Journal Articles 2020(1 publication) [publication]Lima, A. and Rosa, L. and Tiago Cruz and Simões, P. , "A Security Monitoring Framework for Mobile Devices", Electronics (ISSN 2079-9292), 2020 2019(1 publication) [publication]Rosa, L. and Freitas, M.B.d. and Mazo, S. and Edmundo Monteiro and Tiago Cruz and Simões, P. , "A Comprehensive Security Analysis of a SCADA Protocol: from OSINT to Mitigation", IEEE Access (Open Access), 2019 [citation][year=2020]D. Pliatsios, P. Sarigiannidis, T. Lagkas and A. G. Sarigiannidis, "A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics," in IEEE Communications Surveys & Tutorials. April 2020. DOI: 10.1109/COMST.2020.2987688 [citation][year=2019]Aghenta, L.O.; Iqbal, M.T. "Low-Cost, Open Source IoT-Based SCADA System Design Using Thinger.IO and ESP32 Thing" Electronics 2019, 8, 822. DOI: 10.3390/electronics8080822 [citation][year=2019]Tidrea, A.; Korodi, A.; Silea, I. Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules. MDPI Sensors 2019, 19, 4191. DOI: 10.3390/s19194191 [citation][year=2019]Anass Sebbar, Karim Zkik, Mohammed Boulmalf, Mohamed Dafir Ech-Cherif El Kettani, New context-based node acceptance CBNA framework for MitM detection in SDN Architecture, Procedia Computer Science, Volume 160, 2019, Pages 825-830, ISSN 1877-0509, DOI: 10.1016/j.procs.2019.11.004 2018(3 publications) [publication]C.Foglietta, . and Masucci, D. and Palazzo, C. and Santini, R. and Panzieri, S. and Rosa, L. and Tiago Cruz and Lev, L. , "From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment", IEEE Systems Journal , 2018 [citation][year=2020]Kordestani, Mojtaba & Chaibakhsh, Ali & Saif, Mehrdad. (2020). SMS–A Security Management System for Steam Turbines Using a Multisensor Array. IEEE Systems Journal. PP. 1-12. January 2020, 10.1109/JSYST.2019.2960149 [citation][year=2019]Qais Saif Qassim; Norziana Jamil; Maslina Daud; Hafizah Che Hasan, "Towards implementing scalable and reconfigurable SCADA security testbed in power system environment", International Journal of Critical Infrastructures, Vol.15 No.2, 2019. DOI: 10.1504/IJCIS.2019.098834 [citation][year=2019]A. Giuseppi, A. Tortorelli, R. Germanà, F. Liberati and A. Fiaschetti, "Securing Cyber-Physical Systems: An Optimization Framework based on OSSTMM and Genetic Algorithms," 2019 27th Mediterranean Conference on Control and Automation (MED), Akko, Israel, 2019, pp. 50-56. DOI: 10.1109/MED.2019.8798506 [citation][year=2019]Raposo, Duarte & Rodrigues, André & Sinche, Soraya & Sá Silva, Jorge & Boavida, Fernando. (2019). Security and Fault Detection in In-node components of IIoT Constrained Devices, in Proc of Local Computer Networks Conference (LCN), October 2019 [publication]Adamsky, F. and Aubigny, M. and Battisti, F. and Carli, M. and Cimorelli, F. and Tiago Cruz and Giorgio, A.d. and C.Foglietta, . and Galli, A. and Giuseppi, A. and Liberati, F. and Neri, A. and Panzieri, S. and Pascucci, F. and Proença, J. and Pucci, P. and Rosa, L. and Soua, R. , "Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach", International Journal of Critical Infrastructure Protection - Elsevier, 2018 [citation][year=2020]F. Liberati, A. Di Giorgio, A. Giuseppi, A. Pietrabissa and F. Delli Priscoli, "Efficient and Risk-Aware Control of Electricity Distribution Grids," in IEEE Systems Journal, January 2020. doi: 10.1109/JSYST.2020.2965633 [citation][year=2020]Arroyo-Figueroa, Gustavo, Isai Rojas-Gonzalez and José Alberto Hernández-Aguilar. "A Compressive Compilation of Cyber Security for Internet of Energy (IoE)." Cyber Security of Industrial Control Systems in the Future Internet Environment. IGI Global, 2020. 267-294. Web. 3 Mar. 2020. doi:10.4018/978-1-7998-2910-2.ch013 [citation][year=2019]Hunor Sándor, Béla Genge, Zoltán Szántó, Lõrinc Márton, Piroska Haller, "Cyber Attack Detection and Mitigation: Software Defined Survivable Industrial Control Systems", International Journal of Critical Infrastructure Protection, 2019, ISSN 1874-5482. DOI: 10.1016/j.ijcip.2019.04.002 [citation][year=2019]Juan Enrique Rubio, Cristina Alcaraz, Rodrigo Roman, Javier Lopez, "Current Cyber-Defense Trends in Industrial Control Systems", Computers & Security, 2019. DOI 10.1016/j.cose.2019.06.015. [citation][year=2019]Federico Lisi, Giacinto Losquadro, Francesco Delli Priscoli, Antonio Ornatelli, Manuel Donsante, Multi-Connectivity in 5G terrestrial-Satellite Networks: the 5G-ALLSTAR Solution, 25th Ka and Broadband Communications (Ka conference)", Sorrento (Italy), September 30 - October 2, 2019 (Session IX, Part 2). URL: https://arxiv.org/abs/2004.00368 [publication]Graveto, V. and Rosa, L. and Tiago Cruz and Simões, P. , "A Stealth Monitoring Mechanism for Cyber-Physical Systems", International Journal of Critical Infrastructure Protection, 2018 [citation][year=2019]Abdul Wahid Mir, Ramkumar Ketti Ramachandran, (2019) "Security gaps assessment of smart grid based SCADA systems", Information & Computer Security, Vol. 27 Issue: 3, pp.434-452, DOI: 10.1108/ICS-12-2018-0146 [citation][year=2019]A. Giuseppi, A. Tortorelli, R. Germanà, F. Liberati and A. Fiaschetti, "Securing Cyber-Physical Systems: An Optimization Framework based on OSSTMM and Genetic Algorithms," 2019 27th Mediterranean Conference on Control and Automation (MED), Akko, Israel, 2019, pp. 50-56. DOI: 10.1109/MED.2019.8798506 [citation][year=2019]Natarajan, Jayapandian. "Cyber Secure Man-in-the-Middle Attack Intrusion Detection Using Machine Learning Algorithms." AI and Big Data’s Potential for Disruptive Innovation. IGI Global, 2020. 291-316. Web. 9 Sep. 2019. doi:10.4018/978-1-5225-9687-5.ch011 [citation][year=2019]Raposo, Duarte & Rodrigues, André & Sinche, Soraya & Sá Silva, Jorge & Boavida, Fernando. (2019). Security and Fault Detection in In-node components of IIoT Constrained Devices, in Proc of Local Computer Networks Conference (LCN), October 2019 2017(1 publication) [publication]Stewart, B. and Rosa, L. and Maglaras, L. and Tiago Cruz and Ferrag, M.A. and Simões, P. and Janicke, H. , "A Novel Intrusion Detection Mechanism for SCADA systems that Automatically Adapts to Changes in Network Topology", EAI Transactions in Industrial Networks and Intelligent Systems (INISCOM 2016 Special Edition with extended papers), 2017 [citation][year=2019]Mohiuddin, Ghulam. (2019). Modeling Network Intrusion Detection System Using Feed-Forward Neural Network using UNSW-NB15 Dataset, in Proc of Smart Energy Grid Engineering, Canada, [citation][year=2019]L. Zhiqiang, G. Mohi-Ud-Din, L. Bing, L. Jianchao, Z. Ye and L. Zhijun, "Modeling Network Intrusion Detection System Using Feed-Forward Neural Network Using UNSW-NB15 Dataset," 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 2019, pp. 299-303. DOI: 10.1109/SEGE.2019.8859773 [citation][year=2019]Yin, Xiaochun & Liu, Zeng & Nkenyereye, Lewis & Ndibanje, Bruce. (2019). Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach. Sensors. 19. 4952. 10.3390/s19224952. [citation][year=2019]Muna Al-Hawawreh, Elena Sitnikova, and Frank den Hartog. 2019. An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things. In Proceedings of the 3rd International Conference on Big Data and Internet of Things (BDIOT 2019). ACM, New York, NY, USA, 83-87. DOI: https://doi.org/10.1145/3361758.3361762 [citation][year=2018]Ibrar Yaqoob, Ibrahim Abaker Targio Hashem, Arif Ahmed, S.M. Ahsan Kazmi, Choong Seon Hong, Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges, Future Generation Computer Systems, 2018, ISSN 0167-739X, https://doi.org/10.1016/j.future.2018.09.058. [citation][year=2018]Al-Hawawreh, Muna & Moustafa, Nour & Sitnikova, Elena. (2018). Identification of malicious activities in industrial internet of things based on deep learning models. Journal of Information Security and Applications. 41. 