A survey on industrial control system testbeds and datasets for security research
The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs)
open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore …
open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore …
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture
MM Yamin, B Katt, V Gkioulos - Computers & Security, 2020 - Elsevier
The first line of defense against cyber threats and cyber crimes is to be aware and get ready,
eg, through cyber security training. Training can have two forms, the first is directed towards …
eg, through cyber security training. Training can have two forms, the first is directed towards …
A survey on SCADA systems: secure protocols, incidents, threats and tactics
Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring
and control components of critical infrastructures, such as power, telecommunication …
and control components of critical infrastructures, such as power, telecommunication …
A survey of clustering algorithms for big data: Taxonomy and empirical analysis
Clustering algorithms have emerged as an alternative powerful meta-learning tool to
accurately analyze the massive volume of data generated by modern applications. In …
accurately analyze the massive volume of data generated by modern applications. In …
A review of cyber-ranges and test-beds: Current and future trends
Cyber situational awareness has been proven to be of value in forming a comprehensive
understanding of threats and vulnerabilities within organisations, as the degree of exposure …
understanding of threats and vulnerabilities within organisations, as the degree of exposure …
A survey of industrial control system testbeds
H Holm, M Karresand, A Vidström… - Secure IT Systems: 20th …, 2015 - Springer
Conducting security tests such as vulnerability discovery within Industrial Control Systems
(ICS) help reduce their vulnerability to cyber attacks. Unfortunately, the extreme availability …
(ICS) help reduce their vulnerability to cyber attacks. Unfortunately, the extreme availability …
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
Abstract Supervisory Control and Data Acquisition (SCADA) systems are a core part of
industrial systems, such as smart grid power and water distribution systems. In recent years …
industrial systems, such as smart grid power and water distribution systems. In recent years …
Spectral embedded generalized mean based k-nearest neighbors clustering with s-distance
The spectral clustering algorithm is extensively employed in different aspects, especially in
the field of pattern recognition. However, the efficient construction of the neighborhood …
the field of pattern recognition. However, the efficient construction of the neighborhood …
An efficient data-driven clustering technique to detect attacks in SCADA systems
Supervisory control and data acquisition (SCADA) systems have become a salient part in
controlling critical infrastructures, such as power plants, energy grids, and water distribution …
controlling critical infrastructures, such as power plants, energy grids, and water distribution …
Cyber-physical stress-testing platform for water distribution networks
D Nikolopoulos, G Moraitis, D Bouziotas… - Journal of …, 2020 - ascelibrary.org
The water sector is facing emerging challenges, as cyber-physical threats target Supervisory
Control and Data Acquisition (SCADA) systems of water utilities. A cyber-physical stress …
Control and Data Acquisition (SCADA) systems of water utilities. A cyber-physical stress …