A survey on recent advanced research of CPS security
Z Wang, W Xie, B Wang, J Tao, E Wang - Applied Sciences, 2021 - mdpi.com
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate
computing, communication, and control. Malicious attacks on CPSs can lead to both …
computing, communication, and control. Malicious attacks on CPSs can lead to both …
Industrial and critical infrastructure security: Technical analysis of real-life security incidents
Critical infrastructures and industrial organizations aggressively move towards integrating
elements of modern Information Technology (IT) into their monolithic Operational …
elements of modern Information Technology (IT) into their monolithic Operational …
Defending cyber-physical systems through reverse engineering based memory sanity check
Y Geng, Y Chen, R Ma, Q Wei, J Pan… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Cyber–physical systems (CPSs) are ubiquitous in critical infrastructures, where
programmable logic controllers (PLCs) and physical components intertwine. However …
programmable logic controllers (PLCs) and physical components intertwine. However …
Detecting plc intrusions using control invariants
Programmable logic controllers (PLCs), ie, the core of control systems, are well-known to be
vulnerable to a variety of cyber attacks. To mitigate this issue, we design PLC-Sleuth, a …
vulnerable to a variety of cyber attacks. To mitigate this issue, we design PLC-Sleuth, a …
CaPUF: Cascaded PUF structure for machine learning resiliency
With the rise of the Internet of Things (IoT), resource-constrained and power-constrained
devices attract more attention. The need for lightweight solutions as alternatives to resource …
devices attract more attention. The need for lightweight solutions as alternatives to resource …
Cyber-physical integrated intrusion detection scheme in SCADA system of process manufacturing industry
J Qian, X Du, B Chen, B Qu, K Zeng, J Liu - IEEE Access, 2020 - ieeexplore.ieee.org
Most Intrusion Detection System (IDS) used in Supervisory Control and Data Acquisition
(SCADA) systems now are focused on the cyber field but ignored the process states in …
(SCADA) systems now are focused on the cyber field but ignored the process states in …
An IIoT based ICS to improve safety through fast and accurate hazard detection and differentiation
Safety and security of Industrial Control Systems (ICS) applied in many critical infrastructures
is essential. In these systems, hazards can be due either to system failure or cyber-attacks …
is essential. In these systems, hazards can be due either to system failure or cyber-attacks …
Fesa: Automatic federated swarm attestation on dynamic large-scale iot devices
Swarm attestation, as an important branch of Remote Attestation (RA), enables a trusted
party (verifier) to verify the security states of multiple devices (provers) in a large network …
party (verifier) to verify the security states of multiple devices (provers) in a large network …
{PLC-Sleuth}: Detecting and Localizing {PLC} Intrusions Using Control Invariants
Programmable Logic Controllers (PLCs) are the ground of control systems, which are
however, vulnerable to a variety of cyber attacks, especially for networked control systems …
however, vulnerable to a variety of cyber attacks, especially for networked control systems …
Methodology to determine the device-level periodicity for anomaly detection in EtherCAT-based industrial control network
KO Akpinar, I Ozcelik - IEEE Transactions on Network and …, 2020 - ieeexplore.ieee.org
Continuous operation and monitoring of critical infrastructure networks are crucial to ensure
their sustainability and security. To achieve these, industrial control system (ICS) networks …
their sustainability and security. To achieve these, industrial control system (ICS) networks …