Journal articles on the topic 'Industrial Control Systems (ICS)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Industrial Control Systems (ICS).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Cruz, Tiago, Jorge Proença, Paulo Simões, Matthieu Aubigny, Moussa Ouedraogo, Antonio Graziano, and Leandros Maglaras. "A Distributed IDS for Industrial Control Systems." International Journal of Cyber Warfare and Terrorism 4, no. 2 (April 2014): 1–22. http://dx.doi.org/10.4018/ijcwt.2014040101.
Full textChristos P, Beretas. "Industrial control systems: The biggest cyber threat." Annals of Civil and Environmental Engineering 4, no. 1 (December 4, 2020): 044–46. http://dx.doi.org/10.29328/journal.acee.1001026.
Full textKeliris, Anastasis, and Michail Maniatakos. "Demystifying Advanced Persistent Threats for Industrial Control Systems." Mechanical Engineering 139, no. 03 (March 1, 2017): S13—S17. http://dx.doi.org/10.1115/1.2017-mar-6.
Full textVávra, Jan, Martin Hromada, and Roman Jašek. "Specification of the Current State Vulnerabilities Related to Industrial Control Systems." International Journal of Online Engineering (iJOE) 11, no. 5 (September 24, 2015): 64. http://dx.doi.org/10.3991/ijoe.v11i5.4981.
Full textMugavero, Roberto, Stanislav Abaimov, Federico Benolli, and Valentina Sabato. "Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)." International Journal of Information Systems for Crisis Response and Management 10, no. 2 (April 2018): 49–78. http://dx.doi.org/10.4018/ijiscram.2018040103.
Full textSapkota, Subin, A. K. M. Nuhil Mehdy, Stephen Reese, and Hoda Mehrpouyan. "FALCON: Framework for Anomaly Detection in Industrial Control Systems." Electronics 9, no. 8 (July 24, 2020): 1192. http://dx.doi.org/10.3390/electronics9081192.
Full textEmake, Erhovwosere Donald, Ibrahim Adepoju Adeyanju, and Godwin Obruozie Uzedhe. "Industrial Control Systems (ICS): Cyber-attacks & Security Optimization." International Journal of Computer Engineering and Information Technology 12, no. 5 (May 31, 2020): 31–41. http://dx.doi.org/10.47277/ijceit/12(5)1.
Full textStouffer, Keith, and Rick Candell. "Measuring Impact of Cybersecurity on the Performance of Industrial Control Systems." Mechanical Engineering 136, no. 12 (December 1, 2014): S4—S7. http://dx.doi.org/10.1115/1.2014-dec-5.
Full textSohn, Jong Mo, In Tae Lee, and Lim Hyo Chang. "Enhancement of Industrial Control Systems(ICS) Security for Service Company." Journal of Korea Service Management Society 20, no. 4 (November 30, 2019): 183–200. http://dx.doi.org/10.15706/jksms.2019.20.4.010.
Full textGokhale, Sheetal, Ashwini Dalvi, and Irfan Siddavatam. "Industrial Control Systems Honeypot: A Formal Analysis of Conpot." International Journal of Computer Network and Information Security 12, no. 6 (December 8, 2020): 44–56. http://dx.doi.org/10.5815/ijcnis.2020.06.04.
Full textAUFFRET, JEAN-PIERRE, JANE L. SNOWDON, ANGELOS STAVROU, JEFFREY S. KATZ, DIANA KELLEY, RASHEQ S. RAHMAN, FRANK STEIN, LISA SOKOL, PETER ALLOR, and PENG WARWEG. "Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740001. http://dx.doi.org/10.1142/s0219265917400011.
Full textQassim, Qais Saif, Norziana Jamil, Maslina Daud, Ahmed Patel, and Norhamadi Ja’affar. "A review of security assessment methodologies in industrial control systems." Information & Computer Security 27, no. 1 (March 11, 2019): 47–61. http://dx.doi.org/10.1108/ics-04-2018-0048.
