Zobrazeno 1 - 10
of 5 078
pro vyhledávání: '"industrial control system"'
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 124-136 (2024)
The purpose of this article is to develop a model for an access control policy and to formulate a method for creating a model of information security threat scenarios in industrial control system (ICS). The results of developing an access control pol
Externí odkaz:
https://doaj.org/article/1dc0e7a55fa040fdbebdaad2eee16900
Autor:
LIU Qixu, XIAO Juxin, TAN Yaokang, WANG Chengchun, HUANG Hao, ZHANG Fangjiao, YIN Jie, LIU Yuling
Publikováno v:
Tongxin xuebao, Vol 45, Pp 221-237 (2024)
To gain an in-depth awareness of the application of traffic analysis technology in the industrial Internet, the differences between the industrial Internet and the traditional Internet through the five core traffic analysis processes were illustrated
Externí odkaz:
https://doaj.org/article/6a03f99790f24231acbbd581d2976108
Autor:
Yue WU, Guoyan CAO
Publikováno v:
网络与信息安全学报, Vol 10, Iss 4, Pp 17-36 (2024)
The deep integration of industrial control systems and information networks drives the trend towards networking and intelligence in future industrial development. Industrial sensor networks, crucial for industrial system networking, raise concerns in
Externí odkaz:
https://doaj.org/article/a05fe1a3c19e4abdb5346c4572a4725a
Publikováno v:
IET Cyber-systems and Robotics, Vol 6, Iss 2, Pp n/a-n/a (2024)
Abstract With the development of deep learning and federated learning (FL), federated intrusion detection systems (IDSs) based on deep learning have played a significant role in securing industrial control systems (ICSs). However, adversarial attacks
Externí odkaz:
https://doaj.org/article/211b176bf98842c7a845d1cff2c97029
Publikováno v:
IEEE Access, Vol 12, Pp 153550-153563 (2024)
Industrial control systems (ICS) are vital for ensuring the reliability and operational efficiency of critical infrastructure across various industries. However, due to their integration into modernized network environments, they are inadvertently ex
Externí odkaz:
https://doaj.org/article/b6da3b549dd04184ab6e6966957025e5
Autor:
Murat Koca, Isa Avci
Publikováno v:
IEEE Access, Vol 12, Pp 143343-143351 (2024)
In this study, we address critical security vulnerabilities in Industrial Control Systems (ICS) and the Internet of Things (IoT) by focusing on enhancing collaboration and communication among interconnected devices. Recognizing the inherent risks and
Externí odkaz:
https://doaj.org/article/e62b3e5841eb45dbac9a10a913aa8fbc
Autor:
Muhammad Muzamil Aslam, Ali Tufail, Rosyzie Anna Awg Haji Mohd Apong, Liyanage Chandratilak De Silva, Muhammad Taqi Raza
Publikováno v:
IEEE Access, Vol 12, Pp 67537-67573 (2024)
Technological advancement plays a crucial role in our daily lives and constantly transforms the industrial sector. However, these technologies also introduce new security vulnerabilities to Industrial Control Systems (ICS). Attackers take advantage o
Externí odkaz:
https://doaj.org/article/095f8592e7164112875c070e425b5881
Publikováno v:
IEEE Access, Vol 12, Pp 64140-64149 (2024)
The increasing integration of cyber-physical systems in industrial environments has underscored the critical need of robust security mechanisms to counteract evolving cyber threats. To allow a full performance evaluation of these security mechanisms
Externí odkaz:
https://doaj.org/article/5760534bf93e4e0ea07c3d0a96bf2dd4
Publikováno v:
IEEE Open Journal of the Industrial Electronics Society, Vol 5, Pp 132-142 (2024)
With the wide applications of industrial wireless network technologies, the industrial control system (ICS) is evolving from wired and centralized to wireless and distributed, during which eavesdropping and attacking become serious problems. To guara
Externí odkaz:
https://doaj.org/article/1cbcfc03fd184155abac6c18508b183f
Publikováno v:
中国工程科学, Vol 25, Iss 6, Pp 126-136 (2023)
Industrial control system (ICS) is gradually transitioning from being closed and isolated to open and interconnected. The network threats to ICS are becoming highly hidden, strong-confrontation, and cross-domain in nature. Once subjected to cyberatta
Externí odkaz:
https://doaj.org/article/884d6a3b1ef24b889cb99fa26ed46314