10.1016/j.jisa.2018.05.002. [citation][year=2017]M. Al-Zewairi, S. Almajali and A. Awajan, "Experimental Evaluation of a Multi-layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System," 2017 International Conference on New Trends in Computing Sciences (ICTCS), Amman, 2017, pp. 167-172. 2016(1 publication) [publication]Tiago Cruz and Rosa, L. and J. Proenca and Maglaras, L. and Aubigny, M. and Lev, L. and Jiang, J. and Simões, P. , "A Cyber Security Detection Framework for Supervisory Control and Data Acquisition Systems", IEEE Transactions on Industrial Informatics, ISSN (print): 1551-3203, ISSN (electronic): 1941-0050, vol. 12, pp. 1-11, 2016 [citation][year=2020]M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks Against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1035-1044, Feb. 2020. DOI: 10.1109/TII.2019.2926557 [citation][year=2020]Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1024-1034, Feb. 2020. doi: 10.1109/TII.2019.2925422 [citation][year=2020]LUO, Junzhou & HE, Yuan & ZHANG, Lan & LIU, Liang & SUN, Maojie & XIONG, Runqun & DONG, Fang. (2020). The architecture and key technologies for an industrial Internet with synergy between the cloud and clients. SCIENTIA SINICA Informationis. 50. 195-220. DOI: 10.1360/N112019-00005. [citation][year=2020]Soumya Ray*, Kamta Nath Mishra and Sandip Dutta, “Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review”, Recent Advances in Computer Science and Communications (2020) 13: 1. https://doi.org/10.2174/2666255813666200224092717 [citation][year=2020]Abdullah Al-Noman Patwary, Anmin Fu, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Md Anwarul Kaium Patwary, Erfan Aghasian, "Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review", arXiv:2003.00395v1, March 2020 [citation][year=2020]Claudio Zunino, Adriano Valenzano, Roman Obermaisser, Stig Petersen, Factory Communications at the Dawn of the Fourth Industrial Revolution, Computer Standards & Interfaces, Volume 71, 2020, ISSN 0920-5489, DOI: 10.1016/j.csi.2020.103433. [citation][year=2020]L. Ding, Q. Han, B. Ning and D. Yue, "Distributed Resilient Finite-Time Secondary Control for Heterogeneous Battery Energy Storage Systems Under Denial-of-Service Attacks," in IEEE Transactions on Industrial Informatics, vol. 16, no. 7, pp. 4909-4919, July 2020. [citation][year=2020]Jakapan Suaboot, Adil Fahad, Zahir Tari, John Grundy, Abdun Naser Mahmood, Abdulmohsen Almalawi, Albert Y. Zomaya, and Khalil Drira. 2020. A Taxonomy of Supervised Learning for IDSs in SCADA Environments. ACM Comput. Surv. 53, 2, Article 40 (April 2020), 37 pages. https://doi.org/10.1145/3379499 [citation][year=2019]Lin, L.; Wang, B.; Qi, J.; Wang, D.; Huang, N. Bearing Fault Diagnosis Considering the Effect of Imbalance Training Sample. Entropy 2019, 21, 386. DOI: 10.3390/e21040386 [citation][year=2019]Will Serrano, Erol Gelenbe, "Deep Learning Clusters in the Cognitive Packet Network", Neurocomputing, 2019, ISSN 0925-2312. DOI: 10.1016/j.neucom.2018.07.101. [citation][year=2019]Jiwoong Kang, Taein Kim, Jaehyun Park, "FPGA-based Real-time Abnormal Packet Detector for Critical Industrial Network", in Proc. of 2019 Workshop on Communications in Critical Embedded Systems (as part of IEEE ISCC 2019), june 30, 2019, Barcelona, Spain. DOI: 10.1109/ISCC47284.2019.8969630 [citation][year=2019]Venkataramanan, Venkatesh & Srivastava, Anurag & Hahn, Adam. (2019). CyPhyR: A Cyber-Physical Analysis Tool for Measuring and Enabling Resiliency in Microgrids. IET Cyber-Physical Systems: Theory & Applications. DOI: 10.1049/iet-cps.2018.5069. [citation][year=2019]Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, 2019. doi: 10.1109/TII.2019.2925422 [citation][year=2019]J. Yang, C. Zhou, Y. Tian and S. Yang, "A Software-defined Security Approach for Securing Field Zones in Industrial Control Systems," in IEEE Access, 2019. doi: 10.1109/ACCESS.2019.2924800 [citation][year=2019]Qi Min, "Research on the Importance of Maintaining Network Ideology Security in the Context of Globalization", in Proc. of 2019 4th International