Filters








21,269 Hits in 3.2 sec

Attribution Of Cyber Attacks On Process Control Systems [chapter]

Jeffrey Hunker, Robert Hutchinson, Jonathan Margulies
<i title="Springer US"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/razadluzejfntbhhcw5smbd2oy" style="color: black;">IFIP International Federation for Information Processing</a> </i> &nbsp;
It presents a proposal for a voluntary network of attributable activity, an important first step towards a more complete attribution methodology for the control systems community.  ...  The attribution of cyber attacks is an important problem. Attribution gives critical infrastructure asset owners and operators legal recourse in the event of attacks and deters potential attacks.  ...  Department of Homeland Security.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-0-387-88523-0_7">doi:10.1007/978-0-387-88523-0_7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7dwhsa2mfngnlo2m44xo47dhqi">fatcat:7dwhsa2mfngnlo2m44xo47dhqi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190308154223/http://pdfs.semanticscholar.org/f58a/5865312a194172f6c6cdc136b85390625146.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f5/8a/f58a5865312a194172f6c6cdc136b85390625146.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-0-387-88523-0_7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Modeling of Cyber Target Selection for Effective Acquisition of Cyber Weapon Systems

Ki Hoon Kim, Jung ho Eom
<span title="2016-11-30">2016</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4h7flaxsjnh6he3qbiwvxbekxe" style="color: black;">International Journal of Security and Its Applications</a> </i> &nbsp;
Control characteristics are the factors that determine how an attack effect on a potential target system occurs by cyber weapons systems or operations.  ...  Cyber target selection is the process of deriving the most vulnerable part of the target system.  ...  Cyber target selection is the process of deriving the most vulnerable point of the target system and seek cyber-attack route.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2016.10.11.24">doi:10.14257/ijsia.2016.10.11.24</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ybseyd6wevb6xdjrnrwpevnvey">fatcat:ybseyd6wevb6xdjrnrwpevnvey</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602050909/http://www.sersc.org/journals/IJSIA/vol10_no11_2016/24.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3e/fa/3efa9faff95f666324a60d09960d247645737fb7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2016.10.11.24"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Agent-based cyber control strategy design for resilient control systems: Concepts, architecture and methodologies

Craig Rieger, Quanyan Zhu, Tamer Basar
<span title="">2012</span> <i title="IEEE"> 2012 5th International Symposium on Resilient Control Systems </i> &nbsp;
high consequence nature of industrial control systems.  ...  This performance takes shape inside a multiagent design, which provides a notional context to model highly decentralized and complex industrial process control systems, the nervous system of critical infrastructure  ...  Department of Energy under DOE Idaho Operations Office Contract DE-AC07-05ID14517, performed as part of the Instrumentation, Control, and Intelligent Systems (ICIS) Distinctive Signature of Idaho National  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/isrcs.2012.6309291">doi:10.1109/isrcs.2012.6309291</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/prd5kboxwffyng2uz7i6sqsvq4">fatcat:prd5kboxwffyng2uz7i6sqsvq4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180727133422/https://digital.library.unt.edu/ark:/67531/metadc839730/m2/1/high_res_d/1056031.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bd/b2/bdb2769395f160f6d197df1b02e29b3103e9d443.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/isrcs.2012.6309291"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures [article]

Leandros Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis
<span title="2019-01-12">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Finally we provide an overview of current methods and practices regarding cyber attribution and cyber peace keeping  ...  Moreover, the ability to attribute is a vital element of avoiding impunity in cyberspace.  ...  Introduction Cyber security is currently one of the main concerns for Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) operators.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1901.03899v1">arXiv:1901.03899v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ibrinwuagffalnd3dqko55ro44">fatcat:ibrinwuagffalnd3dqko55ro44</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200831182409/https://arxiv.org/pdf/1901.03899v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/58/6a/586a848d48cbc859aff7e7c30a7a0f5e406da35a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1901.03899v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Attribution of Cyber Attacks on Industrial Control Systems

