咨询与建议

限定检索结果

文献类型

  • 17 篇 会议
  • 5 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21 篇 工学
    • 14 篇 计算机科学与技术...
    • 7 篇 信息与通信工程
    • 6 篇 电气工程
    • 3 篇 控制科学与工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 安全科学与工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 食品科学与工程(可...
    • 1 篇 软件工程
  • 4 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 24 篇 industrial contr...
  • 4 篇 scada security
  • 2 篇 vulnerability an...
  • 2 篇 critical infrast...
  • 2 篇 honeypots
  • 2 篇 smart grid secur...
  • 2 篇 fuzzing test
  • 2 篇 anomaly detectio...
  • 2 篇 cybersecurity
  • 2 篇 machine learning
  • 2 篇 security
  • 2 篇 programmable log...
  • 1 篇 NOT FOUND
  • 1 篇 sensor authentic...
  • 1 篇 petri net
  • 1 篇 cyber attacks
  • 1 篇 cyber security
  • 1 篇 intrusion detect...
  • 1 篇 scada testbed
  • 1 篇 industrial contr...

机构

  • 2 篇 abb corp res bad...
  • 2 篇 singapore univ t...
  • 2 篇 kpmg ag
  • 1 篇 sri int menlo pk...
  • 1 篇 business risk ma...
  • 1 篇 shanxi univ coll...
  • 1 篇 department of co...
  • 1 篇 so methodist uni...
  • 1 篇 shanxi informat ...
  • 1 篇 fraunhofer aisec...
  • 1 篇 siemens ag corp ...
  • 1 篇 eth dept comp sc...
  • 1 篇 control syst sec...
  • 1 篇 indian inst petr...
  • 1 篇 guizhou univ col...
  • 1 篇 pforzheim univ s...
  • 1 篇 univ houston dep...
  • 1 篇 ajou univ dept c...
  • 1 篇 university of ou...
  • 1 篇 petr gas univ pl...

作者

  • 3 篇 obermeier sebast...
  • 2 篇 serbanescu alexa...
  • 2 篇 yu der-yeuan
  • 2 篇 zhou jianying
  • 1 篇 jinjing wan
  • 1 篇 lerner lee w.
  • 1 篇 goseva-popstojan...
  • 1 篇 taeshik shon
  • 1 篇 geng yangyang
  • 1 篇 hosokawa shu
  • 1 篇 fattahi jaouhar
  • 1 篇 shon taeshik
  • 1 篇 tai johnathan
  • 1 篇 lindqvist ulf
  • 1 篇 fay alexander
  • 1 篇 huang linan
  • 1 篇 hristova ana
  • 1 篇 qiao fengxiang
  • 1 篇 bytes andrei
  • 1 篇 parker edward

