Добірка наукової літератури з теми "Industrial Control Systems (ICS)"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Industrial Control Systems (ICS)".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Industrial Control Systems (ICS)"
Cruz, Tiago, Jorge Proença, Paulo Simões, Matthieu Aubigny, Moussa Ouedraogo, Antonio Graziano, and Leandros Maglaras. "A Distributed IDS for Industrial Control Systems." International Journal of Cyber Warfare and Terrorism 4, no. 2 (April 2014): 1–22. http://dx.doi.org/10.4018/ijcwt.2014040101.
Повний текст джерелаChristos P, Beretas. "Industrial control systems: The biggest cyber threat." Annals of Civil and Environmental Engineering 4, no. 1 (December 4, 2020): 044–46. http://dx.doi.org/10.29328/journal.acee.1001026.
Повний текст джерелаKeliris, Anastasis, and Michail Maniatakos. "Demystifying Advanced Persistent Threats for Industrial Control Systems." Mechanical Engineering 139, no. 03 (March 1, 2017): S13—S17. http://dx.doi.org/10.1115/1.2017-mar-6.
Повний текст джерелаVávra, Jan, Martin Hromada, and Roman Jašek. "Specification of the Current State Vulnerabilities Related to Industrial Control Systems." International Journal of Online Engineering (iJOE) 11, no. 5 (September 24, 2015): 64. http://dx.doi.org/10.3991/ijoe.v11i5.4981.
Повний текст джерелаMugavero, Roberto, Stanislav Abaimov, Federico Benolli, and Valentina Sabato. "Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)." International Journal of Information Systems for Crisis Response and Management 10, no. 2 (April 2018): 49–78. http://dx.doi.org/10.4018/ijiscram.2018040103.
Повний текст джерелаSapkota, Subin, A. K. M. Nuhil Mehdy, Stephen Reese, and Hoda Mehrpouyan. "FALCON: Framework for Anomaly Detection in Industrial Control Systems." Electronics 9, no. 8 (July 24, 2020): 1192. http://dx.doi.org/10.3390/electronics9081192.
Повний текст джерелаEmake, Erhovwosere Donald, Ibrahim Adepoju Adeyanju, and Godwin Obruozie Uzedhe. "Industrial Control Systems (ICS): Cyber-attacks & Security Optimization." International Journal of Computer Engineering and Information Technology 12, no. 5 (May 31, 2020): 31–41. http://dx.doi.org/10.47277/ijceit/12(5)1.
Повний текст джерелаStouffer, Keith, and Rick Candell. "Measuring Impact of Cybersecurity on the Performance of Industrial Control Systems." Mechanical Engineering 136, no. 12 (December 1, 2014): S4—S7. http://dx.doi.org/10.1115/1.2014-dec-5.
Повний текст джерелаSohn, Jong Mo, In Tae Lee, and Lim Hyo Chang. "Enhancement of Industrial Control Systems(ICS) Security for Service Company." Journal of Korea Service Management Society 20, no. 4 (November 30, 2019): 183–200. http://dx.doi.org/10.15706/jksms.2019.20.4.010.
Повний текст джерелаGokhale, Sheetal, Ashwini Dalvi, and Irfan Siddavatam. "Industrial Control Systems Honeypot: A Formal Analysis of Conpot." International Journal of Computer Network and Information Security 12, no. 6 (December 8, 2020): 44–56. http://dx.doi.org/10.5815/ijcnis.2020.06.04.
Повний текст джерелаДисертації з теми "Industrial Control Systems (ICS)"
Es-Salhi, Khaoula. "Segmentation and segregation mechanisms and models to secure the integration of Industrial control Systems (ICS) with corporate system." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0143/document.
