Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems
Abstract Industrial Internet of Things (IIoT) networks involves heterogeneous technological
and manufacturing services and devices. The communication and data exchange …
and manufacturing services and devices. The communication and data exchange …
Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks
We outline an anomaly detection method for industrial control systems (ICS) that combines
the analysis of network package contents that are transacted between ICS nodes and their …
the analysis of network package contents that are transacted between ICS nodes and their …
HML-IDS: A hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems
Critical infrastructures, eg, electricity generation and dispersal networks, chemical
processing plants, and gas distribution, are governed and monitored by supervisory control …
processing plants, and gas distribution, are governed and monitored by supervisory control …
Review into state of the art of vulnerability assessment using artificial intelligence
S Khan, S Parkinson - Guide to Vulnerability Analysis for Computer …, 2018 - Springer
Vulnerability assessment is the essential and well-established process of probing security
flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …
flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …
[HTML][HTML] Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies
Abstract In recent years, Industrial Control Systems (ICS) have become increasingly
exposed to a wide range of cyber-physical attacks, having massive destructive …
exposed to a wide range of cyber-physical attacks, having massive destructive …
A hypergraph based Kohonen map for detecting intrusions over cyber–physical systems traffic
Abstract Cyber–Physical System acts as a cornerstone in Industry 4.0 by integrating
information-technology, electrical, and mechanical engineering under the same crown. This …
information-technology, electrical, and mechanical engineering under the same crown. This …
Unknown vulnerability risk assessment based on directed graph models: a survey
W He, H Li, J Li - IEEE Access, 2019 - ieeexplore.ieee.org
Nowadays, vulnerability attacks occur frequently. Due to the information asymmetry between
attackers and defenders, vulnerabilities can be divided into known and unknown. Existing …
attackers and defenders, vulnerabilities can be divided into known and unknown. Existing …
Blockchain-Enhanced Framework for Secure Third-Party Vendor Risk Management and Vigilant Security Controls
In an era of heightened digital interconnectedness, businesses increasingly rely on third-
party vendors to enhance their operational capabilities. However, this growing dependency …
party vendors to enhance their operational capabilities. However, this growing dependency …
Super detector: An ensemble approach for anomaly detection in industrial control systems
Abstract Industrial Control Systems encompass supervisory systems (SCADA) and cyber-
physical components (sensors/actuators), which are typically deployed in critical …
physical components (sensors/actuators), which are typically deployed in critical …
Scalable approach to enhancing ICS resilience by network diversity
Network diversity has been widely recognized as an effective defense strategy to mitigate
the spread of malware. Optimally diversifying network resources can improve the resilience …
the spread of malware. Optimally diversifying network resources can improve the resilience …