Cyber-physical systems security: Limitations, issues and future trends
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …
which can monitor and manipulate real objects and processes. They are closely related to …
Intrusion detection for cybersecurity of smart meters
The integration of Information and Communications Technology (ICT) enables real-time
communication for smart meters to participate in power system operations. However …
communication for smart meters to participate in power system operations. However …
A survey on botnets: Incentives, evolution, detection and current trends
SN Thanh Vu, M Stege, PI El-Habr, J Bang, N Dragoni - Future Internet, 2021 - mdpi.com
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained
prominence in an era of pervasive computing and the Internet of Things. Botnets have …
prominence in an era of pervasive computing and the Internet of Things. Botnets have …
Cyber–physical system security of distribution systems
Abstract The Information and Communications Technology (ICT) for control and monitoring
of power systems is a layer on top of the physical power system infrastructure. The cyber …
of power systems is a layer on top of the physical power system infrastructure. The cyber …
Borderline smote algorithm and feature selection-based network anomalies detection strategy
Y Sun, H Que, Q Cai, J Zhao, J Li, Z Kong, S Wang - Energies, 2022 - mdpi.com
This paper proposes a novel network anomaly detection framework based on data balance
and feature selection. Different from the previous binary classification of network intrusion …
and feature selection. Different from the previous binary classification of network intrusion …
A comprehensive study of Mozi botnet
TF Tu, JW Qin, H Zhang, M Chen, T Xu… - International Journal of …, 2022 - Wiley Online Library
With the trend of digital transformation of enterprises, the use of Internet of Things (IoT)
devices is increasing. IoT devices that are not protected by security measures have …
devices is increasing. IoT devices that are not protected by security measures have …
BotCluster: A session-based P2P botnet clustering system on NetFlow
CY Wang, CL Ou, YE Zhang, FM Cho, PH Chen… - Computer Networks, 2018 - Elsevier
This study presents a session-based P2P botnet clustering system implemented on
MapReduce for aggregating malicious hosts within NetFlow traffic logs. The proposed botnet …
MapReduce for aggregating malicious hosts within NetFlow traffic logs. The proposed botnet …
When security risk assessment meets advanced metering infrastructure: Identifying the appropriate method
Leading risk assessment standards such as the NIST SP 800-39 and ISO 27005 state that
information security risk assessment (ISRA) is one of the crucial stages in the risk …
information security risk assessment (ISRA) is one of the crucial stages in the risk …
Modeling and defending advanced metering infrastructure subjected to distributed denial-of-service attacks
Advanced Metering Infrastructure (AMI) is a critical and fundamental component of smart
grids. Cyber security of AMI thus has direct implications to smart grid's secure and reliable …
grids. Cyber security of AMI thus has direct implications to smart grid's secure and reliable …
Real-time implementation of IoT-enabled cyberattack detection system in advanced metering infrastructure using machine learning technique
K Naveeda, SMHSS Fathima - Electrical Engineering, 2024 - Springer
The integration of the Internet of Things (IoT) and MultiFunction Energy Meter into the power
grid underscores the critical need for robust cybersecurity measures to manage data …
grid underscores the critical need for robust cybersecurity measures to manage data …