A survey of security in SCADA networks: Current issues and future challenges

S Ghosh, S Sampalli - IEEE Access, 2019 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) systems are used for monitoring
industrial devices. However, their security faces the threat of being compromised due to the …

A survey on industrial Internet of Things: A cyber-physical systems perspective

H Xu, W Yu, D Griffith, N Golmie - Ieee access, 2018 - ieeexplore.ieee.org
The vision of Industry 4.0, otherwise known as the fourth industrial revolution, is the
integration of massively deployed smart computing and network technologies in industrial …

Low-cost, open source IoT-based SCADA system design using thinger. IO and ESP32 thing

LO Aghenta, MT Iqbal - Electronics, 2019 - mdpi.com
Supervisory Control and Data Acquisition (SCADA) is a technology for monitoring and
controlling distributed processes. SCADA provides real-time data exchange between a …

A hardware-in-the-loop water distribution testbed dataset for cyber-physical security testing

L Faramondi, F Flammini, S Guarino, R Setola - IEEE Access, 2021 - ieeexplore.ieee.org
This paper presents a dataset to support researchers in the validation process of solutions
such as Intrusion Detection Systems (IDS) based on artificial intelligence and machine …

Ics3fuzzer: A framework for discovering protocol implementation bugs in ics supervisory software by fuzzing

D Fang, Z Song, L Guan, P Liu, A Peng… - Proceedings of the 37th …, 2021 - dl.acm.org
The supervisory software is widely used in industrial control systems (ICSs) to manage field
devices such as PLC controllers. Once compromised, it could be misused to control or …

Open source SCADA system for advanced monitoring of industrial processes

DF Merchán, JA Peralta… - 2017 International …, 2017 - ieeexplore.ieee.org
Modern industries demand reliable supervision and control of every process involved in the
manufacturing. Computer integrated manufacturing (CIM) systems provide a reference frame …

Ransomware impact to SCADA systems and its scope to critical infrastructure

J Ibarra, UJ Butt, A Do, H Jahankhani… - 2019 IEEE 12th …, 2019 - ieeexplore.ieee.org
SCADA systems are being constantly migrated to modern information and communication
technologies (ICT)-based systems named cyber-physical systems. Unfortunately, this allows …

Evaluating machine learning approaches for cyber and physical anomalies in scada systems

L Faramondi, F Flammini, S Guarino… - … Conference on Cyber …, 2023 - ieeexplore.ieee.org
In recent years, machine learning (ML) techniques have been widely adopted as anomaly-
based Intrusion Detection System in order to evaluate cyber and physical attacks against …

[HTML][HTML] Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures

S Chockalingam, W Pieters, AMH Teixeira… - Journal of Information …, 2023 - Elsevier
Both intentional attacks and accidental technical failures can lead to abnormal behaviour in
components of industrial control systems. In our previous work, we developed a framework …

On the feasibility of device fingerprinting in industrial control systems

M Caselli, D Hadžiosmanović, E Zambon… - … Security: 8th International …, 2013 - Springer
Abstract As Industrial Control Systems (ICS) and standard IT networks are becoming one
heterogeneous entity, there has been an increasing effort in adjusting common security tools …