Applied Computing (CSCE)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Mandalapu, Rohit","Said, Hazem"],"publisher_tesim":["IEEE"],"description_tesim":["Today's industrial equipment is connected over a network to communicate with external systems and make decisions without human intervention, making it vulnerable to cyberattacks and showing the importance of research. This study explored the implementation of a cloud-based virtual testbed for a smart factory for cybersecurity testing and research. As a first step, this paper reports on developing an environment with one programmable logic controller (PLC) simulating a conveyor belt setup. The study examined different virtualization platforms and network designs. In addition, it executed a denial-of-service attack and identified its signature indicators. The study found that VMware Workstation Pro is the most suitable virtualization platform and that network input and output are the DoS attack's signature indicators."],"license_tesim":["http://creativecommons.org/licenses/by/4.0/"],"date_created_tesim":["2023-07-27"],"related_url_tesim":["https://www.researchgate.net/publication/379720388_Towards_a_Virtual_Cloud-Based_Smart_Factory_Testbed_for_Cybersecurity","https://www.american-cse.org/csce2023-ieee/pdfs/CSCE2023-5LlpKs7cpb4k2UysbLCuOx/275900a909/275900a909.pdf","https://ieeexplore.ieee.org/abstract/document/10487458","https://www.computer.org/csdl/proceedings-article/csce/2023/275900a909/1W0gIUzTKfK"],"source_tesim":["2023 Congress in Computer Science, Computer Engineering, \u0026 Applied Computing (CSCE)"],"thumbnail_path_ss":"/downloads/ww72bd058?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["ww72bd058"],"member_of_collections_ssim":["Rohit Mandalapu's Research Papers"],"member_of_collection_ids_ssim":["k930bz68p"],"file_set_ids_ssim":["ww72bd058"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"TOWARDS A VIRTUAL CLOUDBASED SMART FACTORY TESTBED FOR CYBERSECURITY","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["mandalrt@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["k930bz68p"],"nesting_collection__parent_ids_ssim":["k930bz68p"],"nesting_collection__pathnames_ssim":["k930bz68p/m326m3288"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1821535403894636544,"timestamp":"2025-01-17T22:05:31.119Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Article","hits":2,"label":"Article"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Mandalapu, Rohit","hits":2,"label":"Mandalapu, Rohit"},{"value":"Said, Hazem","hits":1,"label":"Said, Hazem"}],"label":"Creator Sim"},{"name":"subject_sim","items":[],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":2,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"School of Information Technology","hits":2,"label":"School of Information Technology"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"De Gruyter","hits":1,"label":"De Gruyter"},{"value":"IEEE","hits":1,"label":"IEEE"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2023-07-27","hits":1,"label":"2023-07-27"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"k930bz68p","hits":2,"label":"k930bz68p"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":2,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":2,"first_page?":true,"last_page?":true}}}