2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA) 2018
DOI: 10.1109/etfa.2018.8502585
|View full text |Cite
|
Sign up to set email alerts
|

Process-Aware Model based IDSs for Industrial Control Systems Cybersecurity: Approaches, Limits and Further Research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…Then the closest solutions to the ideal security strategy were chosen and the efficiency of the proposed approach demonstrated high value in a simulated process control ICS. Escudero et al [20] provided comprehensive outlines, vision, and views of ICS Security for the G-SCOP Center of Research deficiencies. They gave orientation for designing a behavioral model-based Intrusion Detection System for equipment degradation and addressed the limitation of the current approach on a single supply chain.…”
Section: Literature Surveymentioning
confidence: 99%
“…Then the closest solutions to the ideal security strategy were chosen and the efficiency of the proposed approach demonstrated high value in a simulated process control ICS. Escudero et al [20] provided comprehensive outlines, vision, and views of ICS Security for the G-SCOP Center of Research deficiencies. They gave orientation for designing a behavioral model-based Intrusion Detection System for equipment degradation and addressed the limitation of the current approach on a single supply chain.…”
Section: Literature Surveymentioning
confidence: 99%
“…Diverse types of cyber‐attacks have caused increasing security threats to contemporary computing and networking systems . These threats pose huge potential security risks to individuals, societies, and enterprises . For instance, massive hack attacks to Sony pictures caused the theft and online exposure of about 40 gigabytes of sensitive data (including pertinent scripts of unreleased films, private information of Sony employees, etc) .…”
Section: Introductionmentioning
confidence: 99%
“…Cyber‐attacks have become a major threat to many modern systems and networks. For example, industrial control systems have been targeted by cyber‐attacks based on vulnerabilities in these systems and their environments or based on the equipment degradation . It is a challenging task to address dependence in cybersecurity models …”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations