Journal articles on the topic 'Stealthy attacks on ICS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Stealthy attacks on ICS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mokhtari, Sohrab, Alireza Abbaspour, Kang K. Yen, and Arman Sargolzaei. "A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data." Electronics 10, no. 4 (February 8, 2021): 407. http://dx.doi.org/10.3390/electronics10040407.
Full textZhao, Xiaosong, Lei Zhang, Yixin Cao, Kai Jin, and Yupeng Hou. "Anomaly Detection Approach in Industrial Control Systems Based on Measurement Data." Information 13, no. 10 (September 25, 2022): 450. http://dx.doi.org/10.3390/info13100450.
Full textPuzankov, Sergey. "Stealthy SS7 Attacks." Journal of ICT Standardization 5, no. 1 (2017): 39–52. http://dx.doi.org/10.13052/jicts2245-800x.512.
Full textNa, Gyujin, Hanbit Lee, and Yongsoon Eun. "A Multiplicative Coordinated Stealthy Attack for Nonlinear Cyber-Physical Systems with Homogeneous Property." Mathematical Problems in Engineering 2019 (August 29, 2019): 1–13. http://dx.doi.org/10.1155/2019/7280474.
Full textSHINOHARA, Takumi, and Toru NAMERIKAWA. "Perfect Stealthy Attacks in Cyber-physical Systems." Transactions of the Society of Instrument and Control Engineers 54, no. 3 (2018): 309–19. http://dx.doi.org/10.9746/sicetr.54.309.
Full textDegue, Kwassi Holali, Jerome Le Ny, and Denis Efimov. "Stealthy attacks and attack-resilient interval observers." Automatica 146 (December 2022): 110558. http://dx.doi.org/10.1016/j.automatica.2022.110558.
Full textWang, Zhenqian, and Yongqiang Wang. "Pulse-Coupled Oscillators Resilient to Stealthy Attacks." IEEE Transactions on Signal Processing 66, no. 12 (June 1, 2018): 3086–99. http://dx.doi.org/10.1109/tsp.2018.2824285.
Full textLi, Xuerong, Ping Zhang, and Hongli Dong. "Robust Stealthy Covert Attacks on Cyber-Physical Systems." IFAC-PapersOnLine 55, no. 6 (2022): 520–25. http://dx.doi.org/10.1016/j.ifacol.2022.07.181.
Full textRubinstein, Benjamin I. P., Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, and J. D. Tygar. "Stealthy poisoning attacks on PCA-based anomaly detectors." ACM SIGMETRICS Performance Evaluation Review 37, no. 2 (October 16, 2009): 73–74. http://dx.doi.org/10.1145/1639562.1639592.
Full textDash, Pritam, Mehdi Karimibiuki, and Karthik Pattabiraman. "Stealthy Attacks against Robotic Vehicles Protected by Control-based Intrusion Detection Techniques." Digital Threats: Research and Practice 2, no. 1 (March 2021): 1–25. http://dx.doi.org/10.1145/3419474.
Full textKeliris, Anastasis, and Michail Maniatakos. "Demystifying Advanced Persistent Threats for Industrial Control Systems." Mechanical Engineering 139, no. 03 (March 1, 2017): S13—S17. http://dx.doi.org/10.1115/1.2017-mar-6.
Full textWang, Mufeng, Yangyang Geng, Jingpei Wang, Ke Liu, Xin Che, and Qiang Wei. "H∞ Control for ICPS with Hybrid-Triggered Mechanism Encountering Stealthy DoS Jamming Attacks." Actuators 11, no. 7 (July 16, 2022): 193. http://dx.doi.org/10.3390/act11070193.
Full textLi, Weize, Lun Xie, and Zhiliang Wang. "A Novel Covert Agent for Stealthy Attacks on Industrial Control Systems Using Least Squares Support Vector Regression." Journal of Electrical and Computer Engineering 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/7204939.
Full textDuan, Qi, Ehab Al-Shaer, Samrat Chatterjee, Mahantesh Halappanavar, and Christopher Oehmen. "Proactive routing mutation against stealthy Distributed Denial of Service attacks: metrics, modeling, and analysis." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 2 (October 13, 2017): 219–30. http://dx.doi.org/10.1177/1548512917731002.
Full textBonczek, Paul J., and Nicola Bezzo. "Memoryless Cumulative Sign Detector for Stealthy CPS Sensor Attacks." IFAC-PapersOnLine 53, no. 2 (2020): 838–44. http://dx.doi.org/10.1016/j.ifacol.2020.12.840.
Full textSun, Jianwen, Tianwei Zhang, Xiaofei Xie, Lei Ma, Yan Zheng, Kangjie Chen, and Yang Liu. "Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (April 3, 2020): 5883–91. http://dx.doi.org/10.1609/aaai.v34i04.6047.
Full textIori, Yugo, and Hideaki Ishii. "Resilient Synchronization of Pulse-Coupled Oscillators under Stealthy Attacks." IFAC-PapersOnLine 54, no. 14 (2021): 424–29. http://dx.doi.org/10.1016/j.ifacol.2021.10.391.
