Controller cyber-attack detection and isolation

A Sztyber-Betley, M Syfert, JM Kościelny, Z Górecka - Sensors, 2023 - mdpi.com
This article deals with the cyber security of industrial control systems. Methods for detecting
and isolating process faults and cyber-attacks, consisting of elementary actions named …

Stealthy Cyberattacks Detection Based on Control Performance Assessment Methods for the Air Conditioning Industrial Installation

JF Możaryn, M Frątczak, K Stebel, T Kłopot, W Nocoń… - Energies, 2023 - mdpi.com
This paper aims to study the workflow of the detection centre of stealthy attacks on industrial
installations that generate an increase in energy consumption. Such long-lasting …

Machine Learning based Early Detection of Ongoing Cyber-Attacks

A Bhagyalakshmi, CDS Laya… - … on Applied Artificial …, 2024 - ieeexplore.ieee.org
The need for sophisticated detection and response systems to counteract cyber threats has
grown in importance as the cybersecurity landscape changes. In order to improve …

[PDF][PDF] A Method of Routing of Fractal-like Traffic with Prediction of Router Load for Reduce the Probability of Network Packet Loss.

Y Meleshko, H Drieieva, O Drieiev, M Yakymenko… - COLINS (3), 2023 - ceur-ws.org
In this paper, a method for routing fractal-like traffic in computer networks was proposed.
This method uses the prediction of router load by analyzing the fractal dimension of network …

The Best Scenario of Cyber Attack Selecting on the Information and Communication System Based on the Logical and Probabilistic Method

L Alekseichuk, O Novikov, A Rodionov… - Theoretical and Applied …, 2023 - tacs.ipt.kpi.ua
The task of analyzing and selecting the best scenario of a cyberattack on information and
communication system is considered as a component of the task of analyzing systems …