Covert channels-based stealth attacks in industry 4.0
Industry 4.0 advent opens several cyber-threats scenarios originally designed for classic
information technology (IT), drawing the attention to serious risks for the modern industrial …
information technology (IT), drawing the attention to serious risks for the modern industrial …
E-APTDetect: Early Advanced Persistent Threat Detection in Critical Infrastructures with Dynamic Attestation
Advanced Persistent Threats (APTs) represent a complex series of techniques directed
against a particular organization, where the perpetrator is able to hide its presence for a …
against a particular organization, where the perpetrator is able to hide its presence for a …
A systematic literature review for APT detection and Effective Cyber Situational Awareness (ECSA) conceptual model
Advancements in computing technology and the growing number of devices (eg, computers,
mobile) connected to networks have contributed to an increase in the amount of data …
mobile) connected to networks have contributed to an increase in the amount of data …
Integration of a threat traceability solution in the industrial internet of things
In industrial Internet of Things (IIoT) scenarios, where a plethora of IoT technologies coexist
with consolidated industrial infrastructures, the integration of security mechanisms that …
with consolidated industrial infrastructures, the integration of security mechanisms that …
Secure interconnection of IT-OT networks in industry 4.0
C Alcaraz - Critical Infrastructure Security and Resilience: Theories …, 2019 - Springer
Increasingly, the society is witnessing how today's industry is adapting the new technologies
and communication protocols to offer more optimal and reliable services to end-users, with …
and communication protocols to offer more optimal and reliable services to end-users, with …
Hidden Markov model-based attack detection for networked control systems subject to random packet dropouts
G Lu, D Feng, B Huang - IEEE Transactions on Industrial …, 2020 - ieeexplore.ieee.org
The problem of attack detection for Stuxnet in the industrial control system is discussed in
this article. Different operating modes (normal and hazard modes) may occur in the nominal …
this article. Different operating modes (normal and hazard modes) may occur in the nominal …
Digital Twin-assisted anomaly detection for industrial scenarios
Industry 5.0 is the current industrial paradigm that inherits the technological diversity of its
predecessor, Industry 4.0, but includes three priority goals:(i) resilience,(ii) sustainability and …
predecessor, Industry 4.0, but includes three priority goals:(i) resilience,(ii) sustainability and …
Enhancing security and dependability of industrial networks with opinion dynamics
Opinion Dynamics poses a novel technique to accurately locate the patterns of an advanced
attack against an industrial infrastructure, compared to traditional intrusion detection …
attack against an industrial infrastructure, compared to traditional intrusion detection …
Distributed detection of apts: Consensus vs. clustering
Advanced persistent threats (APTs) demand for sophisticated traceability solutions capable
of providing deep insight into the movements of the attacker through the victim's network at …
of providing deep insight into the movements of the attacker through the victim's network at …
A scary peek into the future: Advanced persistent threats in emerging computing environments
T Halabi, A Chaudhry, S Alqahtani… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
The last decade witnessed a gradual shift from cloud-based computing towards ubiquitous
computing, which has put at a greater security risk every element of the computing …
computing, which has put at a greater security risk every element of the computing …