A survey on industrial control system testbeds and datasets for security research
The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs)
open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore …
open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore …
[HTML][HTML] Security of smart manufacturing systems
N Tuptuk, S Hailes - Journal of manufacturing systems, 2018 - Elsevier
A revolution in manufacturing systems is underway: substantial recent investment has been
directed towards the development of smart manufacturing systems that are able to respond …
directed towards the development of smart manufacturing systems that are able to respond …
[PDF][PDF] You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
To subvert recent advances in perimeter and host security, the attacker community has
developed and employed various attack vectors to make a malware much stealthier than …
developed and employed various attack vectors to make a malware much stealthier than …
A Systematic Literature Review on RAMS analysis for critical infrastructures protection
Abstract Reliability, Availability, Maintainability, and Safety/Security (RAMS) analysis of
Critical Infrastructures (CIs) can be applied to investigate their performance subjected to …
Critical Infrastructures (CIs) can be applied to investigate their performance subjected to …
Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems
Abstract Industrial Internet of Things (IIoT) networks involves heterogeneous technological
and manufacturing services and devices. The communication and data exchange …
and manufacturing services and devices. The communication and data exchange …
Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks
We outline an anomaly detection method for industrial control systems (ICS) that combines
the analysis of network package contents that are transacted between ICS nodes and their …
the analysis of network package contents that are transacted between ICS nodes and their …
Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security
The industrial control systems are facing an increasing number of sophisticated cyber
attacks that can have very dangerous consequences on humans and their environments. In …
attacks that can have very dangerous consequences on humans and their environments. In …
A survey of intrusion detection on industrial control systems
Y Hu, A Yang, H Li, Y Sun… - International Journal of …, 2018 - journals.sagepub.com
The modern industrial control systems now exhibit an increasing connectivity to the
corporate Internet technology networks so as to make full use of the rich resource on the …
corporate Internet technology networks so as to make full use of the rich resource on the …
Towards security-aware virtual environments for digital twins
Digital twins open up new possibilities in terms of monitoring, simulating, optimizing and
predicting the state of cyber-physical systems (CPSs). Furthermore, we argue that a fully …
predicting the state of cyber-physical systems (CPSs). Furthermore, we argue that a fully …
Anomaly-based intrusion detection in industrial data with SVM and random forests
SDD Anton, S Sinha… - … International conference on …, 2019 - ieeexplore.ieee.org
Attacks on industrial enterprises are increasing in number as well as in effect. Since the
introduction of industrial control systems in the 1970's, industrial networks have been the …
introduction of industrial control systems in the 1970's, industrial networks have been the …