A survey on industrial control system testbeds and datasets for security research

M Conti, D Donadel, F Turrin - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs)
open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore …

Architecture and security of SCADA systems: A review

G Yadav, K Paul - International Journal of Critical Infrastructure Protection, 2021 - Elsevier
Pipeline bursting, production lines shut down, frenzy traffic, trains confrontation, the nuclear
reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU–these …

Time series anomaly detection for cyber-physical systems via neural system identification and bayesian filtering

C Feng, P Tian - Proceedings of the 27th ACM SIGKDD Conference on …, 2021 - dl.acm.org
Recent advances in AIoT technologies have led to an increasing popularity of utilizing
machine learning algorithms to detect operational failures for cyber-physical systems (CPS) …

[HTML][HTML] Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical …

IH Sarker, H Janicke, MA Ferrag, A Abuadbba - Internet of Things, 2024 - Elsevier
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets,
and services that are vital for the functioning and well-being of a society, economy, or nation …

物联网安全研究综述: 威胁, 检测与防御

杨毅宇, 周威, 赵尚儒, 刘聪, 张宇辉, 王鹤… - 通信 …, 2021 - infocomm-journal.com
基于近5 年网安国际会议(ACM CCS, USENIX Security, NDSS, IEEE S&P)
中发表的物联网安全文献, 以及其他部分高水平研究工作, 从威胁, 检测, 防御的视角对物联网 …

Anomaly detection in industrial control systems using logical analysis of data

TK Das, S Adepu, J Zhou - Computers & Security, 2020 - Elsevier
Abstract Cyber attacks on Industrial Control Systems (ICSs) to disrupt the associated
physical systems, like power grids and water treatment plants, are a harsh reality of the …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks

P Rieger, M Chilese, R Mohamed, M Miettinen… - 32nd USENIX Security …, 2023 - usenix.org
IoT application domains, device diversity and connectivity are rapidly growing. IoT devices
control various functions in smart homes and buildings, smart cities, and smart factories …

Log-based anomaly detection with robust feature extraction and online learning

S Han, Q Wu, H Zhang, B Qin, J Hu… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Cloud technology has brought great convenience to enterprises as well as customers.
System logs record notable events and are becoming valuable resources to track and …

EEFED: Personalized federated learning of execution&evaluation dual network for CPS intrusion detection

X Huang, J Liu, Y Lai, B Mao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In the modern interconnected world, intelligent networks and computing technologies are
increasingly being incorporated in industrial systems. However, this adoption of advanced …