Cyber-physical systems security: Limitations, issues and future trends
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …
which can monitor and manipulate real objects and processes. They are closely related to …
A survey on industrial control system testbeds and datasets for security research
The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs)
open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore …
open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore …
Cyber-attacks detection in industrial systems using artificial intelligence-driven methods
Modern industrial systems and critical infrastructures are constantly exposed to malicious
cyber-attacks that are challenging and difficult to identify. Cyber-attacks can cause severe …
cyber-attacks that are challenging and difficult to identify. Cyber-attacks can cause severe …
A review of research works on supervised learning algorithms for SCADA intrusion detection and classification
Supervisory Control and Data Acquisition (SCADA) systems play a significant role in
providing remote access, monitoring and control of critical infrastructures (CIs) which …
providing remote access, monitoring and control of critical infrastructures (CIs) which …
Gryphon: a semi-supervised anomaly detection system based on one-class evolving spiking neural network
The backbone of the economy, security and sustainability of a state is inseparably linked to
the security of its critical infrastructure. Critical infrastructures define goods, systems or …
the security of its critical infrastructure. Critical infrastructures define goods, systems or …
Variational restricted Boltzmann machines to automated anomaly detection
Data-driven methods are implemented using particularly complex scenarios that reflect in-
depth perennial knowledge and research. Hence, the available intelligent algorithms are …
depth perennial knowledge and research. Hence, the available intelligent algorithms are …
Design and development of automated threat hunting in industrial control systems
M Arafune, S Rajalakshmi, L Jaldon… - … and other Affiliated …, 2022 - ieeexplore.ieee.org
Traditional industrial systems, eg, power plants, water treatment plants, etc., were built to
operate highly isolated and controlled capacity. Recently, Industrial Control Systems (ICSs) …
operate highly isolated and controlled capacity. Recently, Industrial Control Systems (ICSs) …
Unsupervised anomaly detection in multivariate time series with online evolving spiking neural networks
D Bäßler, T Kortus, G Gühring - Machine Learning, 2022 - Springer
With the increasing demand for digital products, processes and services the research area
of automatic detection of signal outliers in streaming data has gained a lot of attention. The …
of automatic detection of signal outliers in streaming data has gained a lot of attention. The …
Identifying data streams anomalies by evolving spiking restricted Boltzmann machines
Data streams are characterized by high volatility, and they drastically change in an
unpredictable way over time. In the typical case, newer data are the most important, as the …
unpredictable way over time. In the typical case, newer data are the most important, as the …
Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus
Automotive electronics is rapidly expanding. An average vehicle contains million lines of
software codes, running on 100 of electronic control units (ECUs), in supporting number of …
software codes, running on 100 of electronic control units (ECUs), in supporting number of …