Статті в журналах з теми "Stealthy attacks on ICS"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Stealthy attacks on ICS".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Mokhtari, Sohrab, Alireza Abbaspour, Kang K. Yen, and Arman Sargolzaei. "A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data." Electronics 10, no. 4 (February 8, 2021): 407. http://dx.doi.org/10.3390/electronics10040407.
Повний текст джерелаZhao, Xiaosong, Lei Zhang, Yixin Cao, Kai Jin, and Yupeng Hou. "Anomaly Detection Approach in Industrial Control Systems Based on Measurement Data." Information 13, no. 10 (September 25, 2022): 450. http://dx.doi.org/10.3390/info13100450.
Повний текст джерелаPuzankov, Sergey. "Stealthy SS7 Attacks." Journal of ICT Standardization 5, no. 1 (2017): 39–52. http://dx.doi.org/10.13052/jicts2245-800x.512.
Повний текст джерелаNa, Gyujin, Hanbit Lee, and Yongsoon Eun. "A Multiplicative Coordinated Stealthy Attack for Nonlinear Cyber-Physical Systems with Homogeneous Property." Mathematical Problems in Engineering 2019 (August 29, 2019): 1–13. http://dx.doi.org/10.1155/2019/7280474.
Повний текст джерелаSHINOHARA, Takumi, and Toru NAMERIKAWA. "Perfect Stealthy Attacks in Cyber-physical Systems." Transactions of the Society of Instrument and Control Engineers 54, no. 3 (2018): 309–19. http://dx.doi.org/10.9746/sicetr.54.309.
Повний текст джерелаDegue, Kwassi Holali, Jerome Le Ny, and Denis Efimov. "Stealthy attacks and attack-resilient interval observers." Automatica 146 (December 2022): 110558. http://dx.doi.org/10.1016/j.automatica.2022.110558.
Повний текст джерелаWang, Zhenqian, and Yongqiang Wang. "Pulse-Coupled Oscillators Resilient to Stealthy Attacks." IEEE Transactions on Signal Processing 66, no. 12 (June 1, 2018): 3086–99. http://dx.doi.org/10.1109/tsp.2018.2824285.
Повний текст джерелаLi, Xuerong, Ping Zhang, and Hongli Dong. "Robust Stealthy Covert Attacks on Cyber-Physical Systems." IFAC-PapersOnLine 55, no. 6 (2022): 520–25. http://dx.doi.org/10.1016/j.ifacol.2022.07.181.
Повний текст джерелаRubinstein, Benjamin I. P., Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, and J. D. Tygar. "Stealthy poisoning attacks on PCA-based anomaly detectors." ACM SIGMETRICS Performance Evaluation Review 37, no. 2 (October 16, 2009): 73–74. http://dx.doi.org/10.1145/1639562.1639592.
Повний текст джерелаDash, Pritam, Mehdi Karimibiuki, and Karthik Pattabiraman. "Stealthy Attacks against Robotic Vehicles Protected by Control-based Intrusion Detection Techniques." Digital Threats: Research and Practice 2, no. 1 (March 2021): 1–25. http://dx.doi.org/10.1145/3419474.
Повний текст джерелаKeliris, Anastasis, and Michail Maniatakos. "Demystifying Advanced Persistent Threats for Industrial Control Systems." Mechanical Engineering 139, no. 03 (March 1, 2017): S13—S17. http://dx.doi.org/10.1115/1.2017-mar-6.
Повний текст джерелаWang, Mufeng, Yangyang Geng, Jingpei Wang, Ke Liu, Xin Che, and Qiang Wei. "H∞ Control for ICPS with Hybrid-Triggered Mechanism Encountering Stealthy DoS Jamming Attacks." Actuators 11, no. 7 (July 16, 2022): 193. http://dx.doi.org/10.3390/act11070193.