Allan Cook, Andrew Nicholson, Helge Janicke, Leandros Maglaras, Richard Smith
<span title="2016-04-21">2016</span> <i title="European Alliance for Innovation n.o."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/l7xphlcxlzcopemlfe46zdv2ui" style="color: black;">EAI Endorsed Transactions on Industrial Networks and Intelligent Systems</a> </i> &nbsp;
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement  ...  In this paper we identify the current state of the art of attribution in industrial control systems.  ...  This study suggests that further research into the endto-end chain of attacks on industrial control systems, covering all elements of their architecture, is required to allow comprehensive attack taxonomies  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4108/eai.21-4-2016.151158">doi:10.4108/eai.21-4-2016.151158</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vwx6gddunrcwhhou6gq5odc3wi">fatcat:vwx6gddunrcwhhou6gq5odc3wi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180415202925/http://eudl.eu/pdf/10.4108/eai.21-4-2016.151158" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/22/2e/222ef30a24da0218ef128840a1da6befdba91d97.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4108/eai.21-4-2016.151158"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Development of adaptive expert system of information security using a procedure of clustering the attributes of anomalies and cyber attacks

Valeriy Lakhno, Yuliia Tkach, Taras Petrenko, Sergey Zaitsev, Volodymyr Bazylevych
<span title="2016-12-26">2016</span> <i title="Private Company Technology Center"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/l2suv73qxjf5jk3mi4shll66pm" style="color: black;">Eastern-European Journal of Enterprise Technologies</a> </i> &nbsp;
anomalies and cyber attacks in CoS; -to conduct AES testing and determine rational number of clusters in the space of attributes of anomalies or cyber attacks for CoS.  ...  in the binary space of recognition attributes (BSRA -RS) of anomalies, threats and cyber attacks.  ...  Comparative analysis of intrusion detection techniques  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15587/1729-4061.2016.85600">doi:10.15587/1729-4061.2016.85600</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/okwoyu5m5nb7fj3jv6grhkuwyq">fatcat:okwoyu5m5nb7fj3jv6grhkuwyq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719093909/http://journals.uran.ua/eejet/article/download/85600/83491" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b8/37/b8373f1f433c7860a026f900ca8d3c4650e746ac.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15587/1729-4061.2016.85600"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures

Leandros Maglaras, Mohamed Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis
<span title="2018-12-11">2018</span> <i title="European Alliance for Innovation n.o."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sfw6e4bmgrh6rkjkiiddq77y3m" style="color: black;">EAI Endorsed Transactions on Security and Safety</a> </i> &nbsp;
Finally we provide an overview of current methods and practices regarding cyber attribution and cyber peace keeping.  ...  Moreover, the ability to attribute is a vital element of avoiding impunity in cyberspace.  ...  Introduction Cyber security is currently one of the main concerns for Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) operators.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4108/eai.15-10-2018.155856">doi:10.4108/eai.15-10-2018.155856</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vfxzvkj2irad7jbllg235shqja">fatcat:vfxzvkj2irad7jbllg235shqja</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428114229/https://eudl.eu/pdf/10.4108/eai.15-10-2018.155856" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/12/a6/12a6329314e3093ce3918e50173782b963ee8721.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4108/eai.15-10-2018.155856"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Under false flag: using technical artifacts for cyber attack attribution

Florian Skopik, Timea Pahi
<span title="2020-03-20">2020</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nvdntm3qtfcjzjwo3aacs6zhtu" style="color: black;">Cybersecurity</a> </i> &nbsp;
We investigate traces left by attack techniques and which questions in course of the attribution process are answered by investigating these traces.  ...  The attribution of cyber attacks is often neglected. The consensus still is that little can be done to prosecute the perpetrators -and unfortunately, this might be right in many cases.  ...  Overview of the attribution process The Cyber Attribution Model (CAM) (Pahi and Skopik 2019) consists of two main parts: cyber attack investigation (part I) and cyber threat actor profiling (part II).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s42400-020-00048-4">doi:10.1186/s42400-020-00048-4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gkn4xnfza5alzilrdtykpfurem">fatcat:gkn4xnfza5alzilrdtykpfurem</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200712025331/https://link.springer.com/content/pdf/10.1186/s42400-020-00048-4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0d/a7/0da7a8892bb58a1ab48c07bc200d37c55a079045.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s42400-020-00048-4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

