[HTML][HTML] SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues
M Alanazi, A Mahmood, MJM Chowdhury - Computers & security, 2023 - Elsevier
Supervisory control and data acquisition (SCADA) serves as the backbone of several critical
infrastructures, including water supply systems, oil pipelines, transportation and electricity. It …
infrastructures, including water supply systems, oil pipelines, transportation and electricity. It …
A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
With increasing reliance on Internet of Things (IoT) devices and services, the capability to
detect intrusions and malicious activities within IoT networks is critical for resilience of the …
detect intrusions and malicious activities within IoT networks is critical for resilience of the …
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
Abstract An Internet of Things (IoT) architecture generally consists of a wide range of Internet-
connected devices or things such as Android devices, and devices that have more …
connected devices or things such as Android devices, and devices that have more …
Digital forensics: the missing piece of the internet of things promise
S Watson, A Dehghantanha - Computer Fraud & Security, 2016 - Elsevier
As technology advances at a blinding pace, the promise of new gadgets to enhance every
facet of our lives tempts every consumer and organisation. From the ease of automation …
facet of our lives tempts every consumer and organisation. From the ease of automation …
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques
Critical infrastructure such as power plants, oil refineries, and sewage are at the core of
modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed …
modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed …
A survey on malware propagation, analysis, and detection
M Damshenas, A Dehghantanha… - International Journal of …, 2013 - go.gale.com
Lately, a new kind of war takes place between the security community and malicious
software developers, the security specialists use all possible techniques, methods and …
software developers, the security specialists use all possible techniques, methods and …
Cloud storage forensics: MEGA as a case study
F Daryabar, A Dehghantanha… - Australian Journal of …, 2017 - Taylor & Francis
The increasing use of smartphones and cloud storage apps allows users to access their
data anywhere, anytime. Due to the potential of mobile devices being used and/or targeted …
data anywhere, anytime. Due to the potential of mobile devices being used and/or targeted …
Cyber-attack detection in cyber-physical systems using supervised machine learning
P Semwal, A Handa - Handbook of Big Data Analytics and Forensics, 2022 - Springer
Abstract Cyber-Physical Systems (CPS) are where the physical processes are controlled by
computation and other technology components. Although, the collaboration of the computer …
computation and other technology components. Although, the collaboration of the computer …
A hybrid deep generative local metric learning method for intrusion detection
Advancement in information technology and widespread use of digital networks have led to
an increasing number of malicious activities and intrusions targeting software and systems …
an increasing number of malicious activities and intrusions targeting software and systems …
Evaluating performance of scalable fair clustering machine learning techniques in detecting cyber attacks in industrial control systems
A Handa, P Semwal - Handbook of Big Data Analytics and Forensics, 2022 - Springer
The widespread use of machine learning to build intelligent systems which can make real-
life decisions has led to the introduction of fairness notion in the machine learning …
life decisions has led to the introduction of fairness notion in the machine learning …