A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities

A Alshamrani, S Myneni, A Chowdhary… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Threats that have been primarily targeting nation states and their associated entities have
expanded the target zone to include the private and corporate sectors. This class of threats …

Cyber-physical systems and their security issues

R Alguliyev, Y Imamverdiyev, L Sukhostat - Computers in Industry, 2018 - Elsevier
The creation of cyber-physical systems posed new challenges for people. Ensuring the
information security of cyber-physical systems is one of the most complex problems in a …

A manifesto for future generation cloud computing: Research directions for the next decade

R Buyya, SN Srirama, G Casale, R Calheiros… - ACM computing …, 2018 - dl.acm.org
The Cloud computing paradigm has revolutionised the computer science horizon during the
past decade and has enabled the emergence of computing as the fifth utility. It has captured …

An ensemble deep learning-based cyber-attack detection in industrial control system

A Al-Abassi, H Karimipour, A Dehghantanha… - Ieee …, 2020 - ieeexplore.ieee.org
The integration of communication networks and the Internet of Things (IoT) in Industrial
Control Systems (ICSs) increases their vulnerability towards cyber-attacks, causing …

A survey of moving target defenses for network security

S Sengupta, A Chowdhary, A Sabur… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …

A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems

M Imran, HUR Siddiqui, A Raza, MA Raza… - Computers & …, 2023 - Elsevier
Cybersecurity incident response is a very crucial part of the cybersecurity management
system. Adversaries emerge and evolve with new cybersecurity tactics, techniques, and …

Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack

A Ahmad, J Webb, KC Desouza, J Boorman - Computers & Security, 2019 - Elsevier
Advanced persistent threat (APT) is widely acknowledged to be the most sophisticated and
potent class of security threat. APT refers to knowledgeable human attackers that are …

Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems

IA Khan, M Keshk, D Pi, N Khan, Y Hussain, H Soliman - Ad Hoc Networks, 2022 - Elsevier
Abstract Industrial Internet of Things (IIoT) networks involves heterogeneous technological
and manufacturing services and devices. The communication and data exchange …

Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks

C Feng, T Li, D Chana - 2017 47th Annual IEEE/IFIP …, 2017 - ieeexplore.ieee.org
We outline an anomaly detection method for industrial control systems (ICS) that combines
the analysis of network package contents that are transacted between ICS nodes and their …

Systematic literature review of security event correlation methods

I Kotenko, D Gaifulina, I Zelichenok - Ieee Access, 2022 - ieeexplore.ieee.org
Security event correlation approaches are necessary to detect and predict incremental
threats such as multi-step or targeted attacks (advanced persistent threats) and other causal …