A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

[HTML][HTML] Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical …

IH Sarker, H Janicke, MA Ferrag, A Abuadbba - Internet of Things, 2024 - Elsevier
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets,
and services that are vital for the functioning and well-being of a society, economy, or nation …

Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system

V Ravi, R Chaganti, M Alazab - Computers and Electrical Engineering, 2022 - Elsevier
This work proposes an end-to-end model for network attack detection and network attack
classification using deep learning-based recurrent models. The proposed model extracts the …

An intelligent cognitive computing based intrusion detection for industrial cyber-physical systems

MM Althobaiti, KPM Kumar, D Gupta, S Kumar… - Measurement, 2021 - Elsevier
Abstract Advanced developments of Industrial Cyber-Physical Systems (CPSs), comprising
Internet of Things (IoT) finds useful in several application areas such as transportation, smart …

Security perspective analysis of industrial cyber physical systems (I-CPS): A decade-wide survey

N Agrawal, R Kumar - ISA transactions, 2022 - Elsevier
Considering the exceptional growth of Cyber Physical Systems (CPSs), multiple and
potentially grave security challenges have emerged in this field. Different vulnerabilities and …

An enriched RPCO-BCNN mechanisms for attack detection and classification in SCADA systems

S Shitharth, KM Prasad, K Sangeetha… - IEEE …, 2021 - ieeexplore.ieee.org
Providing security to the Supervisory Control and Data Acquisition (SCADA) systems is one
of the demanding and crucial tasks in recent days, due to the different types of attacks on the …

A classy multifacet clustering and fused optimization based classification methodologies for SCADA security

AO Khadidos, H Manoharan, S Selvarajan… - Energies, 2022 - mdpi.com
Detecting intrusions from the supervisory control and data acquisition (SCADA) systems is
one of the most essential and challenging processes in recent times. Most of the …

An industrial virus propagation model based on SCADA system

Q Zhu, G Zhang, X Luo, C Gan - Information Sciences, 2023 - Elsevier
Supervisory control and data acquisition (SCADA) systems are widely used in the national
infrastructure. As more and more SCADA systems have been connected to the Internet …

[PDF][PDF] A Review of Advanced Cyber Threat Detection Techniques in Critical Infrastructure: Evolution, Current State, and Future Directions

M AMINU, A AKINSANYA, O OYEDOKUN, O TOSIN - 2024 - researchgate.net
Cyber threats pose substantial risks to critical infrastructure, necessitating the development
and implementation of advanced detection techniques to protect against possible attacks …

Expert-guided security risk assessment of evolving power grids

S Borenius, P Gopalakrishnan, L Bertling Tjernberg… - Energies, 2022 - mdpi.com
Electric power grids, which form an essential part of the critical infrastructure, are evolving
into highly distributed, dynamic networks in order to address the climate change. This …