[HTML][HTML] Industrial cyber-physical systems protection: A methodological review
R Canonico, G Sperlì - Computers & Security, 2023 - Elsevier
Ubiquitous utilization of Information and Communication Technologies in modern
manufacturing plants has transformed them into Cyber-Physical Systems (CPSs), making …
manufacturing plants has transformed them into Cyber-Physical Systems (CPSs), making …
Device fingerprinting for cyber-physical systems: a survey
The continued growth of the cyber-physical system (CPS) and Internet of Things
technologies raises device security and monitoring concerns. For device identification …
technologies raises device security and monitoring concerns. For device identification …
Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation
Gradual increase in the number of successful attacks against Industrial Control Systems
(ICS) has led to an urgent need to create defense mechanisms for accurate and timely …
(ICS) has led to an urgent need to create defense mechanisms for accurate and timely …
Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope
Abstract Cyber–Physical Systems (CPS) are developed by the integration of computational
algorithms and physical components and they exist as a result of technological …
algorithms and physical components and they exist as a result of technological …
NoiSense Print Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints
Fingerprinting of various physical and logical devices has been proposed for uniquely
identifying users or devices of mainstream IT systems such as PCs, laptops, and smart …
identifying users or devices of mainstream IT systems such as PCs, laptops, and smart …
[HTML][HTML] Проблема интерпретации, дифференциации и классификации цифровых продуктов
АИ Шайдуллин - Бизнес-информатика, 2023 - cyberleninka.ru
Цифровые инновационные продукты зачастую становятся значимым фактором
пересмотра бизнес-стратегий компаний и влияют на потребительские предпочтения …
пересмотра бизнес-стратегий компаний и влияют на потребительские предпочтения …
Attack rules: an adversarial approach to generate attacks for Industrial Control Systems using machine learning
Adversarial learning is used to test the robustness of machine learning algorithms under
attack and create attacks that deceive the anomaly detection methods in Industrial Control …
attack and create attacks that deceive the anomaly detection methods in Industrial Control …
Process skew: Fingerprinting the process for anomaly detection in industrial control systems
In an Industrial Control System (ICS), its complex network of sensors, actuators and
controllers have raised security concerns. In this paper, we proposed a technique called …
controllers have raised security concerns. In this paper, we proposed a technique called …
[HTML][HTML] The problem of interpretation, differentiation and classification of digital products
AI Shaidullin - Бизнес-информатика, 2023 - cyberleninka.ru
Digital innovative products often become a significant factor in the revision of companies'
business strategies and influence consumer preferences. A key component in the process of …
business strategies and influence consumer preferences. A key component in the process of …
Machine learning for cps security: applications, challenges and recommendations
C Mujeeb Ahmed, MA Umer… - … Intelligence and Big …, 2021 - Springer
Abstract Machine Learning (ML) based approaches are becoming increasingly common for
securing critical Cyber Physical Systems (CPS), such as electric power grid and water …
securing critical Cyber Physical Systems (CPS), such as electric power grid and water …