Повний текст джерелаSecuring ICS systems, and especially integrated ones, is becoming one of the most urgent issues that disquiets not only all industrial actors but also governments. Very important number of industrial entities and infrastructures are so critical that any non contained cyber attack on these entities can cause huge damage to business, to environment and more gravely to national security and people safety.This thesis studies the integration of ICS with Corporate systems from a security standpoint. Our goal is to study integrated ICS systems security vulnerabilities and suggest models and mechanisms to improve their security and protect them against ceyberattacks. After conducting a study on the vulnerabilities of integrated ICS systems (IICS) and the existing security solutions, we focused on the study of defence in depth technique and its applicability to integrated ICS systems. We defined a new generic segmentation method for IICS, SONICS, which simplifies the segmentation of IICS by focusing only on spects that are really significant for segmentation. We next developed an improved version of SONICS, RIICS (Risk based IICS Segmentation), a segmentation method for IICS systems that fills the SONICS gaps by focusing on risk on top of technical and industrial specifications. To complement the segmentation method, we studied segregation and access control solutions. We proposed a new DTE-based l (Domain Type Enforcement) flow control model for integrated ICS systems
Myers, David. "Detecting cyber attacks on industrial control systems using process mining." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/130799/1/David_Myers_Thesis.pdf.
Повний текст джерелаAbdulrazzaq, Mohammed, та Yuan Wei. "Industrial Control System (ICS) Network Asset Identification and Risk Management". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38198.
Повний текст джерелаElrod, Michael. "A Novel Approach to Determining Real-Time Risk Probabilities in Critical Infrastructure Industrial Control Systems." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1006.
Повний текст джерелаBenjuma, Nuria Mahmud. "An educational framework to support industrial control system security engineering." Thesis, De Montfort University, 2017. http://hdl.handle.net/2086/15494.
Повний текст джерелаWyman, Matthew Cody. "The SAP Link: A Controller Architecture for Secure Industrial Control Systems." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8815.
Повний текст джерелаAndersson, Dorothea. "Simulation of industrial control system field devices for cyber security." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202405.
Повний текст джерелаIndustriella informations- och styrsystem utgör en viktig delav vårt moderna samhälle, inte minst när det gäller kontroll och skydd avkritisk infrastruktur som elnät och vattenförsörjning. Det finns stora behov avatt säkerhetstesta dessa typer av system, vilket ofta är omöjligt iproduktionsmiljöer med realtidskrav som är erkänt känsliga för störningar, tilloch med från vanligt förekommande analysverktyg. Denna rapport presenterarhur vanliga komponenter i industriella informations- och styrsystem kansimuleras för att lura potentiella antagonister, och hur de kan användas ivirtualiserade styrsystem för cybersäkerhetsforskning. 8 olika komponentersimulerades med hjälp av Honeyd, och en generellt applicerbarsimuleringsmetodik utvecklades. Hur dessa simuleringar kan vidareutvecklasför att fungera som riktiga styrsystemskomponenter i virtualiserade miljöer harockså undersökts.
Kulhánek, Radek. "Návrh na zavedení průmyslového řešení ISMS ve výrobní společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241566.
Повний текст джерелаEriksson, Alma, and Oskar Lindh. "Modellering av en cyberattack på ett industriellt säkerhetssystem." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295620.
Повний текст джерелаStuxnet, Havex, BlackEnergy, Crashoverride och Triton/Trisis är alla exempel på cybersäkerhetsincidenter där industrisystem blivit angripna. Händelsen Triton/Trisis är ny i sitt slag, eftersom angriparen kom hela vägen in i det industriella säkerhetssystemet i ett olje- och gasraffinaderi. Ä ven om det slutliga målet för attacken fortfarande är okänt, hade angriparen möjlighet att sätta människor i fara. Detaljer av attacken är fortfarande okända och forskning samt rekonstruktion av attacken pågår. Syftet med denna studie är att skapa en attackgraf över incidenten. Genom att samla in och kombinera information från allmänt tillgängligt material och betygsätta alla källor genom dess tillförlitlighet resulterade studien i en attackgraf med två lager. Varje nod och vektor i grafen har givits en tillförlitlighet och noderna innehåller relaterade källor, verktyg och nätverkssegment. Studien visar att det är möjligt att konstruera en attackgraf av incidenten även om det saknas detaljer. Dessutom visar den att den specifika skadliga koden var skräddarsydd, men stegen som behövdes för att nå det industriella säkerhetssystemet var till stor del möjliga med hjälp av offentligt tillgängliga verktyg. Som ett resultat behöver hela den industriella industrin förbereda sig för en upptrappning av cybersäkerhetsincidenter.