Social Sciences and Education Conference (ISSEC 2019) , Xiamen, China, 27-28 june 2019. Available at: https://www.webofproceedings.org/proceedings_series/ESSP/ISSEC 2019/ISSEC19040.pdf [citation][year=2019]M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2019.2926557 [citation][year=2019]D. Sun, G. Zhang and S. Gao, "Data Management across Geographically-Distributed Autonomous Systems: Architecture, Implementation, and Performance Evaluation," in IEEE Transactions on Industrial Informatics ,2019. DOI: 10.1109/TII.2019.2936298 [citation][year=2019]Y. Liu, A. Liu, X. Liu and M. Ma, "A Trust-based Active Detection for Cyber-physical Security in Industrial Environments," in IEEE Transactions on Industrial Informatics, 2019. doi: 10.1109/TII.2019.2931394 [citation][year=2019]D. A. Noby and A. Khattab, "A Survey of Blockchain Applications in IoT Systems," 2019 14th International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt, 2019, pp. 83-87. DOI: 10.1109/ICCES48960.2019.9068170 [citation][year=2019]H. F. M. de Figueiredo, M. K. Ferst and G. W. Denardin, "An Overview About Detection of Cyber-Attacks on Power SCADA Systems," 2019 IEEE 15th Brazilian Power Electronics Conference and 5th IEEE Southern Power Electronics Conference (COBEP/SPEC), Santos, Brazil, 2019, pp. 1-6. DOI: 10.1109/COBEP/SPEC44138.2019.9065353 [citation][year=2019]D. Sun, G. Zhang and S. Gao, "Data Management across Geographically Distributed Autonomous Systems: Architecture, Implementation, and Performance Evaluation," 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Zhangjiajie, China, 2019, pp. 2284-2292. DOI: 10.1109/HPCC/SmartCity/DSS.2019.00317 [citation][year=2019]Henry Hui , Peter Maynard , Kieran McLaughlin, "ICS Interaction Testbed: A Platform for Cyber-Physical Security Research", in proc of 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR), September 2019. DOI: 10.14236/ewic/icscsr19.12 [citation][year=2019]A. Li et al., "BCRAM: A Social-Network-Inspired Breast Cancer Risk Assessment Model," in IEEE Transactions on Industrial Informatics, vol. 15, no. 1, pp. 366-376, Jan. 2019. doi: 10.1109/TII.2018.2825345 [citation][year=2019]L. Lu, H. J. Liu, H. Zhu and C. Chu, "Intrusion Detection in Distributed Frequency Control of Isolated Microgrids," in IEEE Transactions on Smart Grid, vol. 10, no. 6, pp. 6502-6515, Nov. 2019. doi: 10.1109/TSG.2019.2906573 [citation][year=2019]Yin, Xiaochun & Liu, Zeng & Nkenyereye, Lewis & Ndibanje, Bruce. (2019). Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach. Sensors. 19. 4952. 10.3390/s19224952. [citation][year=2019]Hongwen Hui, Xingshuo An, Haoyu Wang, Weijia Ju, Huixuan Yang, Hongjie Gao, and Fuhong Lin, “Survey on Blockchain for Internet of Things”, Journal of Internet Services and Information Security (JISIS), 9(2): 1-30, May 2019, DOI: 10.22667/JISIS.2019.05.31.001 [citation][year=2019]Yong Chen, A Survey on Industrial Information Integration 2016-2019, in Journal of Industrial Integration and Management, DOI: 10.1142/S2424862219500167 [citation][year=2018]P. M. Nasr and A. Yazdian-Varjani, "Toward Operator Access Management in SCADA System: Deontological Threat Mitigation," in IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3314-3324, Aug. 2018. doi: 10.1109/TII.2017.2781285 [citation][year=2018]X. Li, C. Zhou, Y. Tian and Y. Qin, "A Dynamic Decision-Making Approach for Intrusion Response in Industrial Control Systems," in IEEE Transactions on Industrial Informatics, August 2018. doi: 10.1109/TII.2018.2866445 [citation][year=2018]Zeng P., Zhou P. (2018) Intrusion Detection in SCADA System: A Survey. In: Li K., Fei M., Du D., Yang Z., Yang D. (eds) Intelligent Computing and Internet of Things. ICSEE 2018, IMIOT 2018. Communications in Computer and Information Science, vol 924. Springer, Singapore. DOI: 10.1007/978-981-13-2384-3_32 [citation][year=2018]Ming Wan, Yan Song, Yuan Jing, and Junlu Wang, “Function-Aware Anomaly Detection Based on Wavelet Neural Network for Industrial Control Communication,” Security and Communication Networks, vol. 2018, Article ID 5103270, 11 pages, 2018. https://doi.org/10.1155/2018/5103270. [citation][year=2018]Will Serrano."Deep Learning Cluster Structures for Management Decisions: The Digital CEO". Sensors. 