Full textConstante-Flores, Gonzalo E., Antonio J. Conejo, and Jiankang Wang. "Stealthy monitoring-control attacks to disrupt power system operations." Electric Power Systems Research 203 (February 2022): 107636. http://dx.doi.org/10.1016/j.epsr.2021.107636.
Full textSui, Tianju, and Xi-Ming Sun. "The vulnerability of distributed state estimator under stealthy attacks." Automatica 133 (November 2021): 109869. http://dx.doi.org/10.1016/j.automatica.2021.109869.
Full textNewman, Sean. "Under the radar: the danger of stealthy DDoS attacks." Network Security 2019, no. 2 (February 2019): 18–19. http://dx.doi.org/10.1016/s1353-4858(19)30025-x.
Full textSood, Aditya K., Sherali Zeadally, and Rohit Bansal. "Exploiting Trust: Stealthy Attacks Through Socioware and Insider Threats." IEEE Systems Journal 11, no. 2 (June 2017): 415–26. http://dx.doi.org/10.1109/jsyst.2015.2388707.
Full textYu, Wenbin, Yiyin Wang, and Lei Song. "A Two Stage Intrusion Detection System for Industrial Control Networks Based on Ethernet/IP." Electronics 8, no. 12 (December 15, 2019): 1545. http://dx.doi.org/10.3390/electronics8121545.
Full textZhao, Feng, Li Zhou, Qi Zhong, Rushi Lan, and Leo Yu Zhang. "Natural Backdoor Attacks on Deep Neural Networks via Raindrops." Security and Communication Networks 2022 (March 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/4593002.
Full textTripathi, Nikhil, and Neminath Hubballi. "Application Layer Denial-of-Service Attacks and Defense Mechanisms." ACM Computing Surveys 54, no. 4 (May 2021): 1–33. http://dx.doi.org/10.1145/3448291.
Full textZhou, Boyang, Chunming Wu, Qiang Yang, Xiang Chen, and Dong Zhang. "A Persistent Route Diversification Mechanism for Defending against Stealthy Crossfire Attack." Security and Communication Networks 2022 (December 31, 2022): 1–20. http://dx.doi.org/10.1155/2022/2566681.
Full textCheng, Donny, Jun Shang, and Tongwen Chen. "Finite-Horizon Strictly Stealthy Deterministic Attacks on Cyber-Physical Systems." IEEE Control Systems Letters 6 (2022): 1640–45. http://dx.doi.org/10.1109/lcsys.2021.3130077.
Full textZhang, Qi, Carla Seatzu, Zhiwu Li, and Alessandro Giua. "Stealthy Sensor Attacks for Plants Modeled by Labeled Petri Nets." IFAC-PapersOnLine 53, no. 4 (2020): 14–20. http://dx.doi.org/10.1016/j.ifacol.2021.04.048.
Full textHuang, Jiahao, Yang Tang, Wen Yang, and Fangfei Li. "Resilient Consensus-Based Distributed Filtering: Convergence Analysis Under Stealthy Attacks." IEEE Transactions on Industrial Informatics 16, no. 7 (July 2020): 4878–88. http://dx.doi.org/10.1109/tii.2019.2960042.
Full textChen, Li Ming, Meng Chang Chen, Wanjiun Liao, and Yeali S. Sun. "A scalable network forensics mechanism for stealthy self-propagating attacks." Computer Communications 36, no. 13 (July 2013): 1471–84. http://dx.doi.org/10.1016/j.comcom.2013.05.005.
Full textZhao, Chengcheng, Jianping He, Peng Cheng, and Jiming Chen. "Analysis of Consensus-Based Distributed Economic Dispatch Under Stealthy Attacks." IEEE Transactions on Industrial Electronics 64, no. 6 (June 2017): 5107–17. http://dx.doi.org/10.1109/tie.2016.2638400.
Full textKhalil, Issa, and Saurabh Bagchi. "Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure." IEEE Transactions on Mobile Computing 10, no. 8 (August 2011): 1096–112. http://dx.doi.org/10.1109/tmc.2010.249.
Full textDutta, Abhishek, and Cedric Langbort. "Stealthy output injection attacks on control systems with bounded variables." International Journal of Control 90, no. 7 (July 27, 2016): 1389–402. http://dx.doi.org/10.1080/00207179.2016.1207099.
Full textLi, Yi-Gang, and Guang-Hong Yang. "Optimal stealthy false data injection attacks in cyber-physical systems." Information Sciences 481 (May 2019): 474–90. http://dx.doi.org/10.1016/j.ins.2019.01.001.
Full textCao, Yixin, Lei Zhang, Xiaosong Zhao, Kai Jin, and Ziyi Chen. "An Intrusion Detection Method for Industrial Control System Based on Machine Learning." Information 13, no. 7 (July 3, 2022): 322. http://dx.doi.org/10.3390/info13070322.
