A novel generative adversarial network-based fuzzing cases generation method for industrial control system protocols

H Yang, Y Huang, Z Zhang, F Li, BB Gupta… - Computers and …, 2024 - Elsevier
With the interconnection and networking of industrial control systems (ICS), security
vulnerabilities in ICS protocols have become a major source of threats to these systems. In …

Efficient Cyberattack Detection Methods in Industrial Control Systems

P Marusak, R Nebeluk, A Wojtulewicz, K Cabaj… - Sensors, 2024 - mdpi.com
The article deals with the issue of detecting cyberattacks on control algorithms running in a
real Programmable Logic Controller (PLC) and controlling a real laboratory control plant …

Methodology for Conducting a Study of the Vulnerability of PLC Control Algorithms to Cyber Attacks

S Plamowski, R Nebeluk, A Wojtulewicz, K Cabaj… - IEEE …, 2024 - ieeexplore.ieee.org
This paper describes a methodology used to test the vulnerability of control algorithms
implemented in an industrial Programmable Logic Controller (PLC) environment to cyber …