The first line of defense against cyber threats and cyber crimes is to be aware and get ready, eg, through cyber security training. Training can have two forms, the first is directed towards …
Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring and control components of critical infrastructures, such as power, telecommunication …
Cyber situational awareness has been proven to be of value in forming a comprehensive understanding of threats and vulnerabilities within organisations, as the degree of exposure …
In recent years, tremendous effort has been spent to modernizing communication infrastructure in Cyber-Physical Systems (CPS) such as Industrial Control Systems (ICS) and …
New technologies are increasing the vulnerability of the power system to cyber security threats. Dealing with these threats and determining vulnerabilities is an important task for …
This document reviews the state-of-the-art in Cyber Range implementations and related computer network operations (CNO) testbeds. We summarise recently published examples …
J Liu, Y Li, N Van Vorst, S Mann, K Hellman - Journal of Systems and …, 2009 - Elsevier
We present an open and flexible software infrastructure that embeds physical hosts in a simulated network. In real-time network simulation, where real-world implementations of …
In this work, we address the problem of designing and implementing honeypots for Industrial Control Systems (ICS). Honeypots are vulnerable systems that are set up with the intent to …
Abstract The Virtual Power System Testbed (VPST) at University of Illinois at Urbana- Champaign is part of the Trustworthy Cyber Infrastructure for the Power Grid (TCIP) and is …