A review of anomaly detection strategies to detect threats to cyber-physical systems
N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …
components. CPS has experienced rapid growth over the past decade in fields as disparate …
[HTML][HTML] Anomaly detection using invariant rules in Industrial Control Systems
Abstract Industrial Control Systems (ICS) are intelligent control systems that integrate
computing, physical processes, and communication to manage critical infrastructures such …
computing, physical processes, and communication to manage critical infrastructures such …
[HTML][HTML] A black-box adversarial attack on demand side management
Demand side management (DSM) contributes to the industry's transition to renewables by
shifting electricity consumption in time while maintaining feasible operations. Machine …
shifting electricity consumption in time while maintaining feasible operations. Machine …
Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach
The era of the Industrial Internet of Things has led to an escalating menace of cyber-physical
manufacturing systems (CPMSs) to cyber-attacks. Presently, the field of intrusion detection …
manufacturing systems (CPMSs) to cyber-attacks. Presently, the field of intrusion detection …
[HTML][HTML] Leveraging Swarm Intelligence for Invariant Rule Generation and Anomaly Detection in Industrial Control Systems
Y Song, H Huang, H Wang, Q Wei - Applied Sciences, 2024 - mdpi.com
Industrial control systems (ICSs), which are fundamental to the operation of critical
infrastructure, face increasingly sophisticated security threats due to the integration of …
infrastructure, face increasingly sophisticated security threats due to the integration of …
A real-time network based anomaly detection in industrial control systems
F Zare, P Mahmoudi-Nasr, R Yousefpour - International Journal of Critical …, 2024 - Elsevier
Data manipulation attacks targeting network traffic of SCADA systems may compromise the
reliability of an Industrial Control system (ICS). This can mislead the control center about the …
reliability of an Industrial Control system (ICS). This can mislead the control center about the …
The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System
N Moradpoor, L Maglaras, E Abah… - … Computing in Smart …, 2023 - ieeexplore.ieee.org
The protection of Critical National Infrastructure is extremely important due to nations being
dependent on their operation and steadiness. Any disturbance to this infrastructure could …
dependent on their operation and steadiness. Any disturbance to this infrastructure could …
Data-Driven Stealthy Sparse Attack Detection and Identification for Cyber Physical Systems
X Du, Z Xi - 2024 IEEE 13th Data Driven Control and Learning …, 2024 - ieeexplore.ieee.org
This paper investigates the issues of attack detection and identification in Cyber-Physical
Systems (CPSs) under sparse sensor and actuator attacks, focusing on systems with …
Systems (CPSs) under sparse sensor and actuator attacks, focusing on systems with …
Detection of Water-Bed Cyber Attacks Using Artificial Neural Networks
A Balaji, SR Regan, VS Kumar… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
Cyber threat intelligence gathered from previous attacks may provide light on the methods
and tools employed by cybercriminals, which can aid in both the reconstruction of assaults …
and tools employed by cybercriminals, which can aid in both the reconstruction of assaults …
Detecting Cyber-Attacks Against Cnc System: A Machining Process Invariant Approach
Z Li, X Chen, Y Chen, S Li, H Wang, S Lv… - Available at SSRN … - papers.ssrn.com
In the wake of the Industry 4.0 era, Cyber-Physical Manufacturing Systems (CPMS) face an
escalating menace of cyber-attacks. Consequently, the research dedicated to intrusion …
escalating menace of cyber-attacks. Consequently, the research dedicated to intrusion …