Kandidatexjobb i elektroteknik 2020, KTH, Stockholm
Kabir-Querrec, Maëlle. "Cyber sécurité des systèmes industriels pour les smart-grids : détection d'intrusion dans les réseaux de communication IEC 61850." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT032/document.
Повний текст джерелаInformation and Communication Technologies have been pervading Industrial Automation and Control Systems (IACS) for a few decades now. Initially, IACS ran proprietary protocols on closed networks, thus ensuring some level of security through obscurity and isolation. Technologies and usages have evolved and today this intrinsic security does not exist any longer, though. This transition is in progress in the electricity domain, the power infrastructure turning into the "smart grid".The IEC 61850 standard is key to the smart grid development. It is aimed at making interoperability possible in ``Communication networks and systems for power utility automation''. It thus defines a common data object model and a stack of protocols answering different purposes.Although the cyber risk in IACS is now widely acknowledged, IEC 61850 does not address cyber security in any way whatsoever.This work tackles the question of cyber security through network intrusion detection in IEC 61850 networks, and more specifically in real-time GOOSE communications. The idea is to get the most out of the protocol specifications and system configuration while developing a tailored NIDS. This enables detection accuracy
Книги з теми "Industrial Control Systems (ICS)"
International IEEE/IAS Conference on Industrial Automation and Control: Emerging Technologies (1995 Taipei, Taiwan). 1995 International IEEE/IAS Conference on Industrial Automation and Control: Emerging Technologies: May 22-27, 1995, National Taipei Institute of Technology, Taipei, Taiwan, R.O.C. [New York: Institute of Electrical and Electronics Engineers, 1995.
Знайти повний текст джерелаGilbert, Robert C., and Angela M. Schultz. Industrial control systems. Hauppauge, N.Y: Nova Science Publishers, 2011.
Знайти повний текст джерелаW, Fardo Stephen, ed. Industrial process control systems. Englewood Cliffs, N.J: Prentice-Hall, 1985.
Знайти повний текст джерелаPatrick, Dale R. Industrial process control systems. Albany: Delmar, 1997.
Знайти повний текст джерелаGrimble, Michael J. Robust Industrial Control Systems. Chichester, England: John Wiley & Sons Ltd, 2006. http://dx.doi.org/10.1002/9780470020753.
Повний текст джерелаGrimble, Michael J., and Paweł Majecki. Nonlinear Industrial Control Systems. London: Springer London, 2020. http://dx.doi.org/10.1007/978-1-4471-7457-8.
Повний текст джерелаW, Fardo Stephen, ed. Industrial process control systems. 2nd ed. Atlanta, GA: Fairmont Press, Inc., 2009.
Знайти повний текст джерела1954-, Warwick K., Rees D, and Institution of Electrical Engineers, eds. Industrial digital control systems. London: Peregrinus on behalf of the Institution of Electrical Engineers, 1988.
Знайти повний текст джерелаauthor, Phelps Burton W., ed. Command and control: ICS, strategy development and tactical selections. Stillwater, Oklahoma: Fire Protection Publications, 2012.
Знайти повний текст джерелаVijay, Govindarajan, ed. Management control systems. Boston: McGraw-Hill/Irwin, 2007.
Знайти повний текст джерелаЧастини книг з теми "Industrial Control Systems (ICS)"
Haber, Morey J., and Brad Hibbert. "Industrial Control Systems (ICS)." In Privileged Attack Vectors, 131–37. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3048-0_13.
