Searched for: subject%3A%22Industrial%255C%2BControl%255C%2BSystem%22
(1 - 8 of 8)
document
Mladenov, Martin (author)
Supervisory Control and Data Acquisition (SCADA) systems are sometimes exposed on the public Internet. It is possible to quickly and efficiently identify such exposed services. They are commonly part of critical infrastructure, so they need to be protected against cyber attacks. In the past, researchers have scanned the Internet to detect such...
bachelor thesis 2023
document
van den Broek, Geert (author)
An Industrial Control System (ICS) is used to monitor and control industrial processes and critical infrastructure, and is therefore crucial to modern society. This makes them attractive targets for malicious cyber-attacks, which have become more advanced and abundant in recent history. To properly defend ICSs from these cyber-attacks,...
master thesis 2022
document
Ranade, Vedang Suhas (author)
Industrial control systems (ICSs) are used widely throughout the world for the control of large, complex industrial plants and consist of the entire setups of control system including sensors, PLCs (Programmable Logic Controllers), actuators and communication devices. The communication between these ICS devices is performed using industrial...
master thesis 2021
document
Ding, Kaixin (author)
Intrusion detection problem in Industrial Control Systems(ICS), such as water treat- ment plant and power grid, is an important real-world problem. Real-time anomaly detection have been proposed to minimize the risk of cyber attack. In this study, two different kind of intrusion detection mode-based approach are learned from normal behaviour of...
master thesis 2020
document
Erba, Alessandro (author), Taormina, R. (author), Galelli, Stefano (author), Pogliani, Marcello (author), Carminati, Michele (author), Zanero, Stefano (author), Tippenhauer, Nils Ole (author)
Recently, reconstruction-based anomaly detection was proposed as an effective technique to detect attacks in dynamic industrial control networks. Unlike classical network anomaly detectors that observe the network traffic, reconstruction-based detectors operate on the measured sensor data, leveraging physical process models learned a priori....
conference paper 2020
document
Lin, Q. (author), Verwer, S.E. (author), Kooij, Robert (author), Mathur, Aditya (author)
The availability of high-quality benchmark datasets is an important prerequisite for research and education in the cyber security domain. Datasets from realistic systems offer a platform for researchers to develop and test novel models and algorithms. Such datasets also offer students opportunities for active and project-centric learning. In...
conference paper 2020
document
Arief, Raditya (author)
Cascading effects are high-impact, low-probability phenomena that have caused catastrophic impacts in various chemical and process plants around the world. With the increasing trend of cyberattacks targeting critical infrastructures, there is a concern that accidents caused by cyberattacks may trigger cascading effects in these facilities. In...
master thesis 2018
document
Luchs, M. (author)
The world is rapidly embracing networked technology and transitioning into one of hyperconnectivity, a term first coined by social scientists Anabel Quan-Haase and Barry Wellman. Increased connectivity provides benefits such as automation and, remote access and control of networks and equipment, thereby decreasing operational costs. Maritime and...
master thesis 2016
Searched for: subject%3A%22Industrial%255C%2BControl%255C%2BSystem%22
(1 - 8 of 8)