A taxonomy of supervised learning for idss in scada environments

J Suaboot, A Fahad, Z Tari, J Grundy… - ACM Computing …, 2020 - dl.acm.org
Supervisory Control and Data Acquisition (SCADA) systems play an important role in
monitoring industrial processes such as electric power distribution, transport systems, water …

Security and privacy in cyber-physical systems: A survey of surveys

J Giraldo, E Sarkar, AA Cardenas… - IEEE Design & …, 2017 - ieeexplore.ieee.org
The following is a survey on surveys and may help the interested reader to find a way
through the jungle of literature on the security and CPS topics out there already. In order to …

Attacks against process control systems: risk assessment, detection, and response

AA Cárdenas, S Amin, ZS Lin, YL Huang… - Proceedings of the 6th …, 2011 - dl.acm.org
In the last years there has been an increasing interest in the security of process control and
SCADA systems. Furthermore, recent computer attacks such as the Stuxnet worm, have …

Lessons learned from the maroochy water breach

J Slay, M Miller - International conference on critical infrastructure …, 2007 - Springer
Supervisory control and data acquisition (SCADA) systems are widely used to monitor and
control operations in electrical power distribution facilities, oil and gas pipelines, water …

Ukraine cyber-induced power outage: Analysis and practical mitigation strategies

DE Whitehead, K Owens, D Gammel… - 2017 70th Annual …, 2017 - ieeexplore.ieee.org
On December 23, 2015, a “temporary malfunction of the power supply” in three provinces in
Ukraine resulted in power outages that lasted up to six hours and affected 225,000 …

Security issues in SCADA networks

VM Igure, SA Laughter, RD Williams - computers & security, 2006 - Elsevier
The increasing interconnectivity of SCADA (Supervisory Control and Data Acquisition)
networks has exposed them to a wide range of network security problems. This paper …

Security for industrial communication systems

D Dzung, M Naedele, TP Von Hoff… - Proceedings of the …, 2005 - ieeexplore.ieee.org
Modern industrial communication networks are increasingly based on open protocols and
platforms that are also used in the office IT and Internet environment. This reuse facilitates …

[图书][B] Industrial communication technology handbook

R Zurawski - 2014 - books.google.com
Featuring contributions from major technology vendors, industry consortia, and government
and private research establishments, the Industrial Communication Technology Handbook …

An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems

A Almalawi, X Yu, Z Tari, A Fahad, I Khalil - Computers & Security, 2014 - Elsevier
Abstract Supervisory Control and Data Acquisition (SCADA) systems are a core part of
industrial systems, such as smart grid power and water distribution systems. In recent years …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …