[1] [n.d.]. Kolmogorov-Smirnov test on 2 samples. https://docs.scipy.org/doc/scipy/ reference/generated/scipy.stats.ks_2samp.html, Last Accessed on : 2020-07-20. [2] Chuadhry Mujeeb Ahmed, Martin Ochoa, Jianying Zhou, Aditya P Mathur, Rizwan Qadeer, Carlos Murguia, and Justin Ruths. 2018. Noiseprint: Attack detection using sensor and process noise fingerprint in cyber physical systems. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security. 483-497. [3] Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, and Aditya Mathur. 2017. WADI: A Water Distribution Testbed for Research in the Design of Secure Cyber Physical Systems. In Proceedings of the Workshop on Cyber-Physical Systems for Smart Water Networks). ACM. [4] Cheng Feng, Venkata Reddy Palleti, Aditya Mathur, and Deeph Chana. 2019. A Systematic Framework to Generate Invariants for Anomaly Detection in In dustrial Control Systems.. In Proceedings of the Network and Distributed System Security Symposium(NDSS). [5] iTrust, SUTD. 2017. WADI datatset. https://itrust.sutd.edu.sg/itrust-labs_ datasets/dataset_info/, Last accessed on: 2020-06-30. [6] Moshe Kravchik and Asaf Shabtai. 2019. Efficient cyber attacks detection in industrial control systems using lightweight neural networks. arXiv preprint arXiv:1907.01216 (2019). [7] Alex Krizhevsky. 2009. Learning multiple layers of features from tiny images. Technical Report. [8] A. P. Mathur and N. O. Tippenhauer. 2016. SWaT: a water treatment testbed for research and training on ICS security. In 2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater). 31-36. [9] R. Taormina, S. Galelli, H.C. Douglas, N. O. Tippenhauer, E. Salomons, and A. Ostfeld. 2019. A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems. Environmental Modelling Software. Environmental Modelling Software 112 (02 2019), 46-51. [10] Riccardo Taormina, Stefano Galelli, Nils Ole Tippenhauer, Elad Salomons, Avi Ostfeld, Demetrios G Eliades, et al. 2018. Battle of the attack detection algo rithms: Disclosing cyber attacks on water distribution networks. Journal of Water Resources Planning and Management 144, 8 (2018), 04018048. [11] Sharon Weinberger. 2011. Computer security: Is this the start of cyberwarfare? Nature 174 (June 2011), 142-145. [12] Giulio Zizzo, Chris Hankin, Sergio Maffeis, and Kevin Jones. 2019. Intrusion detection for industrial control systems: Evaluation analysis and adversarial attacks. arXiv preprint arXiv:1911.04278 (2019).