Full textAgrisa, Herik Henci. "A REVIEW: INDUSTRIAL CONTROL SYSTEM (ICS) AND SYSTEM SECURITY." Journal of Mechanical Science and Engineering 8, no. 1 (March 29, 2021): 013–18. http://dx.doi.org/10.36706/jmse.v8i1.51.
Full textChen, Qian, Robert K. Abercrombie, and Frederick T. Sheldon. "Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC)." Journal of Artificial Intelligence and Soft Computing Research 5, no. 3 (July 1, 2015): 205–20. http://dx.doi.org/10.1515/jaiscr-2015-0029.
Full textPerales Gómez, Ángel Luis, Lorenzo Fernández Maimó, Alberto Huertas Celdrán, and Félix J. García Clemente. "MADICS: A Methodology for Anomaly Detection in Industrial Control Systems." Symmetry 12, no. 10 (September 23, 2020): 1583. http://dx.doi.org/10.3390/sym12101583.
Full textWang, Yufei, Tengbiao Zhang, and Qian Ye. "Situation awareness framework for industrial control system based on cyber kill chain." MATEC Web of Conferences 336 (2021): 02013. http://dx.doi.org/10.1051/matecconf/202133602013.
Full textWang, Zibo, Yaofang Zhang, Zhiyao Liu, Tongtong Li, Yilu Chen, Chen Yang, Bailing Wang, and Zhusong Liu. "A Prioritizing Interdiction Surface-Based Vulnerability Remediation Composite Metric for Industrial Control Systems." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–16. http://dx.doi.org/10.1155/2022/6442778.
Full textJiang, Cheng Zhi, Ting Ting Liu, and Xing Chuan Bao. "A Security Test and Evaluation Model for Electric Industrial Control Systems." Applied Mechanics and Materials 519-520 (February 2014): 1385–89. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.1385.
Full textGenge, Béla, Piroska Haller, Adrian-Vasile Duka, and Hunor Sándor. "A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems." at - Automatisierungstechnik 67, no. 5 (May 27, 2019): 417–28. http://dx.doi.org/10.1515/auto-2019-0017.
Full textAYDIN, Hakan, and Ahmet SERTBAŞ. "CYBER SECURITY IN INDUSTRIAL CONTROL SYSTEMS (ICS): A SURVEY OF ROWHAMMER VULNERABILITY." Applied Computer Science 18, no. 2 (June 30, 2022): 86–100. http://dx.doi.org/10.35784/acs-2022-15.
Full textRao, Nandan, Shubhra Srivastava, and Sreekanth K.S. "PKI Deployment Challenges and Recommendations for ICS Networks." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 38–48. http://dx.doi.org/10.4018/ijisp.2017040104.
Full textHorváth, Dušan, and Maximilián Strémy. "Use of Blockchain Mechanisms in PLC Control and Safety Critical Processes." Research Papers Faculty of Materials Science and Technology Slovak University of Technology 29, no. 49 (September 1, 2021): 1–6. http://dx.doi.org/10.2478/rput-2021-0018.
Full textGoncharov, Evgeny, Kirill Kruglov, and Yuliya Dashchenko. "Five ICS cybersecurity myths based on Kaspersky Lab ICS CERT experience." at - Automatisierungstechnik 67, no. 5 (May 27, 2019): 372–82. http://dx.doi.org/10.1515/auto-2019-0016.
Full textMackintosh, Mike, Gregory Epiphaniou, Haider Al-Khateeb, Keith Burnham, Prashant Pillai, and Mohammad Hammoudeh. "Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems." Journal of Sensor and Actuator Networks 8, no. 1 (February 14, 2019): 14. http://dx.doi.org/10.3390/jsan8010014.
Full textAra, Anees. "Security in Supervisory Control and Data Acquisition (SCADA) based Industrial Control Systems: Challenges and Solutions." IOP Conference Series: Earth and Environmental Science 1026, no. 1 (May 1, 2022): 012030. http://dx.doi.org/10.1088/1755-1315/1026/1/012030.
