[HTML][HTML] A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

A systematic review of cyber-resilience assessment frameworks

DAS Estay, R Sahay, MB Barfod, CD Jensen - Computers & security, 2020 - Elsevier
Cyber-attacks are regarded as one of the most serious threats to businesses worldwide.
Organizations dependent on Information Technology (IT) derive value not only from …

Detecting cyberattacks using anomaly detection in industrial control systems: A federated learning approach

TT Huong, TP Bac, DM Long, TD Luong, NM Dan… - Computers in …, 2021 - Elsevier
In recent years, the rapid development and wide application of advanced technologies have
profoundly impacted industrial manufacturing, leading to smart manufacturing (SM) …

Current cyber-defense trends in industrial control systems

JE Rubio, C Alcaraz, R Roman, J Lopez - Computers & Security, 2019 - Elsevier
Abstract Advanced Persistent Threats (APTs) have become a serious hazard for any critical
infrastructure, as a single solution to protect all industrial assets from these complex attacks …

Elegant: Security of critical infrastructures with digital twins

B Sousa, M Arieiro, V Pereira, J Correia… - IEEE …, 2021 - ieeexplore.ieee.org
The past years have witnessed an increasing interest and concern regarding the
development of security monitoring and management mechanisms for Critical …

Combining k-means and xgboost models for anomaly detection using log datasets

J Henriques, F Caldeira, T Cruz, P Simões - Electronics, 2020 - mdpi.com
Computing and networking systems traditionally record their activity in log files, which have
been used for multiple purposes, such as troubleshooting, accounting, post-incident …

An adaptive trust boundary protection for IIoT networks using deep-learning feature-extraction-based semisupervised model

MM Hassan, S Huda, S Sharmeen… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
The rapid development of Internet of Things (IoT) platforms provides the industrial domain
with many critical solutions, such as joint venture virtual production systems. However, the …

Machine learning for reliable network attack detection in SCADA systems

RL Perez, F Adamsky, R Soua… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Critical Infrastructures (CIs) use Supervisory Control And Data Acquisition (SCADA) systems
for remote control and monitoring. Sophisticated security measures are needed to address …

Study on the reference architecture and assessment framework of industrial internet platform

J Li, JJ Qiu, Y Zhou, S Wen, KQ Dou, Q Li - Ieee Access, 2020 - ieeexplore.ieee.org
With the continuous innovation of new-generation information technology and its
accelerated integration with manufacturing industry, industrial internet platforms (IIPs) are …

Zero Trust Implementation in the Emerging Technologies Era: Survey

AI Weinberg, K Cohen - arxiv preprint arxiv:2401.09575, 2024 - arxiv.org
This paper presents a comprehensive analysis of the shift from the traditional perimeter
model of security to the Zero Trust (ZT) framework, emphasizing the key points in the …