A survey on industrial control system testbeds and datasets for security research
The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs)
open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore …
open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore …
Architecture and security of SCADA systems: A review
Pipeline bursting, production lines shut down, frenzy traffic, trains confrontation, the nuclear
reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU–these …
reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU–these …
Time series anomaly detection for cyber-physical systems via neural system identification and bayesian filtering
C Feng, P Tian - Proceedings of the 27th ACM SIGKDD Conference on …, 2021 - dl.acm.org
Recent advances in AIoT technologies have led to an increasing popularity of utilizing
machine learning algorithms to detect operational failures for cyber-physical systems (CPS) …
machine learning algorithms to detect operational failures for cyber-physical systems (CPS) …
[HTML][HTML] Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical …
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets,
and services that are vital for the functioning and well-being of a society, economy, or nation …
and services that are vital for the functioning and well-being of a society, economy, or nation …
物联网安全研究综述: 威胁, 检测与防御
杨毅宇, 周威, 赵尚儒, 刘聪, 张宇辉, 王鹤… - 通信 …, 2021 - infocomm-journal.com
基于近5 年网安国际会议(ACM CCS, USENIX Security, NDSS, IEEE S&P)
中发表的物联网安全文献, 以及其他部分高水平研究工作, 从威胁, 检测, 防御的视角对物联网 …
中发表的物联网安全文献, 以及其他部分高水平研究工作, 从威胁, 检测, 防御的视角对物联网 …
Anomaly detection in industrial control systems using logical analysis of data
Abstract Cyber attacks on Industrial Control Systems (ICSs) to disrupt the associated
physical systems, like power grids and water treatment plants, are a harsh reality of the …
physical systems, like power grids and water treatment plants, are a harsh reality of the …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks
IoT application domains, device diversity and connectivity are rapidly growing. IoT devices
control various functions in smart homes and buildings, smart cities, and smart factories …
control various functions in smart homes and buildings, smart cities, and smart factories …
Log-based anomaly detection with robust feature extraction and online learning
S Han, Q Wu, H Zhang, B Qin, J Hu… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Cloud technology has brought great convenience to enterprises as well as customers.
System logs record notable events and are becoming valuable resources to track and …
System logs record notable events and are becoming valuable resources to track and …
EEFED: Personalized federated learning of execution&evaluation dual network for CPS intrusion detection
In the modern interconnected world, intelligent networks and computing technologies are
increasingly being incorporated in industrial systems. However, this adoption of advanced …
increasingly being incorporated in industrial systems. However, this adoption of advanced …