Modern power system reliability assessment with cyber-intrusion on heat pump systems

Hasan Gunduz, Dilan Jayaweera
<span title="2020-09-04">2020</span> <i title="Institution of Engineering and Technology (IET)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sjs56bm5rzfbncks2gkwxaosja" style="color: black;">IET Smart Grid</a> </i> &nbsp;
of the attack.  ...  However, they are vulnerable to cyber-physical interactive threats and their impact depends on the system infrastructure, degree of interaction, degree of vulnerability, and the intensity and the frequency  ...  Especially, parts of power networks in three states of the USA were influenced by cyber-intruders on Supervisory Control and Data Acquisition (SCADA) systems while power utilities stayed in the control  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/iet-stg.2020.0094">doi:10.1049/iet-stg.2020.0094</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sr3ten6oxjfljfslbfhw4ftvqi">fatcat:sr3ten6oxjfljfslbfhw4ftvqi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210716191231/https://ietresearch.onlinelibrary.wiley.com/doi/pdfdirect/10.1049/iet-stg.2020.0094" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6d/40/6d402f322c1d217da178297e4b3786b66e6493f1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/iet-stg.2020.0094"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Machine Learning-Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles

Qiyi He, Xiaolin Meng, Rong Qu, Ruijie Xi
<span title="2020-08-07">2020</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ye33srllvnanjouxn4tmrfgjsq" style="color: black;">Mathematics</a> </i> &nbsp;
of CAV systems.  ...  This data set focuses on the communication-based CAV cyber-attacks.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/math8081311">doi:10.3390/math8081311</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vw4oqyv4i5hnrf7ey3lfhq2p5y">fatcat:vw4oqyv4i5hnrf7ey3lfhq2p5y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200814003440/https://res.mdpi.com/d_attachment/mathematics/mathematics-08-01311/article_deploy/mathematics-08-01311-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2f/f6/2ff67cda3f2c5ab1b0f49e7a4f104a84843feb5d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/math8081311"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Attribution Across Cyber Attack Types: Network Intrusions and Information Operations

Sanjay Goel, Brian Nussbaum
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6j7dh4yjsvfx5frc4vitgjifki" style="color: black;">IEEE Open Journal of the Communications Society</a> </i> &nbsp;
Attribution of attacks is typically done through a burdensome manual process that relies on both technical analysis and ground intelligence.  ...  As a result, this cumbersome and laborious process of attribution is primarily reserved for the most egregious cyber attack cases and those conducted against well resourced organizations.  ...  . [28] Finally, in the technical space, there are extensive discussions of attribution of cyber-attacks in particular sectors or types of information systems -like industrial control systems [29] , as  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ojcoms.2021.3074591">doi:10.1109/ojcoms.2021.3074591</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/k6vuj2ygnra5plsohkxde2htzy">fatcat:k6vuj2ygnra5plsohkxde2htzy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210718041010/https://ieeexplore.ieee.org/ielx7/8782661/8901158/09411871.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6c/73/6c733fa41e47c9f9e6b5a1e87ee36114ad0a7474.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ojcoms.2021.3074591"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

A Reasoning Method Of Cyber-Attack Attribution Based On Threat Intelligence

Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei
<span title="2016-04-04">2016</span> <i title="Zenodo"> Zenodo </i> &nbsp;
The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing.  ...  With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems.  ...  Attribution of cyber-attack is important. One definition of cyber-attack attribution is "determining the identity or location of an attacker or an attacker's intermediary [2] ."  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1339270">doi:10.5281/zenodo.1339270</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vegobokdlfecrh3t5sctxggvxq">fatcat:vegobokdlfecrh3t5sctxggvxq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201221230938/https://zenodo.org/record/1339271/files/10004527.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d7/50/d750cb3558f8ea7e9f6ff0155f056b0ccbae5e82.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1339270"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems [article]

