A systematic review of the state of cyber-security in water systems

N Tuptuk, P Hazell, J Watson, S Hailes - Water, 2021 - mdpi.com
Critical infrastructure systems are evolving from isolated bespoke systems to those that use
general-purpose computing hosts, IoT sensors, edge computing, wireless networks and …

A survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study

D Ramotsoela, A Abu-Mahfouz, G Hancke - Sensors, 2018 - mdpi.com
The increased use of Industrial Wireless Sensor Networks (IWSN) in a variety of different
applications, including those that involve critical infrastructure, has meant that adequately …

[HTML][HTML] Anomaly classification in industrial internet of things: a review

M Rodríguez, DP Tobón, D Múnera - Intelligent Systems with Applications, 2023 - Elsevier
The fourth industrial revolution (Industry 4.0) has the potential to provide real-time, secure,
and autonomous manufacturing environments. The Industrial Internet of Things (IIoT) is a …

Attack detection in water distribution systems using machine learning

DT Ramotsoela, GP Hancke… - Human-centric Computing …, 2019 - Springer
The threat to critical water system infrastructure has increased in recent years as is evident
from the increasing number of reported attacks against these systems. Preventative security …

[HTML][HTML] Integrated management of safety and security in Seveso sites-sociotechnical perspectives

M Ylönen, A Tugnoli, G Oliva, J Heikkilä, M Nissilä… - Safety science, 2022 - Elsevier
The call for integrated management of safety and security (IMSS) derives from intensification
of digitalisation development and the increased reliance on information communication …

Evaluation of machine learning algorithms for anomaly detection in industrial networks

G Bernieri, M Conti, F Turrin - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
The cyber-physical security of Industrial Control Systems (ICSs) represents an actual and
worthwhile research topic. In this paper, we compare and evaluate different Machine …

Anomaly detection methods for IIoT networks

L Zhou, H Guo - … on Service Operations and Logistics, and …, 2018 - ieeexplore.ieee.org
IIoT networks are different from general IT networks such as office or business networks
where multiple various types of applications, protocols and traffic profiles are presented, and …

Classifying network abnormalities into faults and attacks in IoT-based cyber physical systems using machine learning

G Tertytchny, N Nicolaou, MK Michael - Microprocessors and Microsystems, 2020 - Elsevier
Abstract Cyber Physical Systems (CPS) integrate physical processes with electronic
computing devices and digital communication channels. Their proper operation might be …

Covert channels-based stealth attacks in industry 4.0

C Alcaraz, G Bernieri, F Pascucci, J Lopez… - IEEE Systems …, 2019 - ieeexplore.ieee.org
Industry 4.0 advent opens several cyber-threats scenarios originally designed for classic
information technology (IT), drawing the attention to serious risks for the modern industrial …

A time-series self-supervised learning approach to detection of cyber-physical attacks in water distribution systems

H Mahmoud, W Wu, MM Gaber - Energies, 2022 - mdpi.com
Water Distribution System (WDS) threats have significantly grown following the Maroochy
shire incident, as evidenced by proofed attacks on water premises. As a result, in addition to …