Architecture and security of SCADA systems: A review

G Yadav, K Paul - International Journal of Critical Infrastructure Protection, 2021 - Elsevier
Pipeline bursting, production lines shut down, frenzy traffic, trains confrontation, the nuclear
reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU–these …

Licality—likelihood and criticality: Vulnerability risk prioritization through logical reasoning and deep learning

Z Zeng, Z Yang, D Huang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Security and risk assessment aims to prioritize detected vulnerabilities for remediation in a
computer networking system. The widely used expert-based risk prioritization approach, eg …

Vulnerability management in IIoT-based systems: What, why and how

G Yadav, K Paul, P Gauravaram - Secure and Trusted Cyber Physical …, 2022 - Springer
Abstract Industrial Control Systems (ICS) are characterized by large numbers of tightly
integrated, interdependent, and heterogeneous components in a network. They act as a …

AINTRUSION DETECTION SYSTEM IN SCADA NETWORK USING MACHINE LEARNING

HA Kadhim, AA Ibrahim - 2022 - scholarzest.com
Abstract Machine learning is a branch of artificial intelligence based on the idea that systems
can learn to identify patterns and make decisions with a minimum of human intervention. In …

Intrusion detection system in Scada network using machine learning

HA Al-Qaraghullee - 2022 - openaccess.altinbas.edu.tr
One of the most obvious features of any network is the extensive exchange of information
between users, which is used to detect malicious content. Network traffic refers to the data …

How the Energy Industry's Workplace Culture Impacts Critical Infrastructure Security

B Jones - 2020 - search.proquest.com
The purpose of this research was to analyze how the culture within the energy industry
impacts critical infrastructure security. The need for adequate security within critical …