Повний текст джерелаLi, Weize, Lun Xie, and Zhiliang Wang. "A Novel Covert Agent for Stealthy Attacks on Industrial Control Systems Using Least Squares Support Vector Regression." Journal of Electrical and Computer Engineering 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/7204939.
Повний текст джерелаDuan, Qi, Ehab Al-Shaer, Samrat Chatterjee, Mahantesh Halappanavar, and Christopher Oehmen. "Proactive routing mutation against stealthy Distributed Denial of Service attacks: metrics, modeling, and analysis." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 2 (October 13, 2017): 219–30. http://dx.doi.org/10.1177/1548512917731002.
Повний текст джерелаBonczek, Paul J., and Nicola Bezzo. "Memoryless Cumulative Sign Detector for Stealthy CPS Sensor Attacks." IFAC-PapersOnLine 53, no. 2 (2020): 838–44. http://dx.doi.org/10.1016/j.ifacol.2020.12.840.
Повний текст джерелаSun, Jianwen, Tianwei Zhang, Xiaofei Xie, Lei Ma, Yan Zheng, Kangjie Chen, and Yang Liu. "Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (April 3, 2020): 5883–91. http://dx.doi.org/10.1609/aaai.v34i04.6047.
Повний текст джерелаIori, Yugo, and Hideaki Ishii. "Resilient Synchronization of Pulse-Coupled Oscillators under Stealthy Attacks." IFAC-PapersOnLine 54, no. 14 (2021): 424–29. http://dx.doi.org/10.1016/j.ifacol.2021.10.391.
Повний текст джерелаConstante-Flores, Gonzalo E., Antonio J. Conejo, and Jiankang Wang. "Stealthy monitoring-control attacks to disrupt power system operations." Electric Power Systems Research 203 (February 2022): 107636. http://dx.doi.org/10.1016/j.epsr.2021.107636.
Повний текст джерелаSui, Tianju, and Xi-Ming Sun. "The vulnerability of distributed state estimator under stealthy attacks." Automatica 133 (November 2021): 109869. http://dx.doi.org/10.1016/j.automatica.2021.109869.
Повний текст джерелаNewman, Sean. "Under the radar: the danger of stealthy DDoS attacks." Network Security 2019, no. 2 (February 2019): 18–19. http://dx.doi.org/10.1016/s1353-4858(19)30025-x.
Повний текст джерелаSood, Aditya K., Sherali Zeadally, and Rohit Bansal. "Exploiting Trust: Stealthy Attacks Through Socioware and Insider Threats." IEEE Systems Journal 11, no. 2 (June 2017): 415–26. http://dx.doi.org/10.1109/jsyst.2015.2388707.
Повний текст джерелаYu, Wenbin, Yiyin Wang, and Lei Song. "A Two Stage Intrusion Detection System for Industrial Control Networks Based on Ethernet/IP." Electronics 8, no. 12 (December 15, 2019): 1545. http://dx.doi.org/10.3390/electronics8121545.
Повний текст джерелаZhao, Feng, Li Zhou, Qi Zhong, Rushi Lan, and Leo Yu Zhang. "Natural Backdoor Attacks on Deep Neural Networks via Raindrops." Security and Communication Networks 2022 (March 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/4593002.
Повний текст джерелаTripathi, Nikhil, and Neminath Hubballi. "Application Layer Denial-of-Service Attacks and Defense Mechanisms." ACM Computing Surveys 54, no. 4 (May 2021): 1–33. http://dx.doi.org/10.1145/3448291.
Повний текст джерелаZhou, Boyang, Chunming Wu, Qiang Yang, Xiang Chen, and Dong Zhang. "A Persistent Route Diversification Mechanism for Defending against Stealthy Crossfire Attack." Security and Communication Networks 2022 (December 31, 2022): 1–20. http://dx.doi.org/10.1155/2022/2566681.
Повний текст джерелаCheng, Donny, Jun Shang, and Tongwen Chen. "Finite-Horizon Strictly Stealthy Deterministic Attacks on Cyber-Physical Systems." IEEE Control Systems Letters 6 (2022): 1640–45. http://dx.doi.org/10.1109/lcsys.2021.3130077.
