A data analytical approach for assessing the efficacy of Operational Technology active defenses against insider threats
Tài liệu tham khảo
Ahmed, 2018, NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems, ASIACCS, 483, 10.1145/3196494.3196532
Brumback, 1987, A chi-square test for fault-detection in Kalman filterrs, IEEE Trans. Automat. Contr., 32, 552, 10.1109/TAC.1987.1104658
Da, 1994, Failure detection of dynamical systems with the state chi-square test, J. Guid. Contr. Dynam., 17, 10.2514/3.21193
Dridi, 2017, Prime factorization using quantum annealing and computational algebraic geometry, Sci. Rep., 7
Flammini, 2019
Givehchi, 2017, Interoperability for Industrial Cyber-Physical Systems: An Approach for Legacy Systems, IEEE Transactions on Industrial Informatics, 13, 3370, 10.1109/TII.2017.2740434
Grieves, 2014
Ibraheem, 2014, Damping low frequency oscillations in power system using quadratic Gaussian technique based control system design, Int. J. Comput. Appl., 92
Jajodia, 2011, Effectiveness of Moving Target Defenses
Kalman, 1960, A new approach to linear filtering and prediction problems, Trans. ASME J. Basic Eng., 82, 35, 10.1115/1.3662552
Koulamas, 2018, Cyber-physical systems and digital twins in the industrial internet of things, Computer, 51, 95, 10.1109/MC.2018.2876181
Li, 2019, Effectiveness of model-based defenses for digitally controlled industrial systems: nuclear reactor case study, Nucl. Technol., 206, 82, 10.1080/00295450.2019.1626170
Liu, 2009
Maurer, 2007, 21
Mo, 2015, Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs, IEEE Contr. Syst. Mag., 35, 93, 10.1109/MCS.2014.2364724
Payne, 2008, Lares: An Architecture for Secure Active Monitoring using Virtualization, IEEE Symposium on Security and Privacy
Peng, 2006, On the secrecy of timing-based active watermarking trace-back techniques, 15
Satchidanandan, 2016, Dynamic watermarking: active defense of networked cyber-physical systems, Proc. IEEE, 105, 219, 10.1109/JPROC.2016.2575064
Sawada, 2017, Model-based cybersecurity for control systems: modeling, design and control
Sengupta, 2017
Shannon, 1949, Communication theory of secrecy systems, Bell Syst. Tech. J., 28, 656, 10.1002/j.1538-7305.1949.tb00928.x
Sundaram, 2019
Tallinn Manual on the International Law Applicable to Cyber Warfare, 2013, 214
The Colors of Noise
Tsoukalas, 1997
Urbina, 2016