Повний текст джерелаDutta, Nitul, Nilesh Jadav, Nirali Dutiya, and Dhara Joshi. "Using Honeypots for ICS Threats Evaluation." In Recent Developments on Industrial Control Systems Resilience, 175–96. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_9.
Повний текст джерелаGaiceanu, Marian, Marilena Stanculescu, Paul Cristian Andrei, Vasile Solcanu, Theodora Gaiceanu, and Horia Andrei. "Intrusion Detection on ICS and SCADA Networks." In Recent Developments on Industrial Control Systems Resilience, 197–262. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_10.
Повний текст джерелаHaber, Morey J. "Industrial Control Systems (ICS) and Internet of Things (IoT)." In Privileged Attack Vectors, 203–14. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5914-6_14.
Повний текст джерелаWeiss, Joe. "Industrial Control System (ICS) Cyber Security for Water and Wastewater Systems." In Securing Water and Wastewater Systems, 87–105. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-01092-2_3.
Повний текст джерелаLou, Xinxin, and Asmaa Tellabi. "Cybersecurity Threats, Vulnerability and Analysis in Safety Critical Industrial Control System (ICS)." In Recent Developments on Industrial Control Systems Resilience, 75–97. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_4.
Повний текст джерелаLou, Xinxin, and Asmaa Tellabi. "Correction to: Cybersecurity Threats, Vulnerability and Analysis in Safety Critical Industrial Control System (ICS)." In Recent Developments on Industrial Control Systems Resilience, C1. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-31328-9_14.
Повний текст джерелаZanutto, Alberto. "Exploring the Grey Area of Cyber Security in Industrial Control Systems (ICS)." In Inside Hazardous Technological Systems, 221–36. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9780429281587-14.
Повний текст джерелаNguyen, Huu Phuoc Dai, Lourdes Ruiz, and Zóltan Rajnai. "Industrial Control System (ICS): The General Overview of the Security Issues and Countermeasures." In Informatics and Cybernetics in Intelligent Systems, 412–19. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77448-6_39.
Повний текст джерелаYoo, Hyunguk, and Irfan Ahmed. "Control Logic Injection Attacks on Industrial Control Systems." In ICT Systems Security and Privacy Protection, 33–48. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22312-0_3.
Повний текст джерелаТези доповідей конференцій з теми "Industrial Control Systems (ICS)"
Knowles, William, Jose M. Such, Antonios Gouglidis, Gaurav Misra, and Awais Rashid. "Assurance Techniques for Industrial Control Systems (ICS)." In the First ACM Workshop. New York, New York, USA: ACM Press, 2015. http://dx.doi.org/10.1145/2808705.2808710.
Повний текст джерелаHe, Ying Jian, and Helge Janicke. "Towards Agile Industrial Control Systems Incident Response." In 3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015). BCS Learning & Development, 2015. http://dx.doi.org/10.14236/ewic/ics2015.11.
Повний текст джерелаChapas, Robin, Ana Hristova, Thomas Locher, and Sebastian Obermeier. "Securing Industrial Control Systems through Autonomous Hardening." In 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014). BCS Learning & Development, 2014. http://dx.doi.org/10.14236/ewic/icscsr2014.3.
Повний текст джерелаBoyes, H. "Best Practices in an ICS Environment." In Cyber Security for Industrial Control Systems. Institution of Engineering and Technology, 2015. http://dx.doi.org/10.1049/ic.2015.0006.
Повний текст джерелаAlMedires, Motaz, and Mohammed AlMaiah. "Cybersecurity in Industrial Control System (ICS)." In 2021 International Conference on Information Technology (ICIT). IEEE, 2021. http://dx.doi.org/10.1109/icit52682.2021.9491741.
Повний текст джерелаGreen, Benjamin R., Daniel E. Prince, Utz Roedig, Jerry S. Busby, and David Hutchison. "Socio-Technical Security Analysis of Industrial Control Systems (ICS)." In 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014). BCS Learning & Development, 2014. http://dx.doi.org/10.14236/ewic/icscsr2014.2.
