Zobrazeno 1 - 10
of 100
pro vyhledávání: '"Kieran McLaughlin"'
Publikováno v:
IEEE Access, Vol 5, Pp 17149-17164 (2017)
Cyber-physical systems (CPSs) have dependability requirements that are associated with controlling a physical process. Cyber-attacks can result in those requirements not being met. Consequently, it is important to monitor a CPS in order to identify d
Externí odkaz:
https://doaj.org/article/5f5e4ec09e0448aab527935df29e8065
Publikováno v:
IEEE Access, Vol 5, Pp 11626-11644 (2017)
Synchrophasor technology has numerous applications ranging from simple grid monitoring/visualization to real-time protection and control. Most legacy phasor measurement units (PMUs) and phasor data concentrators (PDCs) deployed in power grids support
Externí odkaz:
https://doaj.org/article/f19a325dfadf446abce45b6446549463
Publikováno v:
Hughes, K, McLaughlin, K & Sezer, S 2022, Policy-Based Profiles for Network Intrusion Response Systems . in IEEE International Conference on Cyber Security and Resilience (IEEE CSR) . Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/CSR54599.2022.9850304
Attacks on computer networks are increasingly common, often leading to severe economical and reputational damage to organisations. Subsequently, Intrusion Response Systems are recently an active area of research which seek to automatically respond to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e2e281fabc23457442c34ed5e6e839e7
https://pure.qub.ac.uk/en/publications/129dec80-a4a5-495b-8288-568cb2c6e27d
https://pure.qub.ac.uk/en/publications/129dec80-a4a5-495b-8288-568cb2c6e27d
Publikováno v:
2022 IEEE 20th International Conference on Industrial Informatics (INDIN).
Publikováno v:
Hughes, K, McLaughlin, K & Sezer, S 2022, ' A Model-Free Approach to Intrusion Response Systems ', Journal of Information Security and Applications, vol. 66, pp. 2214 . https://doi.org/10.1016/j.jisa.2022.103150
With the rising number of data breaches, denial of service attacks and general malicious activity facing modern computer networks, there is an increasing need to quickly and effectively respond to attacks. Intrusion DetectionSystems provide an automa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a3caeb7c94ad412bf5159d9798c1cffb
https://pure.qub.ac.uk/en/publications/5afb6108-622a-4a6f-8022-9c1bf97f73c9
https://pure.qub.ac.uk/en/publications/5afb6108-622a-4a6f-8022-9c1bf97f73c9
Autor:
Fahad Siddiqui, Rafiullah Khan, Sakir Sezer, Kieran McLaughlin, Leonard Masing, Tobias Dorr, Florian Schade, Jurgen Becker, Alexander Ahlbrecht, Wanja Zaeske, Umut Durak, Nico Adler, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Geza Nemeth, Victor Morales, Paco Gomez, Georgios Keramidas, Christos P. Antonopoulos, Michail Mavropoulos, Vasilios Kelefouras, Konstantinos Antonopoulos, Nikolaos Voros, Christos Panagiotou, Dimitris Karadimas
Publikováno v:
2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring)
VTC 2022
Siddiqui, F, Khan, R, McLaughlin, K, Sezer, S, Masing, L, Dörr, T, Schade, F, Becker, J, Ahlbrecht, A, Zaeske, W, Durak, U, Adler, N, Sailer, A, Weber, R, Wilhelm, T, Nemeth, G, Morales, V, Gomez, P, Keramidas, G, Antonopoulos, C P, Mavropoulos, M, Kelefouras, V, Panagiotou, C, Karadimas, D & Voros, N 2022, XANDAR: A holistic cybersecurity engineering process for safety-critical and cyber-physical systems . in 95th IEEE Vehicular Technology Conference . Vehicular Technology Conference: Proceedings, Institute of Electrical and Electronics Engineers Inc., IEEE International Vehicular Technology Conference, Helsinki, Finland, 19/06/2022 . https://doi.org/10.1109/VTC2022-Spring54318.2022.9860859
VTC 2022