18. 3327. DOI: 10.3390/s18103327. 2018. [citation][year=2018]Amin Mansouri, Babak Majidi & Abdolah Shamisa (2018) Metaheuristic neural networks for anomaly recognition in industrial sensor networks with packet latency and jitter for smart infrastructures, International Journal of Computers and Applications, DOI: 10.1080/1206212X.2018.1533613 [citation][year=2018]Serrano W. (2019) The Cognitive Packet Network with QoS and Cybersecurity Deep Learning Clusters. In: Arai K., Kapoor S., Bhatia R. (eds) Intelligent Systems and Applications. IntelliSys 2018. Advances in Intelligent Systems and Computing, vol 868. Springer, Cham. Volume 1. 62-85. DOI: 10.1007/978-3-030-01054-6_5. [citation][year=2018]Mohamed Najeh Lakhoua, "Cyber Security of SCADA Network in Thermal Power Plants", in Proc of Conference: 2018 International Conference on Smart Communications and Networking (SmartNets), November 2018. DOI: 10.1109/SMARTNETS.2018.8707398 [citation][year=2018]Weize Li, Lun Xie, and Zhiliang Wang, “A Novel Covert Agent for Stealthy Attacks on Industrial Control Systems Using Least Squares Support Vector Regression,” Journal of Electrical and Computer Engineering, vol. 2018, Article ID 7204939, 14 pages, 2018. doi:10.1155/2018/7204939 [citation][year=2018]Kim, Junsik, and Jaehyun Park. "FPGA-based network intrusion detection for IEC 61850-based industrial network." ICT Express (2018). DOI: 10.1016/j.icte.2018.01.002 [citation][year=2018]Shama N. Islam, M.A. Mahmud, A.M.T. Oo, Impact of optimal false data injection attacks on local energy trading in a residential microgrid, ICT Express, Available online 21 February 2018, ISSN 2405-9595, https://doi.org/10.1016/j.icte.2018.01.015. [citation][year=2018]Li X., Wang G., Ali S., He Q. (2018) Android Malware Detection Using Category-Based Permission Vectors. In: Vaidya J., Li J. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science, vol 11337. Springer, Cham. DOI: 10.1007/978-3-030-05063-4_31 [citation][year=2018]J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an and H. Ye, "Significant Permission Identification for Machine-Learning-Based Android Malware Detection," in IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 3216-3225, July 2018. doi: 10.1109/TII.2017.2789219 [citation][year=2018]Varun Mohta, Zhipeng Zhao, Michael Sylvester Pukish, "Real-time anomaly detection in a network using state transitions", Patent Grant US-10050987-B1. Publication date: 2018/08/14. Available at: https://patents.google.com/patent/US10050987B1/en [citation][year=2017]Yufei Liu, De-Chang Pi, and Cui Lin, Mining Community-level Influence in Microblogging Network: A Case Study on Sina Weibo, Hindawi/Wiley Complexity, Received 7 June 2017; Accepted 12 November 2017. Availablle at: https://www.hindawi.com/journals/complexity/aip/4783159/ [citation][year=2017]Q. Niyaz, W. Sun, A. Javaid, "A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)", EAI Endorsed Transactions on Security and Safety 17(12): e2, published on the 28 dez 2017. DOI: 10.4108/eai.28-12-2017.153515 [citation][year=2017]Mohamed Najeh, Lakhoua, "Review on SCADA Cybersecurity for Critical Infrastructures". Journal of Computer Science & Control Systems. May2017, Vol. 10 Issue 1, p15-18. 