A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services

I Stellios, P Kotzanikolaou, M Psarakis… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
As the deployment of Internet of Things (IoT) is experiencing an exponential growth, it is no
surprise that many recent cyber attacks are IoT-enabled: the attacker initially exploits some …

A survey of cyber security management in industrial control systems

W Knowles, D Prince, D Hutchison, JFP Disso… - International journal of …, 2015 - Elsevier
Contemporary industrial control systems no longer operate in isolation, but use other
networks (eg, corporate networks and the Internet) to facilitate and improve business …

Critical infrastructure protection: Requirements and challenges for the 21st century

C Alcaraz, S Zeadally - International journal of critical infrastructure …, 2015 - Elsevier
Critical infrastructures play a vital role in supporting modern society. The reliability,
performance, continuous operation, safety, maintenance and protection of critical …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

A feature selection based on genetic algorithm for intrusion detection of industrial control systems

Y Fang, Y Yao, X Lin, J Wang, H Zhai - Computers & Security, 2024 - Elsevier
With the popularity of Internet technology, industrial control systems (ICS) have started to
access the Internet, which significantly facilitates engineers to manage ICS remotely but also …

Cyber stealth attacks in critical information infrastructures

L Cazorla, C Alcaraz, J Lopez - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
Current critical infrastructures (CIs) are complex interconnected industrial systems that, in
recent years, have incorporated information and communications technologies such as …

Extending the cyber-attack landscape for SCADA-based critical infrastructure

NR Rodofile, K Radke, E Foo - International Journal of Critical Infrastructure …, 2019 - Elsevier
The move from point-to-point serial communication to traditional information technology (IT)
networks has created new challenges in providing cyber-security for supervisory control and …

[图书][B] Broadband telecommunications and regional development

TH Grubesic, EA Mack - 2015 - taylorfrancis.com
Broadband is one of the most transformative technologies of the 21st century, yet our
understanding of its regional impacts remains somewhat rudimentary. Not only are issues of …

Abnormal detection method of industrial control system based on behavior model

S Zhanwei, L Zenghui - Computers & Security, 2019 - Elsevier
In the field of industrial control systems (ICSs), a broad application background and the
different characteristics of a system determine the diversity and particularity of an intrusion …

Covert channels-based stealth attacks in industry 4.0

C Alcaraz, G Bernieri, F Pascucci, J Lopez… - IEEE Systems …, 2019 - ieeexplore.ieee.org
Industry 4.0 advent opens several cyber-threats scenarios originally designed for classic
information technology (IT), drawing the attention to serious risks for the modern industrial …