Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

Intrusion detection for cybersecurity of smart meters

CC Sun, DJS Cardenas, A Hahn… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The integration of Information and Communications Technology (ICT) enables real-time
communication for smart meters to participate in power system operations. However …

A survey on botnets: Incentives, evolution, detection and current trends

SN Thanh Vu, M Stege, PI El-Habr, J Bang, N Dragoni - Future Internet, 2021 - mdpi.com
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained
prominence in an era of pervasive computing and the Internet of Things. Botnets have …

Cyber–physical system security of distribution systems

CC Liu, JC Bedoya, N Sahani… - … and Trends® in …, 2021 - nowpublishers.com
Abstract The Information and Communications Technology (ICT) for control and monitoring
of power systems is a layer on top of the physical power system infrastructure. The cyber …

Borderline smote algorithm and feature selection-based network anomalies detection strategy

Y Sun, H Que, Q Cai, J Zhao, J Li, Z Kong, S Wang - Energies, 2022 - mdpi.com
This paper proposes a novel network anomaly detection framework based on data balance
and feature selection. Different from the previous binary classification of network intrusion …

A comprehensive study of Mozi botnet

TF Tu, JW Qin, H Zhang, M Chen, T Xu… - International Journal of …, 2022 - Wiley Online Library
With the trend of digital transformation of enterprises, the use of Internet of Things (IoT)
devices is increasing. IoT devices that are not protected by security measures have …

BotCluster: A session-based P2P botnet clustering system on NetFlow

CY Wang, CL Ou, YE Zhang, FM Cho, PH Chen… - Computer Networks, 2018 - Elsevier
This study presents a session-based P2P botnet clustering system implemented on
MapReduce for aggregating malicious hosts within NetFlow traffic logs. The proposed botnet …

When security risk assessment meets advanced metering infrastructure: Identifying the appropriate method

M Shokry, AI Awad, MK Abd-Ellah, AAM Khalaf - Sustainability, 2023 - mdpi.com
Leading risk assessment standards such as the NIST SP 800-39 and ISO 27005 state that
information security risk assessment (ISRA) is one of the crucial stages in the risk …

Modeling and defending advanced metering infrastructure subjected to distributed denial-of-service attacks

C Zhang, F Luo, M Sun, G Ranzi - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Advanced Metering Infrastructure (AMI) is a critical and fundamental component of smart
grids. Cyber security of AMI thus has direct implications to smart grid's secure and reliable …

Real-time implementation of IoT-enabled cyberattack detection system in advanced metering infrastructure using machine learning technique

K Naveeda, SMHSS Fathima - Electrical Engineering, 2024 - Springer
The integration of the Internet of Things (IoT) and MultiFunction Energy Meter into the power
grid underscores the critical need for robust cybersecurity measures to manage data …