Scaphy: Detecting modern ics attacks by correlating behaviors in scada and physical
M Ike, K Phan, K Sadoski, R Valme… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Modern Industrial Control Systems (ICS) attacks evade existing tools by using knowledge of
ICS processes to blend their activities with benign Supervisory Control and Data Acquisition …
ICS processes to blend their activities with benign Supervisory Control and Data Acquisition …
A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems
Security attacks present unique challenges to the design of self-adaptation mechanism for
software-intensive systems due to the adversarial nature of the environment. Game …
software-intensive systems due to the adversarial nature of the environment. Game …
Super detector: An ensemble approach for anomaly detection in industrial control systems
Abstract Industrial Control Systems encompass supervisory systems (SCADA) and cyber-
physical components (sensors/actuators), which are typically deployed in critical …
physical components (sensors/actuators), which are typically deployed in critical …
Bridging Both Worlds in Semantics and Time: Domain Knowledge Based Analysis and Correlation of Industrial Process Attacks
Modern industrial control systems (ICS) attacks infect supervisory control and data
acquisition (SCADA) hosts to stealthily alter industrial processes, causing damage. To detect …
acquisition (SCADA) hosts to stealthily alter industrial processes, causing damage. To detect …
Anomaly Detection In Telecommunication Networks: Leveraging Novel Big Data And Machine Learning Techniques For Proactive Fault Management
SAA Ali - Educational Administration: Theory and Practice, 2024 - kuey.net
The telecommunication industry has experienced exponential growth, leading to complex
and intricate networks designed to support the ever-increasing demands of a hyper …
and intricate networks designed to support the ever-increasing demands of a hyper …
Industrial control malicious traffic anomaly detection system based on deep autoencoder
W Wang, C Wang, Y Guo, M Yuan, X Luo… - Frontiers in Energy …, 2021 - frontiersin.org
Industrial control network is a direct interface between information system and physical
control process. Due to the lack of authentication, encryption, and other necessary security …
control process. Due to the lack of authentication, encryption, and other necessary security …
A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems
The increasing prevalence of security attacks on software-intensive systems calls for new,
effective methods for detecting and responding to these attacks. As one promising approach …
effective methods for detecting and responding to these attacks. As one promising approach …
Industrial Control Malicious Traffic Anomaly Detection System Based on Deep Autoencoder
X Luo, Y Gao - Engineering Applications of Neurocomputing, 2022 - books.google.com
Industrial Control Malicious Traffic Anomaly Detection System Based on Deep Autoencoder
Page 104 ORIGINAL RESEARCH published: 19 January 2021 doi: 10.3389/fenrg. 2020.555145 …
Page 104 ORIGINAL RESEARCH published: 19 January 2021 doi: 10.3389/fenrg. 2020.555145 …
Analysis and Detection of Unauthorized Access Points Using various Machine Learning Algorithms
AM Juwale - 2020 - norma.ncirl.ie
Illegal access points in an internet network is a frequent concern for users connected to the
network, in this paper, we try to identify the illegal access point entries via RTT Round Trip …
network, in this paper, we try to identify the illegal access point entries via RTT Round Trip …