Full textLiu, Chenyang, Yazeed Alrowaili, Neetesh Saxena, and Charalambos Konstantinou. "Cyber Risks to Critical Smart Grid Assets of Industrial Control Systems." Energies 14, no. 17 (September 3, 2021): 5501. http://dx.doi.org/10.3390/en14175501.
Full textPretorius, Barend, and Brett van Niekerk. "Cyber-Security for ICS/SCADA." International Journal of Cyber Warfare and Terrorism 6, no. 3 (July 2016): 1–16. http://dx.doi.org/10.4018/ijcwt.2016070101.
Full textHeverin, Thomas, Michael Cordano, Andy Zeyher, Matthew Lashner, and Sanjana Suresh. "Exploring Ontologies for Mitigation Selection of Industrial Control System Vulnerabilities." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 72–80. http://dx.doi.org/10.34190/iccws.17.1.32.
Full textCao, Yixin, Lei Zhang, Xiaosong Zhao, Kai Jin, and Ziyi Chen. "An Intrusion Detection Method for Industrial Control System Based on Machine Learning." Information 13, no. 7 (July 3, 2022): 322. http://dx.doi.org/10.3390/info13070322.
Full textJohnson, Chris, Rob Harkness, and Maria Evangelopoulou. "Forensic Attacks Analysis and the Cyber Security of Safety-Critical Industrial Control Systems." Journal of System Safety 53, no. 1 (April 1, 2017): 29–34. http://dx.doi.org/10.56094/jss.v53i1.102.
Full textLiyakkathali, Salimah, Francisco Furtado, Gayathri Sugumar, and Aditya Mathur. "A Mechanism to Assess the Effectiveness Anomaly Detectors in Industrial Control Systems." Journal of Integrated Design and Process Science 24, no. 3-4 (April 11, 2022): 35–50. http://dx.doi.org/10.3233/jid-210023.
Full textWang, Chao, Bailing Wang, Hongri Liu, and Haikuo Qu. "Anomaly Detection for Industrial Control System Based on Autoencoder Neural Network." Wireless Communications and Mobile Computing 2020 (August 3, 2020): 1–10. http://dx.doi.org/10.1155/2020/8897926.
Full textBruno Santos Junqueira, Marvim Vinicius Souza de Souza, Victor Bittencourt Lima, Allace Souza Faria de Jesus Gonçalves, and Herman Augusto Lepikson. "Learning Proposal for Cybersecurity for Industrial Control Systems Based on Problems and Established by a 4.0 Didactic Advanced-Manufacturing-Plant." JOURNAL OF BIOENGINEERING, TECHNOLOGIES AND HEALTH 5, no. 1 (May 2, 2022): 11–17. http://dx.doi.org/10.34178/jbth.v5i1.188.
Full textBorrego, Adriano, Adilson Eduardo Guelfi, Anderson Aparecido Alves da Silva, Marcelo Teixeira de Azevedo, Norisvaldo Ferraz Jr, and Sergio Takeo Kofuji. "MODELING AND VALIDATING A SECURE INTERCONNECTION BETWEEN INDUSTRIAL CONTROL SYSTEM AND CORPORATE NETWORK USING COLORED PETRI NET." COLLOQUIUM EXACTARUM 12, no. 2 (September 9, 2020): 45–61. http://dx.doi.org/10.5747/ce.2020.v12.n2.e318.
Full textKim, Aram, Junhyoung Oh, Kookheui Kwon, and Kyungho Lee. "Consider the Consequences: A Risk Assessment Approach for Industrial Control Systems." Security and Communication Networks 2022 (June 22, 2022): 1–19. http://dx.doi.org/10.1155/2022/3455647.
Full textCamargo, Otávio Augusto Maciel, Julio Cesar Duarte, Anderson Fernandes Pereira Dos Santos, and Cesar Augusto Borges. "A Review of Testbeds on SCADA Systems with Malware Analysis." Revista de Informática Teórica e Aplicada 29, no. 2 (May 14, 2022): 84–94. http://dx.doi.org/10.22456/2175-2745.112813.
