2021
DOI: 10.48550/arxiv.2104.07409
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…A scalable ransomware detection framework was proposed in [109] to detect the attack on electric vehicle charging stations (EVCS) controlled by supervisory control and data acquisition (SCADA) system. The dynamic binary analysis was performed in virtual unit via PIN framework.…”
Section: Ransomware Dynamic Analysis Studies Utilizing Deep Learningmentioning
confidence: 99%
See 3 more Smart Citations
“…A scalable ransomware detection framework was proposed in [109] to detect the attack on electric vehicle charging stations (EVCS) controlled by supervisory control and data acquisition (SCADA) system. The dynamic binary analysis was performed in virtual unit via PIN framework.…”
Section: Ransomware Dynamic Analysis Studies Utilizing Deep Learningmentioning
confidence: 99%
“…A ransomware detection framework was proposed in [109] for Supervisory Control and Data Acquisition system (SCADA). The proposed framework assessed the impact of ransomware attack on SCADA.…”
Section: Reactive Preventionmentioning
confidence: 99%
See 2 more Smart Citations
“…Even with a limited number of publicly available data sets, the choice of data representation limits their reuse to variations of the original detection models, for example, sequential or time series data, such as audio/video data, cannot be used with common ML-based classification algorithms but Recurrent Neural Networks (RNN) [147]. Thus, if the data representation is sequential or time-series based, as in [27,163,3], then it cannot be utilized with some ransomware detection methods, e.g., [223], and vice versa.…”
Section: Ransomware Behavior Analysismentioning
confidence: 99%