|
|
|
Mazen Gazzan and Frederick T. Sheldon
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems, which control critical infrastructure such as power plants and water treatment facilities, have unique characteristics that make them vulnerable to ransomware ...
ver más
|
|
|
|
|
|
|
Bradley Northern, Trey Burks, Marlana Hatcher, Michael Rogers and Denis Ulybyshev
Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential to protect their assets from cyber attacks to increase the level of security, safety and trustworthiness, prevent failure developments, and minimize losses. I...
ver más
|
|
|
|
|
|
|
Limengwei Liu, Modi Hu, Chaoqun Kang and Xiaoyong Li
The development and integration of information technology and industrial control networks have expanded the magnitude of new data; detecting anomalies or discovering other valid information from them is of vital importance to the stable operation of indu...
ver más
|
|
|
|
|
|
|
Pramod T. C., Thejas G. S., S. S. Iyengar and N. R. Sunitha
Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches. Many security breac...
ver más
|
|
|
|
|
|
|
Matti Mantere, Mirko Sailio and Sami Noponen
The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would b...
ver más
|
|
|
|
|
|
|
Woo-Hyun Choi and Jongwon Kim
Industrial control systems (ICSs) play a crucial role in managing and monitoring critical processes across various industries, such as manufacturing, energy, and water treatment. The connection of equipment from various manufacturers, complex communicati...
ver más
|
|
|
|
|
|
|
Marina Indri, Martina Bellissimo, Stefano Pesce and Valerio Perna
??8
H
8
control approaches are widely investigated in various application fields and in the robotics area, too, for their robustness properties. However, they are still rarely adopted in the industrial context for the control of robot manipulators, main...
ver más
|
|
|
|
|
|
|
Xiaosong Zhao, Lei Zhang, Yixin Cao, Kai Jin and Yupeng Hou
Anomaly detection problems in industrial control systems (ICSs) are always tackled by a network traffic monitoring scheme. However, traffic-based anomaly detection systems may be deceived by anomalous behaviors that mimic normal system activities and fai...
ver más
|
|
|
|
|
|
|
Pablo Blanco-Medina, Eduardo Fidalgo, Enrique Alegre, Roberto A. Vasco-Carofilis, Francisco Jañez-Martino and Victor Fidalgo Villar
We present a deep-learning-based pipeline to solve a novel problem in Cybersecurity and Industry 4.0. Our proposal, which automatically classifies screenshots of industrial control systems, might support the task of an industrial monitoring tool for dete...
ver más
|
|
|
|
|
|
|
Mike Mackintosh, Gregory Epiphaniou, Haider Al-Khateeb, Keith Burnham, Prashant Pillai and Mohammad Hammoudeh
-
|
|
|
|
|
|
|
Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut and Marianne Azer
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations f...
ver más
|
|
|
|
|
|
|
Josef Horalek
The issue of Automated Meter Management (AMM), an integral part of modern energy smart grid systems, has become a hot topic in recent years. With the current energy crisis, and given the new approaches to smart energy and its regulation, implemented at t...
ver más
|
|
|
|
|
|
|
Israel Barbosa de Brito and Rafael T. de Sousa, Jr.
The possibility of cyber-attacks against critical infrastructure, and in particular nuclear power plants, has prompted several efforts by academia. Many of these works aim to capture the vulnerabilities of the industrial control systems used in these pla...
ver más
|
|
|
|
|
|
|
Yu-Sheng Yang, Shih-Hsiung Lee, Wei-Che Chen, Chu-Sing Yang, Yuen-Min Huang and Ting-Wei Hou
The advanced connection requirements of industrial automation and control systems have sparked a new revolution in the Industrial Internet of Things (IIoT), and the Supervisory Control and Data Acquisition (SCADA) network has evolved into an open and hig...
ver más
|
|
|
|
|
|
|
Yusuf Abubakar Sha?aban
Most industrial processes are regulated using PID control. However, many such processes often operate far from optimally because PID may not be the most suitable control method. Moreover, second-order models represent a large class of all controlled syst...
ver más
|
|
|
|
|
|
|
Emma Fitzgerald and Michal Pióro
Industry 4.0, with its focus on flexibility and customizability, is pushing in the direction of wireless communication in future smart factories, in particular, massive multiple-input-multiple-output (MIMO) and its future evolution of large intelligent s...
ver más
|
|
|
|
|
|
|
Duo Sun, Lei Zhang, Kai Jin, Jiasheng Ling and Xiaoyuan Zheng
Aiming at the imbalance of industrial control system data and the poor detection effect of industrial control intrusion detection systems on network attack traffic problems, we propose an ETM-TBD model based on hybrid machine learning and neural network ...
ver más
|
|
|
|
|
|
|
Ferdinando Vitolo, Andrea Rega, Castrese Di Marino, Agnese Pasquariello, Alessandro Zanella and Stanislao Patalano
Enabling technologies that drive Industry 4.0 and smart factories are pushing in new equipment and system development also to prevent human workers from repetitive and non-ergonomic tasks inside manufacturing plants. One of these tasks is the order-picki...
ver más
|
|
|
|
|
|
|
Stefan A. Aebersold, Mobayode O. Akinsolu, Shafiul Monir and Martyn L. Jones
In this paper, an integrated system to control and manage a state-of-the-art industrial computer numerical control (CNC) machine (Studer S33) using a commercially available tablet (Samsung Galaxy Tablet S2) is presented as a proof of concept (PoC) for th...
ver más
|
|
|
|
|
|
|
Samer Jaloudi
Most industrial and SCADA-like (supervisory control and data acquisition) systems use proprietary communication protocols, and hence interoperability is not fulfilled. However, the MODBUS TCP is an open de facto standard, and is used for some automation ...
ver más
|
|
|
|