语言

  • 23 篇 英文
  • 1 篇 其他
检索条件"主题词=Industrial Control System Security"
24 条 记 录,以下是1-10 订阅
排序:
Network security monitoring and anomaly detection in industrial control system networks
Network security monitoring and anomaly detection in industr...
收藏 引用
作者: Mantere, M. (Matti) University of Oulu
学位级别:doctor
Abstractindustrial control system (ICS) networks used to be isolated environments, typically separated by physical air gaps from the wider area networks. This situation has been changing and the change has brought wit... 详细信息
来源: 评论
security evaluation of coal mine industrial control systems based on CVSS v4.0
收藏 引用
RESULTS IN ENGINEERING 2025年 26卷
作者: Zhang, Jianzhen Wen, Jing Qi, Yanjun Shanxi Inst Mech & Elect Engn Dept Informat Engn Changzhi 046011 Peoples R China Shanxi Univ Coll Comp & Informat Technol Taiyuan 030006 Peoples R China Shanxi Informat Technol Co Ltd Dept Tech Changzhi 046000 Peoples R China
This paper proposes a security evaluation model for coal mine industrial control systems (ICS) based on the CVSSv4.0 framework, incorporating four core dimensions: asset value, attack difficulty, attack consequences, ... 详细信息
来源: 评论
A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems
收藏 引用
COMPUTERS & security 2020年 89卷
作者: Huang, Linan Zhu, Quanyan NYU Dept Elect & Comp Engn Brooklyn NY 11201 USA
Advanced Persistent Threats (APTs) have recently emerged as a significant security challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature. Proactive dynamic defenses provide a strateg... 详细信息
来源: 评论
Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis
收藏 引用
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION 2013年 第2期6卷 96-106页
作者: Papa, Stephen Casper, William Moore, Tyler So Methodist Univ Dept Comp Sci & Engn Bobby Lyle Sch Engn Dallas TX 75275 USA Lockheed Martin Aeronaut Ft Worth TX 76101 USA
It has been widely reported that industrial control systems underpinning critical infrastructures ranging from power plants to oil refineries are vulnerable to cyber attacks. A slew of countermeasures have been propos... 详细信息
来源: 评论
Evaluation of Visual Notations as a Basis for ICS security Design Decisions
收藏 引用
IEEE ACCESS 2023年 11卷 9967-9994页
作者: Fluchs, Sarah Drath, Rainer Fay, Alexander Admeritia GmbH D-40764 Langenfeld Germany Pforzheim Univ Sch Engn D-75175 Pforzheim Germany Helmut Schmidt Univ Dept Automat D-22043 Hamburg Germany
For making informed security decisions during the design of industrial control systems (ICS), engineers need to process large amounts of security-relevant information outside their area of expertise. This problem move... 详细信息
来源: 评论
A Flexible Architecture for industrial control system Honeypots  12
A Flexible Architecture for Industrial Control System Honeyp...
收藏 引用
12th International Joint Conference on E-Business and Telecommunications (ICETE)
作者: Serbanescu, Alexandru Vlad Obermeier, Sebastian Yu, Der-Yeuan KPMG AG Zurich Switzerland ABB Corp Res Baden Switzerland ETH Dept Comp Sci Zurich Switzerland
While frequent reports on targeted attacks for industrial control systems hit the news, the amount of untargeted attacks using standardized industrial protocols is still unclear, especially if devices are mistakenly o... 详细信息
来源: 评论
A Framework for Incident Response in industrial control systems  12
A Framework for Incident Response in Industrial Control Syst...
收藏 引用
12th International Joint Conference on E-Business and Telecommunications (ICETE)
作者: Schlegel, Roman Hristova, Ana Obermeier, Sebastian ABB Switzerland Ltd Corp Res Baden Switzerland
industrial control systems are used to control and supervise plants and critical infrastructures. They are crucial for operation of many industries and even society at large. However, despite efforts to secure such sy... 详细信息
来源: 评论
Method for authentication of sensors connected on Modbus TCP  4
Method for authentication of sensors connected on Modbus TCP
收藏 引用
4th International Conference on control, Decision and Information Technologies (CoDIT)
作者: Pricop, Emil Fattahi, Jaouhar Parashiv, Nicolae Zamfir, Florin Ghayoula, Elies Petr Gas Univ Ploiesti Automat Control Comp & Elect Dept Ploiesti Romania Univ Laval Dept Comp Sci & Software Engn Quebec City PQ Canada El Manar Univ Natl Engn Sch Tunis ENIT SysCom Lab Tunis Tunisia
The paper focuses on the conceptual development of an innovative method for authenticating sensors connected using Modbus TCP. Modbus TCP is a highly used industrial networking protocol that has very good performances... 详细信息
来源: 评论
Application-level Autonomic Hardware to Predict and Preempt Software Attacks on industrial control systems  44
Application-level Autonomic Hardware to Predict and Preempt ...
收藏 引用
44th Annual IEEE/IFIP International Conference on Dependable systems and Networks (DSN)
作者: Lerner, Lee W. Franklin, Zane R. Baumann, William T. Patterson, Cameron D. Virginia Tech Bradley Dept Elect & Comp Engn Blacksburg VA 24061 USA
We mitigate malicious software threats to industrial control systems, not by bolstering perimeter security, but rather by using application-specific configurable hardware to monitor and possibly override software oper... 详细信息
来源: 评论
SePanner: Analyzing Semantics of controller Variables in industrial control systems based on Network Traffic  23
SePanner: Analyzing Semantics of Controller Variables in Ind...
收藏 引用
39th Annual Computer security Applications Conference (ACSAC)
作者: Meng, Jie Yang, Zeyu Zhang, Zhenyong Geng, Yangyang Deng, Ruilong Cheng, Peng Chen, Jiming Zhou, Jianying Zhejiang Univ State Key Lab Ind Control Technol Hangzhou Peoples R China Zhejiang Univ Coll Control Sci & Engn Hangzhou Peoples R China Guizhou Univ State Key Lab Publ Big Data Guiyang Peoples R China Guizhou Univ Coll Comp Sci & Technol Guiyang Peoples R China Zhengzhou Univ Informat Engn Zhengzhou Peoples R China Singapore Univ Technol & Design Singapore Singapore
Programmable logic controllers (PLCs), the essential components of critical infrastructure, play a crucial role in various industrial manufacturing processes. Recent attack events show that attackers have a strong int... 详细信息
来源: 评论