Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Kenneth Radke"'
Publikováno v:
Journal of Intelligent Information Systems. 60:377-405
The advent of Industry 4.0 has led to a rapid increase in cyber attacks on industrial systems and processes, particularly on Industrial Control Systems (ICS). These systems are increasingly becoming prime targets for cyber criminals and nation-states
Publikováno v:
International Journal of Critical Infrastructure Protection. 25:14-35
The move from point-to-point serial communication to traditional information technology (IT) networks has created new challenges in providing cyber-security for supervisory control and data acquisition (SCADA) systems in critical infrastructure. Curr
Publikováno v:
Computers & Security. 78:103-125
Industrial control systems (ICS) are moving from dedicated communications to switched and routed corporate networks, exposing them to the Internet and placing them at risk of cyber-attacks. Existing methods of detecting cyber-attacks, such as intrusi
Publikováno v:
International Journal of Critical Infrastructure Protection. 20:48-67
Electric substation automation systems based on the IEC 61850 standard predominantly employ the GOOSE and MMS protocols. Because GOOSE and MMS messages are not encrypted, an attacker can observe packet header information in protocol messages and inje
Publikováno v:
ACM Computing Surveys. 48:1-31
Detection and prevention of global navigation satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill three gaps in
Publikováno v:
ACSW
Encryption is the primary tool for protecting information security, but cyber-physical systems that interact directly with critical infrastructure, in applications such as power, water and transport, typically use no encryption for their control mess
Publikováno v:
ACSW
Cyber-security research and development for SCADA is being inhibited by the lack of available SCADA attack datasets. This paper presents a modular dataset generation framework for SCADA cyber-attacks, to aid the development of attack datasets. The pr
Autor:
Sebastian T. Sherry, Kenneth Radke, Christopher Djamaludin, Nicholas R. Rodofile, Ernest Foo, Thomas Schmidt
Publikováno v:
Information Security and Privacy ISBN: 9783319598697
ACISP (2)
ACISP (2)
Cyber-security of their critical infrastructure is the current grand challenge facing nation-states. Development and research of cyber-security solutions for operational technology environments of critical infrastructure is being inhibited by the lac
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::22ebd636b9b2def7756deced762ca9f8
https://doi.org/10.1007/978-3-319-59870-3_30
https://doi.org/10.1007/978-3-319-59870-3_30
Publikováno v:
ICT Systems Security and Privacy Protection ISBN: 9783319584683
SEC
SEC
Industrial Control Systems (ICSs) are moving from dedicated communications to Ethernet-based interconnected networks, placing them at risk of cyber attack. ICS networks are typically monitored by an Intrusion Detection System (IDS), however tradition
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cb304a38e21a4cec9286ab7d5ca74a7b
https://doi.org/10.1007/978-3-319-58469-0_5
https://doi.org/10.1007/978-3-319-58469-0_5
Publikováno v:
The Computer Journal. 58:2404-2425
We present CHURNs, a method for providing freshness and authentication assurances to human users. In computer-to-computer protocols, it has long been accepted that assurances of freshness such as random nonces are required to prevent replay attacks.