Emil Pricop, Sanda Florentina Mihalache
<span title="2019-11-30">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The authors use a fuzzy approach for generating attacker profiles based on attacker attributes such as knowledge, technical resources and motivation.  ...  Cybersecurity of industrial control system is a very complex and challenging research topic, due to the integration of these systems in national critical infrastructures.  ...  Emil Pricop, Sanda Florentina In the following sections is proposed a fuzzy approach on modelling the cyber attacks patterns on industrial control systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1912.00234v1">arXiv:1912.00234v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qqa7fbkbujaath7t5gkhwilufu">fatcat:qqa7fbkbujaath7t5gkhwilufu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200831201821/https://arxiv.org/ftp/arxiv/papers/1912/1912.00234.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bf/74/bf74b4b953fe602d2515f93e47aff15dc69d5a48.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1912.00234v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

ANALYSIS OF CYBER-ATTACKS ON UKRAINIAN POWER GRID SYSTEMS IN THE CONTEXT OF ARMED CONFLICT IN DONBAS

В. В. Музика
<span title="2020-09-28">2020</span> <i title="Odesa I.I. Mechnikov National University"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qvm7i6tmoveknlr7y25twna52e" style="color: black;">Constitutional State</a> </i> &nbsp;
To date, it is almost impossible to attribute a state-sponsored cyber attack by virtue of effective control test, even though cyber-attacks on objects of critical infrastructure may cause humanitarian  ...  Keywords: cyber-attack; attribution; attacks on Ukrainian power grid systems; industrial systems; critical infrastructure. Problem statement.  ...  In a joint analysis of the cyber-attack on the Ukrainian Power Grid, the Electricity Information Sharing and Analysis Center and SANS Industrial Control System experts concluded that "[t]he cyber operation  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18524/2411-2054.2020.39.212983">doi:10.18524/2411-2054.2020.39.212983</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rpcfjwof5rd53hhgz5lulzu3ni">fatcat:rpcfjwof5rd53hhgz5lulzu3ni</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201107171433/http://pd.onu.edu.ua/article/download/212983/214967" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/45/9b/459b9965756eb116a4fd06018a1429eab90630bb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18524/2411-2054.2020.39.212983"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Security Issues and Challenges for Cyber Physical System

Eric Ke Wang, Yunming Ye, Xiaofei Xu, S. M. Yiu, L. C. K. Hui, K. P. Chow
<span title="">2010</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/gkdb6bz2lvbm3g7bnv3mc6o2lq" style="color: black;">2010 IEEE/ACM Int&#39;l Conference on Green Computing and Communications &amp; Int&#39;l Conference on Cyber, Physical and Social Computing</a> </i> &nbsp;
In this paper, we investigate the security challenges and issues of cyber-physical systems. (1)We abstract the general workflow of cyber physical systems, (2)identify the possible vulnerabilities, attack  ...  issues, adversaries characteristics and a set of challenges that need to be addressed; (3)then we also propose a context-aware security framework for general cyber-physical systems and suggest some potential  ...  When attacks are happening, the attack model and the adversary types can also be one of the contextual attributes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/greencom-cpscom.2010.36">doi:10.1109/greencom-cpscom.2010.36</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/greencom/WangYXYHC10.html">dblp:conf/greencom/WangYXYHC10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jqp2pvzxazexpdt5xo7k4ckmoq">fatcat:jqp2pvzxazexpdt5xo7k4ckmoq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809014403/http://people.cs.ksu.edu/~danielwang/Investigation/CPS_Security_threat/05724910.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a9/bb/a9bb943d229a40507dc6912c5772b2e8e84a9d5f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/greencom-cpscom.2010.36"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 21,269 results