Full textZhao, Bo, Peng Sun, Tao Wang, and Keyu Jiang. "FedInv: Byzantine-Robust Federated Learning by Inversing Local Model Updates." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 8 (June 28, 2022): 9171–79. http://dx.doi.org/10.1609/aaai.v36i8.20903.
Full textEmake, Erhovwosere Donald, Ibrahim Adepoju Adeyanju, and Godwin Obruozie Uzedhe. "Industrial Control Systems (ICS): Cyber-attacks & Security Optimization." International Journal of Computer Engineering and Information Technology 12, no. 5 (May 31, 2020): 31–41. http://dx.doi.org/10.47277/ijceit/12(5)1.
Full textZiayi, Parimah, Seyed Mostafa Farmanbar, and Mohsen Rezvani. "YAICD: Yet Another IMSI Catcher Detector in GSM." Security and Communication Networks 2021 (January 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/8847803.
Full textL, Rajesh, and Penke Satyanarayana. "Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol." Security and Communication Networks 2021 (September 27, 2021): 1–15. http://dx.doi.org/10.1155/2021/8887666.
Full textZhang, Yipeng, Min Li, Xiaoming Zhang, Yueying He, and Zhoujun Li. "Defeat Magic with Magic: A Novel Ransomware Attack Method to Dynamically Generate Malicious Payloads Based on PLC Control Logic." Applied Sciences 12, no. 17 (August 23, 2022): 8408. http://dx.doi.org/10.3390/app12178408.
Full textLiyakkathali, Salimah, Francisco Furtado, Gayathri Sugumar, and Aditya Mathur. "A Mechanism to Assess the Effectiveness Anomaly Detectors in Industrial Control Systems." Journal of Integrated Design and Process Science 24, no. 3-4 (April 11, 2022): 35–50. http://dx.doi.org/10.3233/jid-210023.
Full textLiu, Hao, Ben Niu, and Jiahu Qin. "Reachability Analysis for Linear Discrete-Time Systems Under Stealthy Cyber Attacks." IEEE Transactions on Automatic Control 66, no. 9 (September 2021): 4444–51. http://dx.doi.org/10.1109/tac.2021.3050549.
Full textJames Ranjith Kumar, R., and Biplab Sikdar. "Detection of Stealthy Cyber-Physical Line Disconnection Attacks in Smart Grid." IEEE Transactions on Smart Grid 12, no. 5 (September 2021): 4484–93. http://dx.doi.org/10.1109/tsg.2021.3082543.
Full textAydeger, Abdullah, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, and Kemal Akkaya. "Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach." IEEE Transactions on Network Science and Engineering 8, no. 1 (January 1, 2021): 751–64. http://dx.doi.org/10.1109/tnse.2021.3052090.
Full textManohar, RamPradheep, and E. Baburaj. "GA BASED CONTAINMENT ALGORITHM AGAINST STEALTHY ATTACKS IN WIRELESS SENSOR NETWORKS." International Journal of Advanced Research 4, no. 8 (August 31, 2016): 953–59. http://dx.doi.org/10.21474/ijar01/1292.
Full textLi, Yi-Gang, and Guang-Hong Yang. "Optimal completely stealthy attacks against remote estimation in cyber-physical systems." Information Sciences 590 (April 2022): 15–28. http://dx.doi.org/10.1016/j.ins.2022.01.014.
Full textKwon, Cheolhyeon, Weiyi Liu, and Inseok Hwang. "Analysis and Design of Stealthy Cyber Attacks on Unmanned Aerial Systems." Journal of Aerospace Information Systems 11, no. 8 (August 2014): 525–39. http://dx.doi.org/10.2514/1.i010201.
Full textFang, Chongrong, Yifei Qi, Jiming Chen, Rui Tan, and Wei Xing Zheng. "Stealthy Actuator Signal Attacks in Stochastic Control Systems: Performance and Limitations." IEEE Transactions on Automatic Control 65, no. 9 (September 2020): 3927–34. http://dx.doi.org/10.1109/tac.2019.2950072.
Full textKalutarage, Harsha K., Siraj A. Shaikh, Indika P. Wickramasinghe, Qin Zhou, and Anne E. James. "Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks." Computers & Electrical Engineering 47 (October 2015): 327–44. http://dx.doi.org/10.1016/j.compeleceng.2015.07.007.
Full textLi, Xin, Guoliang Wei, and Derui Ding. "Interval Observer Design Under Stealthy Attacks and Improved Event-Triggered Protocols." IEEE Transactions on Signal and Information Processing over Networks 6 (2020): 570–79. http://dx.doi.org/10.1109/tsipn.2020.3012254.
Full textMuruganandam, D., and J. Martin Leo Manickam. "An efficient technique for mitigating stealthy attacks using MNDA in MANET." Neural Computing and Applications 31, S1 (July 31, 2018): 15–22. http://dx.doi.org/10.1007/s00521-018-3634-7.
Full text