The first line of defense against cyber threats and cyber crimes is to be aware and get ready, eg, through cyber security training. Training can have two forms, the first is directed towards …
In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of …
The increasing need for economic, safe, and sustainable smart manufacturing combined with novel technological enablers has paved the way for artificial intelligence (AI) and big …
Abstract In modern Smart Grids (SGs) ruled by advanced computing and networking technologies, condition monitoring relies on secure cyberphysical connectivity. Due to this …
This paper presents the SWaT testbed, a modern industrial control system (ICS) for security research and training. SWaT is currently in use to (a) understand the impact of cyber and …
An increasing interest is emerging on the development of smart grid cyber-physical system testbeds. As new communication and information technologies emerge, innovative cyber …
Abstract Supervisory Control and Data Acquisition (SCADA) systems supervise and monitor critical infrastructures and industrial processes. However, SCADA systems running on …
Contemporary industrial control systems no longer operate in isolation, but use other networks (eg, corporate networks and the Internet) to facilitate and improve business …
T Morris, W Gao - Critical Infrastructure Protection VIII: 8th IFIP WG 11.10 …, 2014 - Springer
Supervisory control and data acquisition (SCADA) systems monitor and control physical processes associated with the critical infrastructure. Weaknesses in the application layer …