Security of smart manufacturing systems
Tóm tắt
Từ khóa
Tài liệu tham khảo
2017
Trade, 2014
Parliment, 2016
Research, 2016
Radvanovsky, 2015
2016
Parliment, 2016
Commission, 2017
Flechais, 2003, Bringing Security Home: a process for developing secure and usable systems, 49
Mittal, 2017, Smart manufacturing: characteristics, technologies and enabling factors, Proc Inst Mech Eng Part B J Eng Manuf, 0
Tuptuk, 2016
2014
2014
2014
2011
Roberts, 2005
2007
Antonakakis, 2017, Understanding the Mirai Botnet, 1093
2016
Beek, 2018
Avizienis, 2004, Basic concepts and taxonomy of dependable and secure computing, IEEE Trans Dependable Secur Comput, 1, 11, 10.1109/TDSC.2004.2
2015
2017
Viega, 2006
Fovino, 2010, Modbus/DNP3 state-based intrusion detection system, 2010 24th IEEE international conference on advanced information networking and applications (AINA), 729, 10.1109/AINA.2010.86
2016
Burton, 2017
Page, 2017
Korkmaz, 2017, Detection and mitigation of time delay injection attacks on industrial control systems with PLCs, 62
Wang, 2017, Analysis of time delay attacks against power grid stability, 67
Tuptuk, 2015, Covert channel attacks in pervasive computing, 2015 IEEE international conference on pervasive computing and communications (PerCom), 236, 10.1109/PERCOM.2015.7146534
Bilge, 2012, Before we knew it: an empirical study of zero-day attacks in the real world, 833
Kuehn, 2014, Shifts in the cybersecurity paradigm: zero-day exploits, discourse, and emerging institutions, 63
Grosse, 2016
Biggio, 2014, Security evaluation of pattern classifiers under attack, IEEE Trans Knowl Data Eng, 26, 984, 10.1109/TKDE.2013.57
Laskov, 2010, Machine learning in adversarial environments, Mach Learn, 81, 115, 10.1007/s10994-010-5207-6
Biggio, 2015, Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective, IEEE Signal Process Mag, 32, 31, 10.1109/MSP.2015.2426728
Papernot, 2016
Papernot, 2016
Joy, 2011, Advances in parallel distributed computing, vol. 203, 366
Josse, 2007, Rootkit detection from outside the Matrix, J Comput Virol, 3, 113, 10.1007/s11416-007-0045-1
Bianchi, 2012, Blacksheep: detecting compromised hosts in homogeneous crowds, 341
Golovanov, 2011
2010
2016
Zetter, 2016
2016
Alex, 2017
M. Joyce (Ed.), Idebate Press, 2010.
2013
2014
Jill, 2008, Lessons learned from the Maroochy Water Breach, vol. 253, 73
Keeney, 2005
2017
2001
2013
2017
2015
2012
2010
2014
2014
Anderson, 2010, Security economics and critical national infrastructure, 55
2008
Stouffer, 2014
2011
2009
2011
2011
Piètre-Cambacédès, 2008, Cryptographic key management for SCADA systems-issues and perspectives, 156
Choi, 2010, Efficient secure group communications for SCADA, IEEE Trans Power Deliv, 25, 714, 10.1109/TPWRD.2009.2036181
Choi, 2009, Advanced key-management architecture for secure SCADA communications, IEEE Trans Power Deliv, 24, 1154, 10.1109/TPWRD.2008.2005683
Pal, 2009, Cryptographic key management for SCADA system: an architectural framework, 2009 International conference on advances in computing, control, and telecommunication technologies, 169, 10.1109/ACT.2009.51
Jiang, 2013, Robust group key management with revocation and collusion resistance for SCADA in smart grid, 2013 IEEE global communications conference (GLOBECOM), 802, 10.1109/GLOCOM.2013.6831171
Cheung, 2007, Using model-based intrusion detection for SCADA networks
Yang, 2006
Oman, 2008, Intrusion detection and event monitoring in SCADA networks, 161
Roosta, 2008, An intrusion detection system for wireless process control systems, 2008 5th IEEE international conference on mobile ad hoc and sensor systems, 866, 10.1109/MAHSS.2008.4660125
Düssel, 2010, Cyber-critical infrastructure protection using real-time payload-based anomaly detection, 85
Carcano, 2011, A multidimensional critical state analysis for detecting intrusions in SCADA systems, IEEE Trans Ind Inform, 7, 179, 10.1109/TII.2010.2099234
Hadziosmanovic, 2012, 354
Reeves, 2012, Intrusion detection for resource-constrained embedded control systems in the power grid, Int J Crit Infrastruct Prot, 5, 74, 10.1016/j.ijcip.2012.02.002
Tsang, 2005, Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction, 2005 IEEE international conference on industrial technology, 51, 10.1109/ICIT.2005.1600609
Paul, 2013, Towards the protection of industrial control systems: conclusions of a vulnerability analysis of Profinet IO, 160
Shin, 2010, An experimental study of hierarchical intrusion detection for wireless industrial sensor networks, IEEE Trans Ind Inform, 6, 744, 10.1109/TII.2010.2051556
Pan, 2015, Developing a hybrid intrusion detection system using data mining for power systems, IEEE Trans Smart Grid, 6, 3104, 10.1109/TSG.2015.2409775
Zhang, 2011, Distributed intrusion detection system in a multi-layer network architecture of smart grids, IEEE Trans Smart Grid, 2, 796, 10.1109/TSG.2011.2159818
Linda, 2009, Neural network based intrusion detection system for critical infrastructures, 102
Kiss, 2015, A clustering-based approach to detect cyber attacks in process control systems, 2015 IEEE 13th international conference on industrial informatics (INDIN), 142, 10.1109/INDIN.2015.7281725
Caselli, 2015, Sequence-aware intrusion detection in industrial control systems, 13
Premaratne, 2010, An intrusion detection system for IEC61850 automated substations, IEEE Trans Power Deliv, 25, 2376, 10.1109/TPWRD.2010.2050076
Kim, 2015, Detecting abnormal behavior in SCADA networks using normal traffic pattern learning, 121
Jardine, 2016, SENAMI: selective non-invasive active monitoring for ICS intrusion detection, 23
Ghaeini, 2016, HAMIDS: hierarchical monitoring intrusion detection system for industrial control systems, 103
Mrugala, 2017, Evolving attackers against wireless sensor networks using genetic programming, IET Wirel Sens Syst, 7, 113, 10.1049/iet-wss.2016.0090
Mrugala, 2016, Evolving attackers against wireless sensor networks, 107
Beautement, 2008, The compliance budget: managing security behaviour in organisations, 47
Herath, 2009, Protection motivation and deterrence: a framework for security policy compliance in organisations, Eur J Inf Syst, 18, 106, 10.1057/ejis.2009.6
2016
2016
2014
Line, 2014, Information Security Incident Management: Planning for Failure, IT Security Incident Management IT Forensics (IMF), 2014 Eighth International Conference on, 47, 10.1109/IMF.2014.10
Spyridopoulos, 2013, Incident analysis amp; digital forensics in SCADA and industrial control systems, 8th IET International System Safety Conference incorporating the Cyber Security Conference 2013, 1
Candell, 2015
Holm, 2015, A Survey of Industrial Control System Testbeds, 11