A review of research work on network-based scada intrusion detection systems

SVB Rakas, MD Stojanović… - IEEE Access, 2020 - ieeexplore.ieee.org
Specific intrusion detection systems (IDSs) are needed to secure modern supervisory control
and data acquisition (SCADA) systems due to their architecture, stringent real-time …

[HTML][HTML] Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security

S Maesschalck, V Giotsas, B Green, N Race - Computers & Security, 2022 - Elsevier
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of
traditional manufacturing and production technologies with IP communications. Legacy …

Looking back to look forward: Lessons learnt from cyber-attacks on industrial control systems

T Miller, A Staves, S Maesschalck, M Sturdee… - International Journal of …, 2021 - Elsevier
Since the 1980s, we have observed a range of cyberattacks targeting Industrial Control
Systems (ICS), some of which have impacted elements of critical national infrastructure …

Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures

PN Bahrami, A Dehghantanha, T Dargahi… - Journal of information …, 2019 - koreascience.kr
The need for cyber resilience is increasingly important in our technology-dependent society
where computing devices and data have been, and will continue to be, the target of cyber …

[HTML][HTML] Anomaly-based cyberattacks detection for smart homes: A systematic literature review

JII Araya, H Rifà-Pous - Internet of Things, 2023 - Elsevier
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …

Cyber-attack scoring model based on the offensive cybersecurity framework

K Kim, FA Alfouzan, H Kim - Applied Sciences, 2021 - mdpi.com
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …

PCaaD: Towards automated determination and exploitation of industrial systems

B Green, R Derbyshire, M Krotofil, W Knowles… - Computers & …, 2021 - Elsevier
Over the last decade, Programmable Logic Controllers (PLCs) have been increasingly
targeted by attackers to obtain control over industrial processes that support critical services …

A security risk taxonomy for large language models

E Derner, K Batistič, J Zahálka, R Babuška - arXiv preprint arXiv …, 2023 - arxiv.org
As large language models (LLMs) permeate more and more applications, an assessment of
their associated security risks becomes increasingly necessary. The potential for exploitation …

[HTML][HTML] Walking under the ladder logic: PLC-VBS: a PLC control logic vulnerability scanning tool

S Maesschalck, A Staves, R Derbyshire, B Green… - Computers & …, 2023 - Elsevier
Cyber security risk assessments provide a crucial starting point towards the understanding
of existing risk exposure, via which suitable mitigation strategies can be formed. Risk is …

Insights into organizational security readiness: Lessons learned from cyber-attack case studies

F Quader, VP Janeja - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
This paper focuses on understanding the characteristics of multiple types of cyber-attacks
through a comprehensive evaluation of case studies of real-world cyber-attacks. For each …