Exposing hidden attackers in industrial control systems using micro-distortions
For industrial control systems (ICS), many existing defense solutions focus on detecting
attacks only when they make the system behave anomalously. Instead, in this work, we …
attacks only when they make the system behave anomalously. Instead, in this work, we …
Datascience in support of cybersecurity operations: Adaptable, robust and explainable anomaly detection for security analysts
A Dey - 2022 - theses.hal.science
To defend against sophisticated cyber-criminal organizations and APTs, IT system operators
should define and enforce strict security policies. However, defining and maintining perfect …
should define and enforce strict security policies. However, defining and maintining perfect …