[HTML][HTML] Industrial cyber-physical systems protection: A methodological review
R Canonico, G Sperlì - Computers & Security, 2023 - Elsevier
Ubiquitous utilization of Information and Communication Technologies in modern
manufacturing plants has transformed them into Cyber-Physical Systems (CPSs), making …
manufacturing plants has transformed them into Cyber-Physical Systems (CPSs), making …
Detection and blocking of replay, false command, and false access injection commands in scada systems with modbus protocol
L Rajesh, P Satyanarayana - Security and Communication …, 2021 - search.proquest.com
Industrial control systems (ICS) are being used for surveillance and controlling numerous
industrial process plants in national critical infrastructures. Supervisory control and data …
industrial process plants in national critical infrastructures. Supervisory control and data …
Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective
Numerous sophisticated and nation-state attacks on Industrial Control Systems (ICSs) have
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …
Optimal multiple key‐based homomorphic encryption with deep neural networks to secure medical data transmission and diagnosis
Medical database classification problems can be considered as complex optimization
problems to assure the diagnosis support precisely. In healthcare, several computer …
problems to assure the diagnosis support precisely. In healthcare, several computer …
Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms
Modbus is considered the defacto standard of industrial control systems as obvious from the
fact that most vendors in the automation industry support Modbus protocol. Despite its wide …
fact that most vendors in the automation industry support Modbus protocol. Despite its wide …
Improving detection of false data injection attacks using machine learning with feature selection and oversampling
Critical infrastructures have recently been integrated with digital controls to support
intelligent decision making. Although this integration provides various benefits and …
intelligent decision making. Although this integration provides various benefits and …
Machine learning algorithm for detection of false data injection attack in power system
Electric grids are becoming smart due to the integration of Information and Communication
Technology (ICT) with the traditional grid. However, it can also attract various kinds of Cyber …
Technology (ICT) with the traditional grid. However, it can also attract various kinds of Cyber …
Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms
UO Obonna, FK Opara, CC Mbaocha, JKC Obichere… - Future Internet, 2023 - mdpi.com
Recently, the process control network (PCN) of oil and gas installation has been subjected
to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed …
to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed …
[HTML][HTML] Insider threat detection in cyber-physical systems: a systematic literature review
The rapid expansion of cyber-physical systems (CPSs) has introduced new security
challenges, leading to the emergence of various threats, attacks, and controls aimed at …
challenges, leading to the emergence of various threats, attacks, and controls aimed at …
Securing Cloud-Based Internet of Things: Challenges and Mitigations
The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a
paradigm shift in the digital landscape. However, these technological strides have also …
paradigm shift in the digital landscape. However, these technological strides have also …