Cybersecurity for industrial control systems: A survey

D Bhamare, M Zolanvari, A Erbad, R Jain, K Khan… - computers & …, 2020 - Elsevier
Abstract Industrial Control System (ICS) is a general term that includes supervisory control &
data acquisition (SCADA) systems, distributed control systems (DCS), and other control …

Assessing and augmenting SCADA cyber security: A survey of techniques

S Nazir, S Patel, D Patel - Computers & Security, 2017 - Elsevier
SCADA systems monitor and control critical infrastructures of national importance such as
power generation and distribution, water supply, transportation networks, and manufacturing …

Optimizing learning in image retrieval

Y Rui, T Huang - … IEEE Conference on Computer Vision and …, 2000 - ieeexplore.ieee.org
Combining learning with vision techniques in interactive image retrieval has been an active
research topic during the past few years. However, existing learning techniques either are …

[图书][B] A new scada dataset for intrusion detection research

IP Turnipseed - 2015 - search.proquest.com
Abstract Supervisory Control and Data Acquisition (SCADA) systems monitor and control
industrial control systems in many industrials and economic sectors which are considered …

Data-driven correlation of cyber and physical anomalies for holistic system health monitoring

DL Marino, CS Wickramasinghe, B Tsouvalas… - IEEE …, 2021 - ieeexplore.ieee.org
Concerns of cyber-security threats are increasingly becoming a part of everyday operations
of cyber-physical systems, especially in the context of critical infrastructures. However …

An unknown input multiobserver approach for estimation and control under adversarial attacks

T Yang, C Murguia, M Kuijper… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We address the problem of state estimation, attack isolation, and control of discrete-time
linear time-invariant systems under (potentially unbounded) actuator and sensor false data …

Detecting bad-mouthing attacks on reputation systems using self-organizing maps

Z Banković, JC Vallejo, D Fraga, JM Moya - Computational Intelligence in …, 2011 - Springer
It has been demonstrated that rating trust and reputation of individual nodes is an effective
approach in distributed environments in order to improve security, support decision-making …

Soft computing techniques for dependable cyber-physical systems

M Atif, S Latif, R Ahmad, AK Kiani, J Qadir, A Baig… - IEEE …, 2019 - ieeexplore.ieee.org
Cyber-physical systems (CPSs) were envisaged as a way to manipulate the objects in the
physical world through computer intelligence. This is usually done by providing a …

Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps

Z Banković, JM Moya, Á Araujo, D Fraga… - Integrated …, 2010 - content.iospress.com
Security of sensor networks is a complicated task, mostly due to the limited resources of
sensor units. The first line of defense, ie encryption and authentication, is useless if an …

Improving data quality with an accumulated reputation model in participatory sensing systems

R Yu, R Liu, X Wang, J Cao - Sensors, 2014 - mdpi.com
The ubiquity of mobile devices brings forth a sensing paradigm, participatory sensing, to
collect and interpret sensory information from the environment. Participants join in …