[HTML][HTML] SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues

M Alanazi, A Mahmood, MJM Chowdhury - Computers & security, 2023 - Elsevier
Supervisory control and data acquisition (SCADA) serves as the backbone of several critical
infrastructures, including water supply systems, oil pipelines, transportation and electricity. It …

A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks

HH Pajouh, R Javidan, R Khayami… - … on Emerging Topics …, 2016 - ieeexplore.ieee.org
With increasing reliance on Internet of Things (IoT) devices and services, the capability to
detect intrusions and malicious activities within IoT networks is critical for resilience of the …

Detecting crypto-ransomware in IoT networks based on energy consumption footprint

A Azmoodeh, A Dehghantanha, M Conti… - Journal of Ambient …, 2018 - Springer
Abstract An Internet of Things (IoT) architecture generally consists of a wide range of Internet-
connected devices or things such as Android devices, and devices that have more …

Digital forensics: the missing piece of the internet of things promise

S Watson, A Dehghantanha - Computer Fraud & Security, 2016 - Elsevier
As technology advances at a blinding pace, the promise of new gadgets to enhance every
facet of our lives tempts every consumer and organisation. From the ease of automation …

Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques

S Samtani, S Yu, H Zhu, M Patton… - 2016 IEEE Conference …, 2016 - ieeexplore.ieee.org
Critical infrastructure such as power plants, oil refineries, and sewage are at the core of
modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed …

A survey on malware propagation, analysis, and detection

M Damshenas, A Dehghantanha… - International Journal of …, 2013 - go.gale.com
Lately, a new kind of war takes place between the security community and malicious
software developers, the security specialists use all possible techniques, methods and …

Cloud storage forensics: MEGA as a case study

F Daryabar, A Dehghantanha… - Australian Journal of …, 2017 - Taylor & Francis
The increasing use of smartphones and cloud storage apps allows users to access their
data anywhere, anytime. Due to the potential of mobile devices being used and/or targeted …

Cyber-attack detection in cyber-physical systems using supervised machine learning

P Semwal, A Handa - Handbook of Big Data Analytics and Forensics, 2022 - Springer
Abstract Cyber-Physical Systems (CPS) are where the physical processes are controlled by
computation and other technology components. Although, the collaboration of the computer …

A hybrid deep generative local metric learning method for intrusion detection

M Saharkhizan, A Azmoodeh, H HaddadPajouh… - Handbook of Big Data …, 2020 - Springer
Advancement in information technology and widespread use of digital networks have led to
an increasing number of malicious activities and intrusions targeting software and systems …

Evaluating performance of scalable fair clustering machine learning techniques in detecting cyber attacks in industrial control systems

A Handa, P Semwal - Handbook of Big Data Analytics and Forensics, 2022 - Springer
The widespread use of machine learning to build intelligent systems which can make real-
life decisions has led to the introduction of fairness notion in the machine learning …