A review of research work on network-based scada intrusion detection systems
SVB Rakas, MD Stojanović… - IEEE Access, 2020 - ieeexplore.ieee.org
Specific intrusion detection systems (IDSs) are needed to secure modern supervisory control
and data acquisition (SCADA) systems due to their architecture, stringent real-time …
and data acquisition (SCADA) systems due to their architecture, stringent real-time …
[HTML][HTML] Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of
traditional manufacturing and production technologies with IP communications. Legacy …
traditional manufacturing and production technologies with IP communications. Legacy …
Looking back to look forward: Lessons learnt from cyber-attacks on industrial control systems
Since the 1980s, we have observed a range of cyberattacks targeting Industrial Control
Systems (ICS), some of which have impacted elements of critical national infrastructure …
Systems (ICS), some of which have impacted elements of critical national infrastructure …
Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures
The need for cyber resilience is increasingly important in our technology-dependent society
where computing devices and data have been, and will continue to be, the target of cyber …
where computing devices and data have been, and will continue to be, the target of cyber …
[HTML][HTML] Anomaly-based cyberattacks detection for smart homes: A systematic literature review
JII Araya, H Rifà-Pous - Internet of Things, 2023 - Elsevier
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …
the internet, enable remote monitoring, automation, and control. However, collecting …
Cyber-attack scoring model based on the offensive cybersecurity framework
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …
PCaaD: Towards automated determination and exploitation of industrial systems
B Green, R Derbyshire, M Krotofil, W Knowles… - Computers & …, 2021 - Elsevier
Over the last decade, Programmable Logic Controllers (PLCs) have been increasingly
targeted by attackers to obtain control over industrial processes that support critical services …
targeted by attackers to obtain control over industrial processes that support critical services …
A security risk taxonomy for large language models
As large language models (LLMs) permeate more and more applications, an assessment of
their associated security risks becomes increasingly necessary. The potential for exploitation …
their associated security risks becomes increasingly necessary. The potential for exploitation …
[HTML][HTML] Walking under the ladder logic: PLC-VBS: a PLC control logic vulnerability scanning tool
Cyber security risk assessments provide a crucial starting point towards the understanding
of existing risk exposure, via which suitable mitigation strategies can be formed. Risk is …
of existing risk exposure, via which suitable mitigation strategies can be formed. Risk is …
Insights into organizational security readiness: Lessons learned from cyber-attack case studies
F Quader, VP Janeja - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
This paper focuses on understanding the characteristics of multiple types of cyber-attacks
through a comprehensive evaluation of case studies of real-world cyber-attacks. For each …
through a comprehensive evaluation of case studies of real-world cyber-attacks. For each …