Повний текст джерелаMorris, Thomas H., and Wei Gao. "Industrial Control System Cyber Attacks." In 1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013). BCS Learning & Development, 2013. http://dx.doi.org/10.14236/ewic/icscsr2013.3.
Повний текст джерелаLemaire, Laurens, Jan Vossaert, Joachim Jansen, and Vincent Naessens. "Extracting Vulnerabilities in Industrial Control Systems using a Knowledge-Based System." In 3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015). BCS Learning & Development, 2015. http://dx.doi.org/10.14236/ewic/ics2015.1.
Повний текст джерелаChekole, Eyasu Getahun, and Guo Huaqun. "ICS-SEA." In ICSS: Fifth Annual Industrial Control System Security Workshop. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3372318.3372325.
Повний текст джерелаGreen, Benjamin, Daniel Prince, Utz Roedig, Jerry Busby, and David Hutchison. "Socio-Technical Security Analysis of Industrial Control Systems (ICS)." In 2nd International Symposium for ICS & SCADA Cyber Security Research 2014. BCS Learning & Development, 2014. http://dx.doi.org/10.14236/ewic/ics-csr2014.2.
Повний текст джерелаЗвіти організацій з теми "Industrial Control Systems (ICS)"
Stouffer, K. A., J. A. Falco, and K. A. Scarfone. Guide to Industrial control Systems (ICS) security :. Gaithersburg, MD: National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-82e2008.
Повний текст джерелаStouffer, Keith, Victoria Pillitteri, Suzanne Lightman, Marshall Abrams, and Adam Hahn. Guide to Industrial Control Systems (ICS) Security. National Institute of Standards and Technology, June 2015. http://dx.doi.org/10.6028/nist.sp.800-82r2.
Повний текст джерелаStouffer, Keith, Joe Falco, and Karen Scarfone. Guide to Industrial Control Systems (ICS) Security : Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC). National Institute of Standards and Technology, May 2013. http://dx.doi.org/10.6028/nist.sp.800-82r1.
Повний текст джерелаStouffer, Keith, Joe Falco, and Karen Scarfone. Guide to Industrial Control Systems (ICS) Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC). Gaithersburg, MD: National Institute of Standards and Technology, June 2011. http://dx.doi.org/10.6028/nist.sp.800.82.
Повний текст джерелаStouffer, Keith, Joe Falco, and Karen Scarfone. Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) : recommendations of the National Institute of Standards and Technology, Computer security. Gaithersburg, MD: National Institute of Standards and Technology, June 2011. http://dx.doi.org/10.6028/nist.sp.800-82.
Повний текст джерелаMcCarthy, James, Michael Powell, Keith Stouffer, CheeYee Tang, Timothy Zimmerman, William Barker, Titilayo Ogunyale, Devin Wynne, and Johnathan Wiltberger. Securing manufacturing industrial control systems:. Gaithersburg, MD: National Institute of Standards and Technology, July 2020. http://dx.doi.org/10.6028/nist.ir.8219.
Повний текст джерелаFalco, J., K. Stouffer, A. Wavering, and F. Proctor. IT security for industrial control systems. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.ir.6859.
Повний текст джерелаDuggan, David P. Generic attack approaches for industrial control systems. Office of Scientific and Technical Information (OSTI), January 2006. http://dx.doi.org/10.2172/1177071.
Повний текст джерелаBarnett, Robert, Richard Poland, and Ryan Cruz. Embedded Hardware Solution for Cybersecurity in Industrial Control Systems. Office of Scientific and Technical Information (OSTI), October 2018. http://dx.doi.org/10.2172/1476265.
Повний текст джерелаDawson, Lon Andrew, Christopher Lamb, and Armida J. Carbajal. Industrial Control Systems Cyber Security Risk Candidate Methods Analysis. Office of Scientific and Technical Information (OSTI), July 2018. http://dx.doi.org/10.2172/1463794.
Повний текст джерела