Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

A survey on industrial control system testbeds and datasets for security research

M Conti, D Donadel, F Turrin - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs)
open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore …

Cyber-attacks detection in industrial systems using artificial intelligence-driven methods

W Wang, F Harrou, B Bouyeddou, SM Senouci… - International journal of …, 2022 - Elsevier
Modern industrial systems and critical infrastructures are constantly exposed to malicious
cyber-attacks that are challenging and difficult to identify. Cyber-attacks can cause severe …

A review of research works on supervised learning algorithms for SCADA intrusion detection and classification

OA Alimi, K Ouahada, AM Abu-Mahfouz, S Rimer… - Sustainability, 2021 - mdpi.com
Supervisory Control and Data Acquisition (SCADA) systems play a significant role in
providing remote access, monitoring and control of critical infrastructures (CIs) which …

Gryphon: a semi-supervised anomaly detection system based on one-class evolving spiking neural network

K Demertzis, L Iliadis, I Bougoudis - Neural Computing and Applications, 2020 - Springer
The backbone of the economy, security and sustainability of a state is inseparably linked to
the security of its critical infrastructure. Critical infrastructures define goods, systems or …

Variational restricted Boltzmann machines to automated anomaly detection

K Demertzis, L Iliadis, E Pimenidis, P Kikiras - Neural Computing and …, 2022 - Springer
Data-driven methods are implemented using particularly complex scenarios that reflect in-
depth perennial knowledge and research. Hence, the available intelligent algorithms are …

Design and development of automated threat hunting in industrial control systems

M Arafune, S Rajalakshmi, L Jaldon… - … and other Affiliated …, 2022 - ieeexplore.ieee.org
Traditional industrial systems, eg, power plants, water treatment plants, etc., were built to
operate highly isolated and controlled capacity. Recently, Industrial Control Systems (ICSs) …

Unsupervised anomaly detection in multivariate time series with online evolving spiking neural networks

D Bäßler, T Kortus, G Gühring - Machine Learning, 2022 - Springer
With the increasing demand for digital products, processes and services the research area
of automatic detection of signal outliers in streaming data has gained a lot of attention. The …

Identifying data streams anomalies by evolving spiking restricted Boltzmann machines

L **ng, K Demertzis, J Yang - Neural Computing and Applications, 2020 - Springer
Data streams are characterized by high volatility, and they drastically change in an
unpredictable way over time. In the typical case, newer data are the most important, as the …

Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus

HK Kalutarage, MO Al-Kadri, M Cheah… - Proceedings of the 3rd …, 2019 - dl.acm.org
Automotive electronics is rapidly expanding. An average vehicle contains million lines of
software codes, running on 100 of electronic control units (ECUs), in supporting number of …