Повний текст джерелаZhang, Qi, Carla Seatzu, Zhiwu Li, and Alessandro Giua. "Stealthy Sensor Attacks for Plants Modeled by Labeled Petri Nets." IFAC-PapersOnLine 53, no. 4 (2020): 14–20. http://dx.doi.org/10.1016/j.ifacol.2021.04.048.
Повний текст джерелаHuang, Jiahao, Yang Tang, Wen Yang, and Fangfei Li. "Resilient Consensus-Based Distributed Filtering: Convergence Analysis Under Stealthy Attacks." IEEE Transactions on Industrial Informatics 16, no. 7 (July 2020): 4878–88. http://dx.doi.org/10.1109/tii.2019.2960042.
Повний текст джерелаChen, Li Ming, Meng Chang Chen, Wanjiun Liao, and Yeali S. Sun. "A scalable network forensics mechanism for stealthy self-propagating attacks." Computer Communications 36, no. 13 (July 2013): 1471–84. http://dx.doi.org/10.1016/j.comcom.2013.05.005.
Повний текст джерелаZhao, Chengcheng, Jianping He, Peng Cheng, and Jiming Chen. "Analysis of Consensus-Based Distributed Economic Dispatch Under Stealthy Attacks." IEEE Transactions on Industrial Electronics 64, no. 6 (June 2017): 5107–17. http://dx.doi.org/10.1109/tie.2016.2638400.
Повний текст джерелаKhalil, Issa, and Saurabh Bagchi. "Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure." IEEE Transactions on Mobile Computing 10, no. 8 (August 2011): 1096–112. http://dx.doi.org/10.1109/tmc.2010.249.
Повний текст джерелаDutta, Abhishek, and Cedric Langbort. "Stealthy output injection attacks on control systems with bounded variables." International Journal of Control 90, no. 7 (July 27, 2016): 1389–402. http://dx.doi.org/10.1080/00207179.2016.1207099.
Повний текст джерелаLi, Yi-Gang, and Guang-Hong Yang. "Optimal stealthy false data injection attacks in cyber-physical systems." Information Sciences 481 (May 2019): 474–90. http://dx.doi.org/10.1016/j.ins.2019.01.001.
Повний текст джерелаCao, Yixin, Lei Zhang, Xiaosong Zhao, Kai Jin, and Ziyi Chen. "An Intrusion Detection Method for Industrial Control System Based on Machine Learning." Information 13, no. 7 (July 3, 2022): 322. http://dx.doi.org/10.3390/info13070322.
Повний текст джерелаZhao, Bo, Peng Sun, Tao Wang, and Keyu Jiang. "FedInv: Byzantine-Robust Federated Learning by Inversing Local Model Updates." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 8 (June 28, 2022): 9171–79. http://dx.doi.org/10.1609/aaai.v36i8.20903.
Повний текст джерелаEmake, Erhovwosere Donald, Ibrahim Adepoju Adeyanju, and Godwin Obruozie Uzedhe. "Industrial Control Systems (ICS): Cyber-attacks & Security Optimization." International Journal of Computer Engineering and Information Technology 12, no. 5 (May 31, 2020): 31–41. http://dx.doi.org/10.47277/ijceit/12(5)1.
Повний текст джерелаZiayi, Parimah, Seyed Mostafa Farmanbar, and Mohsen Rezvani. "YAICD: Yet Another IMSI Catcher Detector in GSM." Security and Communication Networks 2021 (January 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/8847803.
Повний текст джерелаL, Rajesh, and Penke Satyanarayana. "Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol." Security and Communication Networks 2021 (September 27, 2021): 1–15. http://dx.doi.org/10.1155/2021/8887666.