Siddiqui, F, Khan, R, McLaughlin, K, Sezer, S, Masing, L, Dörr, T, Schade, F, Becker, J, Ahlbrecht, A, Zaeske, W, Durak, U, Adler, N, Sailer, A, Weber, R, Wilhelm, T, Nemeth, G, Morales, V, Gomez, P, Keramidas, G, Antonopoulos, C P, Mavropoulos, M, Kelefouras, V, Panagiotou, C, Karadimas, D & Voros, N 2022, XANDAR: A holistic cybersecurity engineering process for safety-critical and cyber-physical systems . in 95th IEEE Vehicular Technology Conference . Vehicular Technology Conference: Proceedings, Institute of Electrical and Electronics Engineers Inc., IEEE International Vehicular Technology Conference, Helsinki, Finland, 19/06/2022 . https://doi.org/10.1109/VTC2022-Spring54318.2022.9860859
The integration of connected and autonomous technologies in safety-critical and cyber-physical systems offers great potential in the vital application domains of transportation, manufacturing and aerospace. These technological advancements are necess
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5beaa8b75f686608a0db2b7a3e9aee2e
https://doi.org/10.1109/vtc2022-spring54318.2022.9860859
https://doi.org/10.1109/vtc2022-spring54318.2022.9860859
Publikováno v:
CSR
Threat Intelligence has been a key part of the success of Intrusion Detection, with several trusted sources leading to wide adoption and greater understanding of new and trending threats to computer networks. Identifying potential threats and live at
Publikováno v:
Khan, R, McLaughlin, K, Kang, B, Laverty, D & Sezer, S 2021, A Novel Edge Security Gateway for End-to-End Protection in Industrial Internet of Things . in 2021 IEEE Power and Energy Society General Meeting (PESGM 2021): Proceedings . IEEE Power & Energy Society General Meeting (PESGM): Proceedings, Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/PESGM40551.2019.8973954
Many critical industrial control systems integrate a mixture of state-of-the-art and legacy equipment. Legacy installations lack advanced, and often even basic security features, risking entire system security. Existing research primarily focuses on
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d02731f8c8f2df05b99128b5608a24d6
https://pure.qub.ac.uk/en/publications/ae405b51-aa9d-4573-95a2-042e58a568d2
https://pure.qub.ac.uk/en/publications/ae405b51-aa9d-4573-95a2-042e58a568d2
Publikováno v:
Maynard, P, McLaughlin, K & Sezer, S 2020, ' Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems ', Journal of Cybersecurity, vol. 6, no. 1 . https://doi.org/10.1093/cybsec/tyaa020
We perform a detailed survey and analysis of the most significant attacks, which have targeted industrial control systems over the past decade, based on detailed incident reports from scientific and non-traditional resources. This work is the first t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::00a6fd1a4daea29f4287babc2dd5d61c
https://pure.qub.ac.uk/en/publications/decomposition-and-sequentialand-analysis-of-known-cyberattacks-on-critical-infrastructure-control-systems(6bc23605-38a7-4d48-8dce-e4f5dc21dc2b).html
https://pure.qub.ac.uk/en/publications/decomposition-and-sequentialand-analysis-of-known-cyberattacks-on-critical-infrastructure-control-systems(6bc23605-38a7-4d48-8dce-e4f5dc21dc2b).html
Publikováno v:
Khan, R, McLaughlin, K, Kang, B, Laverty, D & Sezer, S 2020, A secure cloud migration, monitoring and analytics framework for Industrial Internet of Things . in IEEE 6th World Forum on Internet of Things (WF-IoT) 2020: Proceedings . Institute of Electrical and Electronics Engineers Inc., IEEE 6th World Forum on Internet of Things, New Orleans, Louisiana, United States, 05/04/2020 . https://doi.org/10.1109/WF-IoT48130.2020.9221106
WF-IoT
WF-IoT
The fourth industrial revolution combines cutting-edge technologies such as Industrial Internet of Things (IIoT) and cloud computing. However, this inevitable revolution faces challenges due to the presence of legacy equipment in industrial systems.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::38eb8752a03e37514a838277389cd2f4
https://pure.qub.ac.uk/en/publications/20d878e2-2c98-42b0-bef9-41da3eb5a070
https://pure.qub.ac.uk/en/publications/20d878e2-2c98-42b0-bef9-41da3eb5a070