Zobrazeno 1 - 10
of 1 687
pro vyhledávání: '"Industrial Control Systems"'
Publikováno v:
Alexandria Engineering Journal, Vol 107, Iss , Pp 643-651 (2024)
With the widespread application of Internet of Things technology in industrial control systems, abnormal behavior detection has become a key task to ensure the safety and stable operation of the system. We propose a multi-branch convolutional fusion
Externí odkaz:
https://doaj.org/article/2617284c1eaf40cea1a4b76f2b004b25
Autor:
Pete Burnap, Eirini Anthi, Philipp Reineckea, Lowri Williams, Fengnian Cao, Rakan Aldmoura, Kevin Jones
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 4, Iss 2, Pp 340-356 (2024)
Traditionally, cyber risk assessment considers system-level risk separately from individual component-level risk, i.e., devices, data, people. This separation prevents effective impact assessment where attack intelligence for a specific device can be
Externí odkaz:
https://doaj.org/article/0dc2cbfb33ea4b73bf773811ee63b3a7
Autor:
Sebastian Plamowski, Robert Nebeluk, Andrzej Wojtulewicz, Krzysztof Cabaj, Patryk Chaber, Maciej Lawrynczuk, Piotr Marusak, Krzysztof Zarzycki
Publikováno v:
IEEE Access, Vol 12, Pp 135551-135563 (2024)
This paper describes a methodology used to test the vulnerability of control algorithms implemented in an industrial Programmable Logic Controller (PLC) environment to cyber attacks. Three stages of testing are discussed. First, we start with a simul
Externí odkaz:
https://doaj.org/article/39bb648725e6406bba682b39a56782ff
Publikováno v:
IEEE Open Journal of the Industrial Electronics Society, Vol 5, Pp 823-835 (2024)
Industrial control systems (ICSs) play a crucial role in the smooth operation of critical infrastructures, and their increasing complexity and interconnectedness necessitate integrating safety and security measures. Thus, an integrated risk assessmen
Externí odkaz:
https://doaj.org/article/4c4367a87ec347ae8a5cf5d6ddfd5a88
Autor:
Vahid Moghiss, Alireza Shameli-Sendi
Publikováno v:
IEEE Access, Vol 12, Pp 96100-96112 (2024)
One of the needs of an organization or a country with many and diverse services is to analyze the vulnerabilities of the services so that appropriate security measures can be implemented and deployed accordingly. Many search engines have been designe
Externí odkaz:
https://doaj.org/article/2f4c013179704d9bbcfe555b467aaf97
Autor:
Mourad Benmalek
Publikováno v:
Internet of Things and Cyber-Physical Systems, Vol 4, Iss , Pp 186-202 (2024)
Ransomware attacks have emerged as one of the most significant cyberthreats faced by organizations worldwide. In recent years, ransomware has also started to target critical infrastructure and Cyber-Physical Systems (CPS) such as industrial control s
Externí odkaz:
https://doaj.org/article/dc2cc806e723443183617685c58cf8c3
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 3, Iss 4, Pp 895-913 (2023)
This article presents a statistical approach using entropy and classification-based analysis to detect anomalies in industrial control systems traffic. Several statistical techniques have been proposed to create baselines and measure deviation to det
Externí odkaz:
https://doaj.org/article/8fc36094975540b2a27fef8d4d3a4ba1
Autor:
Daisuke Tsuji, Junya Fujita, Noritaka Matsumoto, Yu Tamura, Jens Doenhoff, Tomohiro Shigemoto
Publikováno v:
SICE Journal of Control, Measurement, and System Integration, Vol 16, Iss 1, Pp 63-74 (2023)
Cyberattacks against Industrial Control Systems (ICS), which play a crucial role in many industrial domains, could bring environmental and safety damages as well as huge economic loss. To decrease such cybersecurity risks, it is needed to improve the
Externí odkaz:
https://doaj.org/article/4066fecf092848f0a9408c4731f96fdf
Publikováno v:
Applied Sciences, Vol 14, Iss 19, p 8665 (2024)
The integration and automation of industrial processes has brought significant gains in efficiency and productivity but also elevated cybersecurity risks, especially in the process industry. This paper introduces a methodology utilizing process minin
Externí odkaz:
https://doaj.org/article/be179c793595436ca32d80b13469aee7