A novel generative adversarial network-based fuzzing cases generation method for industrial control system protocols
H Yang, Y Huang, Z Zhang, F Li, BB Gupta… - Computers and …, 2024 - Elsevier
With the interconnection and networking of industrial control systems (ICS), security
vulnerabilities in ICS protocols have become a major source of threats to these systems. In …
vulnerabilities in ICS protocols have become a major source of threats to these systems. In …
Efficient Cyberattack Detection Methods in Industrial Control Systems
The article deals with the issue of detecting cyberattacks on control algorithms running in a
real Programmable Logic Controller (PLC) and controlling a real laboratory control plant …
real Programmable Logic Controller (PLC) and controlling a real laboratory control plant …
Methodology for Conducting a Study of the Vulnerability of PLC Control Algorithms to Cyber Attacks
This paper describes a methodology used to test the vulnerability of control algorithms
implemented in an industrial Programmable Logic Controller (PLC) environment to cyber …
implemented in an industrial Programmable Logic Controller (PLC) environment to cyber …