Architecture and security of SCADA systems: A review

G Yadav, K Paul - International Journal of Critical Infrastructure Protection, 2021 - Elsevier
Pipeline bursting, production lines shut down, frenzy traffic, trains confrontation, the nuclear
reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU–these …

A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

An enriched RPCO-BCNN mechanisms for attack detection and classification in SCADA systems

S Shitharth, KM Prasad, K Sangeetha… - IEEE …, 2021 - ieeexplore.ieee.org
Providing security to the Supervisory Control and Data Acquisition (SCADA) systems is one
of the demanding and crucial tasks in recent days, due to the different types of attacks on the …

A smart PLC-SCADA framework for monitoring petroleum products terminals in industry 4.0 via machine learning

O Rashad, O Attallah, I Morsi - Measurement and Control, 2022 - journals.sagepub.com
The paper introduces a Programmable Logic Controller (PLC)/Human Machine Interface
(HMI) system incorporated along with machine learning (ML) classifiers. Although some …

[PDF][PDF] An Autoencoder-Based Network Intrusion Detection System for the SCADA System.

M Altaha, JM Lee, M Aslam, S Hong - J. Commun., 2021 - researchgate.net
 The intrusion detection system (IDS) is the main tool to do security monitoring that is one of
the security strategies for the supervisory control and data acquisition (SCADA) system. In …

Covert channel communication as an emerging security threat in 2.5 D/3D integrated systems

I Miketic, K Dhananjay, E Salman - Sensors, 2023 - mdpi.com
In this paper, first, a broad overview of existing covert channel communication-based
security attacks is provided. Such covert channels establish a communication link between …

Keeping host sanity for security of the SCADA systems

JM Lee, S Hong - IEEE Access, 2020 - ieeexplore.ieee.org
Cyber attacks targeting the Supervisory Control and Data Acquisition (SCADA) systems are
becoming more complex and more intelligent. Currently proposed security measures for the …

A plc-scada pipeline for managing oil refineries

O Rashad, O Attallah, I Morsi - 2022 5th International …, 2022 - ieeexplore.ieee.org
This paper proposes a PLC (Programmable Logic Controller)/HMI (Human Machine
Interface) system for tracking oil products refineries. The proposed pipeline includes AOI …

[PDF][PDF] Security monitoring and network management for the power control network

S Hong, JM Lee, M Altaha, M Aslam - system, 2020 - researchgate.net
Security monitoring is a viable solution to enhance the security capability in the current
power control Supervisory Control and Data Acquisition (SCADA) system, more broadly …

Detecting covert channel attacks on cyber‐physical systems

H Li, D Chasaki - IET Cyber‐Physical Systems: Theory & …, 2023 - Wiley Online Library
Cyberattacks on cyber‐physical systems (CPS) have the potential to cause widespread
disruption and affect the safety of millions of people. Machine learning can be an effective …