A cyber-physical model for SCADA system and its intrusion detection

C Sheng, Y Yao, Q Fu, W Yang - Computer Networks, 2021 - Elsevier
Abstract Supervisory Control and Data Acquisition (SCADA) systems are becoming
increasingly susceptible to the sophisticated and targeted cyber attacks which are typically …

Unknown attack traffic classification in scada network using heuristic clustering technique

C Sheng, Y Yao, W Li, W Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Attack Traffic Classification (ATC) technique is an essential tool for Industrial Control System
(ICS) network security, which can be widely used in active defense, situational awareness …

Detecting data injection attacks in ROS systems using machine learning

RA Antunes, BL Dalmazo… - 2022 Latin American …, 2022 - ieeexplore.ieee.org
In recent decades, there have been numerous technological advances that have allowed
robots to share more and more space with humans. However, these systems are built on top …

Detecting covert channel attacks on cyber‐physical systems

H Li, D Chasaki - IET Cyber‐Physical Systems: Theory & …, 2024 - Wiley Online Library
Cyberattacks on cyber‐physical systems (CPS) have the potential to cause widespread
disruption and affect the safety of millions of people. Machine learning can be an effective …

How to fingerprint attack traffic against industrial control system network

C Sheng, Y Yao, W Yang, Y Liu… - 2019 1st International …, 2019 - ieeexplore.ieee.org
Fingerprinting techniques have been widely used in the security field. However, due to the
complexity and heterogeneousness of the Industrial Control System (ICS) network, there is …

Machine learning in industrial control system security: A survey

D Jiang, J Zhao - Chinese Intelligent Systems Conference, 2019 - Springer
Industrial control system (ICS) is becoming more and more open to the outside world for the
advancement of Industrial Internet, which means people can have access to the industrial …

Honeyeye: A network traffic collection framework for distributed ICS honeynets

C Sheng, Y Yao, D Li, H An… - 2020 IEEE Intl Conf on …, 2020 - ieeexplore.ieee.org
The honeynet, as an important security resource, is increasingly used in the industrial field in
order to detect, analyze, and prevent network attacks against industrial control systems …

[PDF][PDF] Detecçao de Ataques de Injeçao de Dados em Sistemas ROS via Anomalias no Trafego de Rede

RA Antunes - 2023 - sistemas.furg.br
Nas últimas décadas, inúmeros avanços tecnológicos permitiram aos robôs compartilharem
ainda mais espaço com os seres humanos. Os robôs estao cada vez mais inseridos na …

Detección de intrusiones en redes industriales

A Insfrán, F López-Pires, B Barán… - … (CACIC)(La Rioja, 3 al 6 …, 2023 - sedici.unlp.edu.ar
Ataques cibernéticos a sistemas industriales de infraestructura crítica son una realidad en la
actualidad y sus consecuencias constituyen un riesgo a la continuidad de los negocios, la …

Detecçao de Ataques de Injeçao de Dados no Tráfego de Rede de Sistemas ROS

R Antunes, BL Dalmazo, P Drews - … de Segurança da Informação e de …, 2022 - sol.sbc.org.br
Resumo O Robot Operating System (ROS) é um dos mais populares softwares voltados ao
desenvolvimento e pesquisa em robótica. Entretanto, estudos têm demonstrado diversos …