Assessing and augmenting SCADA cyber security: A survey of techniques

S Nazir, S Patel, D Patel - Computers & Security, 2017 - Elsevier
SCADA systems monitor and control critical infrastructures of national importance such as
power generation and distribution, water supply, transportation networks, and manufacturing …

Review of cybersecurity assessment methods: Applicability perspective

R Leszczyna - Computers & Security, 2021 - Elsevier
Cybersecurity assessments are crucial in building the assurance that vital cyberassets are
effectively protected from threats. Multiple assessment methods have been proposed during …

Design and implementation of a secure modbus protocol

IN Fovino, A Carcano, M Masera… - … Infrastructure Protection III …, 2009 - Springer
The interconnectivity of modern and legacy supervisory control and data acquisition
(SCADA) systems with corporate networks and the Internet has significantly increased the …

An experimental investigation of malware attacks on SCADA systems

IN Fovino, A Carcano, M Masera… - International Journal of …, 2009 - Elsevier
Modern critical infrastructures are continually exposed to new threats due to the
vulnerabilities and architectural weaknesses introduced by the extensive use of information …

Data-driven correlation of cyber and physical anomalies for holistic system health monitoring

DL Marino, CS Wickramasinghe, B Tsouvalas… - IEEE …, 2021 - ieeexplore.ieee.org
Concerns of cyber-security threats are increasingly becoming a part of everyday operations
of cyber-physical systems, especially in the context of critical infrastructures. However …

[HTML][HTML] Bane or Boon: Measuring the effect of evasive malware on system call classifiers

M Nunes, P Burnap, P Reinecke, K Lloyd - Journal of Information Security …, 2022 - Elsevier
Malware refers to software that is designed to achieve a malicious purpose usually to benefit
its creator. To accomplish this, malware hides its true purpose from its target and malware …

Experimental assessment of network design approaches for protecting industrial control systems

B Genge, F Graur, P Haller - International Journal of Critical Infrastructure …, 2015 - Elsevier
This paper surveys and provides experimental results related to network design techniques
focused on enhancing the security of industrial control systems. It analyzes defense-in-depth …

Cyber security assessment of a power plant

IN Fovino, L Guidi, M Masera, A Stefanini - Electric Power Systems …, 2011 - Elsevier
Critical infrastructures and systems are today exposed not only to traditional safety and
availability problems, but also to new kinds of security threats. These are mainly due to the …

Tracing MIRAI malware in networked system

Y Xu, H Koide, DV Vargas… - 2018 sixth international …, 2018 - ieeexplore.ieee.org
In 2021, it is anticipated that there will be approximately 30 billion Internet of Things (IoT)
devices. The tremendous aggregate value of the IoT makes it a tempting and lucrative target …

Approach to security assessment of critical infrastructures' information systems

R Leszczyna, IN Fovino, M Masera - IET Information Security, 2011 - IET
This study presents an approach to the security assessment of the information systems of
critical infrastructures. The approach is based on the faithful reconstruction of the evaluated …