Obfuscation strategies for industrial control systems
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ijcip.2024.100717
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Ye Yuan & Xiuchuan Tang & Wei Zhou & Wei Pan & Xiuting Li & Hai-Tao Zhang & Han Ding & Jorge Goncalves, 2019. "Data driven discovery of cyber physical systems," Nature Communications, Nature, vol. 10(1), pages 1-9, December.
- Huang, Yu-Lun & Cárdenas, Alvaro A. & Amin, Saurabh & Lin, Zong-Syun & Tsai, Hsin-Yi & Sastry, Shankar, 2009. "Understanding the physical and economic consequences of attacks on control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 2(3), pages 73-83.
- Miller, Thomas & Staves, Alexander & Maesschalck, Sam & Sturdee, Miriam & Green, Benjamin, 2021. "Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Wang, Wei & Cammi, Antonio & Di Maio, Francesco & Lorenzi, Stefano & Zio, Enrico, 2018. "A Monte Carlo-based exploration framework for identifying components vulnerable to cyber threats in nuclear power plants," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 24-37.
- Singh, Abhishek Narain & Gupta, M.P. & Ojha, Amitabh, 2014. "Identifying critical infrastructure sectors and their dependencies: An Indian scenario," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(2), pages 71-85.
- Davide Berardi & Franco Callegati & Andrea Giovine & Andrea Melis & Marco Prandini & Lorenzo Rinieri, 2023. "When Operation Technology Meets Information Technology: Challenges and Opportunities," Future Internet, MDPI, vol. 15(3), pages 1-16, February.
- Rahman, Ayesha & Mustafa, Ghulam & Khan, Abdul Qayyum & Abid, Muhammad & Durad, Muhammad Hanif, 2022. "Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms," International Journal of Critical Infrastructure Protection, Elsevier, vol. 39(C).
- Ping, Zuowei & Li, Xiuting & He, Wei & Yang, Tao & Yuan, Ye, 2020. "Sparse learning of network-reduced models for locating low frequency oscillations in power systems," Applied Energy, Elsevier, vol. 262(C).
- Yuan, Shuaiqi & Reniers, Genserik & Yang, Ming, 2024. "Integrated management of safety and security barriers in chemical plants to cope with emerging cyber-physical attack risks under uncertainties," Reliability Engineering and System Safety, Elsevier, vol. 250(C).
- Henriques de Gusmão, Ana Paula & Mendonça Silva, Maisa & Poleto, Thiago & Camara e Silva, Lúcio & Cabral Seixas Costa, Ana Paula, 2018. "Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory," International Journal of Information Management, Elsevier, vol. 43(C), pages 248-260.
- CHERIFI, Tarek & HAMAMI, Lamia, 2018. "A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol," International Journal of Critical Infrastructure Protection, Elsevier, vol. 20(C), pages 68-84.
- Yampolskiy, Mark & Horváth, Péter & Koutsoukos, Xenofon D. & Xue, Yuan & Sztipanovits, Janos, 2015. "A language for describing attacks on cyber-physical systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 8(C), pages 40-52.
- Zhao Chen & Yang Liu & Hao Sun, 2021. "Physics-informed learning of governing equations from scarce data," Nature Communications, Nature, vol. 12(1), pages 1-13, December.
- Ding, Jia & Wang, Maolin & Ping, Zuowei & Fu, Dongfei & Vassiliadis, Vassilios S., 2020. "An integrated method based on relevance vector machine for short-term load forecasting," European Journal of Operational Research, Elsevier, vol. 287(2), pages 497-510.
- Berghout, Tarek & Benbouzid, Mohamed, 2022. "EL-NAHL: Exploring labels autoencoding in augmented hidden layers of feedforward neural networks for cybersecurity in smart grids," Reliability Engineering and System Safety, Elsevier, vol. 226(C).
- Fu, Yangyang & O'Neill, Zheng & Yang, Zhiyao & Adetola, Veronica & Wen, Jin & Ren, Lingyu & Wagner, Tim & Zhu, Qi & Wu, Terresa, 2021. "Modeling and evaluation of cyber-attacks on grid-interactive efficient buildings," Applied Energy, Elsevier, vol. 303(C).
- Sugumar, Gayathri & Mathur, Aditya, 2019. "A method for testing distributed anomaly detectors," International Journal of Critical Infrastructure Protection, Elsevier, vol. 27(C).
- Etxezarreta, Xabier & Garitano, Iñaki & Iturbe, Mikel & Zurutuza, Urko, 2023. "Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey," International Journal of Critical Infrastructure Protection, Elsevier, vol. 42(C).
- Lorenzo Lucchini & Laura Alessandretti & Bruno Lepri & Angela Gallo & Andrea Baronchelli, 2020. "From code to market: Network of developers and correlated returns of cryptocurrencies," Papers 2004.07290, arXiv.org, revised Dec 2020.
- Vasan, Danish & Alqahtani, Ebtesam Jubran S. & Hammoudeh, Mohammad & Ahmed, Adel F., 2024. "An AutoML-based security defender for industrial control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 47(C).
- Li, Yutong & Hou, Jian & Yan, Gangfeng, 2024. "Exploration-enhanced multi-agent reinforcement learning for distributed PV-ESS scheduling with incomplete data," Applied Energy, Elsevier, vol. 359(C).
More about this item
Keywords
Code obfuscation; Process comprehension; Programmable logic controller;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:47:y:2024:i:c:s1874548224000581. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.