[HTML][HTML] Industrial cyber-physical systems protection: A methodological review

R Canonico, G Sperlì - Computers & Security, 2023 - Elsevier
Ubiquitous utilization of Information and Communication Technologies in modern
manufacturing plants has transformed them into Cyber-Physical Systems (CPSs), making …

Detection and blocking of replay, false command, and false access injection commands in scada systems with modbus protocol

L Rajesh, P Satyanarayana - Security and Communication …, 2021 - search.proquest.com
Industrial control systems (ICS) are being used for surveillance and controlling numerous
industrial process plants in national critical infrastructures. Supervisory control and data …

Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective

M Asiri, N Saxena, R Gjomemo, P Burnap - ACM transactions on cyber …, 2023 - dl.acm.org
Numerous sophisticated and nation-state attacks on Industrial Control Systems (ICSs) have
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …

Optimal multiple key‐based homomorphic encryption with deep neural networks to secure medical data transmission and diagnosis

JA Alzubi, OA Alzubi, M Beseiso, AK Budati… - Expert …, 2022 - Wiley Online Library
Medical database classification problems can be considered as complex optimization
problems to assure the diagnosis support precisely. In healthcare, several computer …

Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms

A Rahman, G Mustafa, AQ Khan, M Abid… - International Journal of …, 2022 - Elsevier
Modbus is considered the defacto standard of industrial control systems as obvious from the
fact that most vendors in the automation industry support Modbus protocol. Despite its wide …

Improving detection of false data injection attacks using machine learning with feature selection and oversampling

A Kumar, N Saxena, S Jung, BJ Choi - Energies, 2021 - mdpi.com
Critical infrastructures have recently been integrated with digital controls to support
intelligent decision making. Although this integration provides various benefits and …

Machine learning algorithm for detection of false data injection attack in power system

A Kumar, N Saxena, BJ Choi - 2021 International Conference …, 2021 - ieeexplore.ieee.org
Electric grids are becoming smart due to the integration of Information and Communication
Technology (ICT) with the traditional grid. However, it can also attract various kinds of Cyber …

Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms

UO Obonna, FK Opara, CC Mbaocha, JKC Obichere… - Future Internet, 2023 - mdpi.com
Recently, the process control network (PCN) of oil and gas installation has been subjected
to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed …

[HTML][HTML] Insider threat detection in cyber-physical systems: a systematic literature review

MN Al-Mhiqani, T Alsboui, T Al-Shehari… - Computers and …, 2024 - Elsevier
The rapid expansion of cyber-physical systems (CPSs) has introduced new security
challenges, leading to the emergence of various threats, attacks, and controls aimed at …

Securing Cloud-Based Internet of Things: Challenges and Mitigations

N Singh, R Buyya, H Kim - arXiv preprint arXiv:2402.00356, 2024 - arxiv.org
The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a
paradigm shift in the digital landscape. However, these technological strides have also …