Rubio et al., 2017 - Google Patents
Analysis of Intrusion Detection Systems in Industrial Ecosystems.Rubio et al., 2017
View PDF- Document ID
- 8206457467164338310
- Author
- Rubio J
- Alcaraz C
- Roman R
- Lopez J
- Publication year
- Publication venue
- SECRYPT
External Links
Snippet
For an effective protection of all the elements of an industrial ecosystem against threats, it is necessary to understand the true scope of existing mechanisms capable of detecting potential anomalies and intrusions. It is the aim of this article to review the threats that affect …
- 238000001514 detection method 0 title abstract description 67
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Rubio et al. | Analysis of Intrusion Detection Systems in Industrial Ecosystems. | |
| Rubio et al. | Current cyber-defense trends in industrial control systems | |
| US12363157B2 (en) | Cyber security appliance for an operational technology network | |
| Süzen | A risk-assessment of cyber attacks and defense strategies in industry 4.0 ecosystem | |
| Lee et al. | A review on honeypot-based botnet detection models for smart factory | |
| Zhou et al. | Anomaly detection methods for IIoT networks | |
| Mozaffari et al. | Learning based anomaly detection in critical cyber-physical systems | |
| Tariq et al. | Context-aware autonomous security assertion for industrial IoT | |
| Rubio et al. | Tracking apts in industrial ecosystems: A proof of concept | |
| Rubio et al. | Tracking advanced persistent threats in critical infrastructures through opinion dynamics | |
| Wan et al. | Characteristic insights on industrial cyber security and popular defense mechanisms | |
| Li et al. | Network security in the industrial control system: A survey | |
| Ramkumar et al. | Diagnosing unknown attacks in smart homes using abductive reasoning | |
| Gulzar et al. | An analytical survey of cyber‐physical systems in water treatment and distribution: Security challenges, intrusion detection, and future directions | |
| Jain et al. | IoT and OT Security Handbook | |
| Pranggono et al. | Intrusion detection systems for critical infrastructure | |
| Thampi et al. | Securing the Connected World: Exploring Emerging Threats and Innovative Solutions | |
| Xu et al. | Identification of ICS Security Risks toward the Analysis of Packet Interaction Characteristics Using State Sequence Matching Based on SF‐FSM | |
| Cortés | Analysis and design of security mechanisms in the context of Advanced Persistent Threats against critical infrastructures | |
| Enoiu et al. | A taxonomy of vulnerabilities, attacks, and security solutions in industrial PLCs | |
| Rimsha et al. | The problem of selecting APCS’information security tools | |
| Thomas et al. | An in-Depth Exploration of Attack Modeling and Vulnerability Analysis in IoT Networks | |
| Biswas et al. | Cybernetic modeling of Industrial Control Systems: Towards threat analysis of critical infrastructure | |
| Rubio Cortés | Analysis and design of security mechanisms in the context of Advanced Persistent Threats against critical infrastructures | |
| Cheminod et al. | Analysis of exploitable vulnerability sequences in industrial networked systems: a proof of concepts |