Full textChen, Lei, Yuan Li, Xingye Deng, Zhaohua Liu, Mingyang Lv, and Hongqiang Zhang. "Dual Auto-Encoder GAN-Based Anomaly Detection for Industrial Control System." Applied Sciences 12, no. 10 (May 15, 2022): 4986. http://dx.doi.org/10.3390/app12104986.
Full textKim, Bedeuro, Mohsen Ali Alawami, Eunsoo Kim, Sanghak Oh, Jeongyong Park, and Hyoungshick Kim. "A Comparative Study of Time Series Anomaly Detection Models for Industrial Control Systems." Sensors 23, no. 3 (January 23, 2023): 1310. http://dx.doi.org/10.3390/s23031310.
Full textKhan, Shaharyar, and Stuart Madnick. "Protecting Chiller Systems from Cyberattack Using a Systems Thinking Approach." Network 2, no. 4 (November 2, 2022): 606–27. http://dx.doi.org/10.3390/network2040035.
Full textJi, Xudong, Hongxing Wei, Youdong Chen, Xiao-Fang Ji, and Guo Wu. "A Three-Stage Dynamic Assessment Framework for Industrial Control System Security Based on a Method of W-HMM." Sensors 22, no. 7 (March 28, 2022): 2593. http://dx.doi.org/10.3390/s22072593.
Full textDu, Yan, Yuanyuan Huang, Guogen Wan, and Peilin He. "Deep Learning-Based Cyber–Physical Feature Fusion for Anomaly Detection in Industrial Control Systems." Mathematics 10, no. 22 (November 20, 2022): 4373. http://dx.doi.org/10.3390/math10224373.
Full textShang, Wenli, and Xiangyu Xing. "ICS Software Trust Measurement Method Based on Dynamic Length Trust Chain." Scientific Programming 2021 (April 26, 2021): 1–11. http://dx.doi.org/10.1155/2021/6691696.
Full textAlkahtani, Hasan, and Theyazn H. H. Aldhyani. "Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems." Electronics 11, no. 11 (May 27, 2022): 1717. http://dx.doi.org/10.3390/electronics11111717.
Full textZhou, Xiaojun, Zhen Xu, Liming Wang, Kai Chen, Cong Chen, and Wei Zhang. "APT Attack Analysis in SCADA Systems." MATEC Web of Conferences 173 (2018): 01010. http://dx.doi.org/10.1051/matecconf/201817301010.
Full textL, Rajesh, and Penke Satyanarayana. "Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol." Security and Communication Networks 2021 (September 27, 2021): 1–15. http://dx.doi.org/10.1155/2021/8887666.
Full textNgambeki, Ida, Sean McBride, and Jill Slay. "Knowledge Gaps in Curricular Guidance for ICS Security." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (March 8, 2022): 6. http://dx.doi.org/10.53735/cisse.v9i1.149.
Full textTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (April 6, 2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Full textZhao, Xiaosong, Lei Zhang, Yixin Cao, Kai Jin, and Yupeng Hou. "Anomaly Detection Approach in Industrial Control Systems Based on Measurement Data." Information 13, no. 10 (September 25, 2022): 450. http://dx.doi.org/10.3390/info13100450.
Full textFährmann, Daniel, Naser Damer, Florian Kirchbuchner, and Arjan Kuijper. "Lightweight Long Short-Term Memory Variational Auto-Encoder for Multivariate Time Series Anomaly Detection in Industrial Control Systems." Sensors 22, no. 8 (April 9, 2022): 2886. http://dx.doi.org/10.3390/s22082886.
Full textLaczewski, Andrzej, and Krzysztof Kasiński. "Flexible Temperature Control Solution for Integrated Circuits Testing—Silicon Creations Thermal Elephant." Electronics 11, no. 22 (November 16, 2022): 3766. http://dx.doi.org/10.3390/electronics11223766.
Full text