Повний текст джерелаZhang, Yipeng, Min Li, Xiaoming Zhang, Yueying He, and Zhoujun Li. "Defeat Magic with Magic: A Novel Ransomware Attack Method to Dynamically Generate Malicious Payloads Based on PLC Control Logic." Applied Sciences 12, no. 17 (August 23, 2022): 8408. http://dx.doi.org/10.3390/app12178408.
Повний текст джерелаLiyakkathali, Salimah, Francisco Furtado, Gayathri Sugumar, and Aditya Mathur. "A Mechanism to Assess the Effectiveness Anomaly Detectors in Industrial Control Systems." Journal of Integrated Design and Process Science 24, no. 3-4 (April 11, 2022): 35–50. http://dx.doi.org/10.3233/jid-210023.
Повний текст джерелаLiu, Hao, Ben Niu, and Jiahu Qin. "Reachability Analysis for Linear Discrete-Time Systems Under Stealthy Cyber Attacks." IEEE Transactions on Automatic Control 66, no. 9 (September 2021): 4444–51. http://dx.doi.org/10.1109/tac.2021.3050549.
Повний текст джерелаJames Ranjith Kumar, R., and Biplab Sikdar. "Detection of Stealthy Cyber-Physical Line Disconnection Attacks in Smart Grid." IEEE Transactions on Smart Grid 12, no. 5 (September 2021): 4484–93. http://dx.doi.org/10.1109/tsg.2021.3082543.
Повний текст джерелаAydeger, Abdullah, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, and Kemal Akkaya. "Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach." IEEE Transactions on Network Science and Engineering 8, no. 1 (January 1, 2021): 751–64. http://dx.doi.org/10.1109/tnse.2021.3052090.
Повний текст джерелаManohar, RamPradheep, and E. Baburaj. "GA BASED CONTAINMENT ALGORITHM AGAINST STEALTHY ATTACKS IN WIRELESS SENSOR NETWORKS." International Journal of Advanced Research 4, no. 8 (August 31, 2016): 953–59. http://dx.doi.org/10.21474/ijar01/1292.
Повний текст джерелаLi, Yi-Gang, and Guang-Hong Yang. "Optimal completely stealthy attacks against remote estimation in cyber-physical systems." Information Sciences 590 (April 2022): 15–28. http://dx.doi.org/10.1016/j.ins.2022.01.014.
Повний текст джерелаKwon, Cheolhyeon, Weiyi Liu, and Inseok Hwang. "Analysis and Design of Stealthy Cyber Attacks on Unmanned Aerial Systems." Journal of Aerospace Information Systems 11, no. 8 (August 2014): 525–39. http://dx.doi.org/10.2514/1.i010201.
Повний текст джерелаFang, Chongrong, Yifei Qi, Jiming Chen, Rui Tan, and Wei Xing Zheng. "Stealthy Actuator Signal Attacks in Stochastic Control Systems: Performance and Limitations." IEEE Transactions on Automatic Control 65, no. 9 (September 2020): 3927–34. http://dx.doi.org/10.1109/tac.2019.2950072.
Повний текст джерелаKalutarage, Harsha K., Siraj A. Shaikh, Indika P. Wickramasinghe, Qin Zhou, and Anne E. James. "Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks." Computers & Electrical Engineering 47 (October 2015): 327–44. http://dx.doi.org/10.1016/j.compeleceng.2015.07.007.
Повний текст джерелаLi, Xin, Guoliang Wei, and Derui Ding. "Interval Observer Design Under Stealthy Attacks and Improved Event-Triggered Protocols." IEEE Transactions on Signal and Information Processing over Networks 6 (2020): 570–79. http://dx.doi.org/10.1109/tsipn.2020.3012254.
Повний текст джерелаMuruganandam, D., and J. Martin Leo Manickam. "An efficient technique for mitigating stealthy attacks using MNDA in MANET." Neural Computing and Applications 31, S1 (July 31, 2018): 15–22. http://dx.doi.org/10.1007/s00521-018-3634-7.
Повний текст джерела