4p. [citation][year=2017]Lamba, Anil & Singh, Satinderjeet & Singh, Balvinder & Dutta, Natasha & Sai, Sivakumar & Muni, Rela. (2017). MITIGATING CYBER SECURITY THREATS OF INDUSTRIAL CONTROL SYSTEMS (SCADA & DCS), International Journal For Technological Research In Engineering, Proc. of 3rd International Conference on Emerging Technologies in Engineering, Biomedical, Medical and Science(ETEBMS), July 2017. Available at: https://www.ijtre.com/images/scripts/16214.pdf [citation][year=2017]Lei Yang, Fengjun Li, Securing Smart Grid In-Network Aggregation through False Data Detection, EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 17(10): e5, EAI, 2017, DOI: 10.4108/eai.1-2-2017.152156. Conference Articles 2020(1 publication) [publication]Freitas, M.B.d. and Quitério, P. and Rosa, L. and Tiago Cruz and Simões, P. , "SDN-assisted containerized security and monitoring components", in IEEE/IFIP Network Operations and Management Symposium (NOMS) 2020, 2020 2018(1 publication) [publication]Freitas, M. and Rosa, L. and Tiago Cruz and Simões, P. , "SDN-enabled virtual data diode", in 4th ESORICS Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2018) , 2018 [citation][year=2020]D. Pliatsios, P. Sarigiannidis, T. Lagkas and A. G. Sarigiannidis, "A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics," in IEEE Communications Surveys & Tutorials. April 2020. DOI: 10.1109/COMST.2020.2987688 [citation][year=2019]Aasen, Øyvind, "Using Bi-directional Data Diodes to Limit Propagation of Network Attacks", MSc Thesis, Norwegian University of Science and Technology, Faculty of Information Technology and Electrical Engineering - Department of Information Security and Communication Technology. July 2019. Available at: http://hdl.handle.net/11250/2617747 2017(2 publications) [publication]Rosa, L. and Tiago Cruz and Simões, P. and Edmundo Monteiro and Lev, L. , "Attacking SCADA systems: a practical perspective", in IFIP/IEEE International Symposium on Integrated Network Management 2017, 2017 [citation][year=2019]Tidrea, A.; Korodi, A.; Silea, I. Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules. MDPI Sensors 2019, 19, 4191. DOI: 10.3390/s19194191 [citation][year=2019]Dutta N., Jadav N., Dutiya N., Joshi D. (2020) Using Honeypots for ICS Threats Evaluation. In: Pricop E., Fattahi J., Dutta N., Ibrahim M. (eds) Recent Developments on Industrial Control Systems Resilience. Studies in Systems, Decision and Control, vol 255. Springer, Cham. DOI: 10.1007/978-3-030-31328-9_9 [citation][year=2018]Teixeira, Marcio & Salman, Tara & Zolanvari, Maede & Jain, Raj. (2018). SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach. Future Internet. 10. DOI: 10.3390/fi10080076 [citation][year=2018]Syed Hazrat, Pooja Khatri, Muheet Butt, Majid Zaman, "Review of SCADA systems for Photovoltaic Power Plants", International Journal of Creative Research Thoughts, Volume 6, Issue 2 April 2018. ISSN: 2320-2882. Available at: http://www.ijcrt.org/viewfull.php?&p_id=IJCRT1892239 [publication]Rosa, L. and J. Proenca and João Henriques and Graveto, V. and Tiago Cruz and Simões, P. and Caldeira, F. and Edmundo Monteiro , "An evolved security architecture for distributed Industrial Automation and Control Systems", in In Proc. of 16th European Conference on Cyber Warfare and Security (ECCWS 2017). ISBN: 978-1-911218-43-2, 2017 [citation][year=2018]Raposo, Duarte & Rodrigues, André & Sinche, Soraya & Sá Silva, Jorge & Boavida, Fernando. (2018). Securing WirelessHART: Monitoring, Exploring and Detecting New Vulnerabilities. 1-9. 10.1109/NCA.2018.8548060. 2016(1 publication) [publication]Stewart, B. and Rosa, L. and Maglaras, L. and Tiago Cruz and Simões, P. and Janicke, H. , "Effect of Network Architecture Changes on OCSVM based Intrusion Detection System", in 2nd International Conference on Industrial Networks and Intelligent Systems (INISCOM 2016), Leicester, United Kingdom - Springer International Publishing, Lecture Notes of the Institute for Computer Sciences, 2016 [citation][year=2019]L. N. Tidjon, M. Frappier and A. Mammar, "Intrusion Detection Systems: A Cross-Domain Overview," in IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3639-3681, Fourthquarter 2019. doi: 10.1109/COMST.2019.2922584 [citation][year=2018]H. Jiao, J. Li and T. Jiang, "The Cloud Resource Load Security Detection Based on Wavelet Packet Transform and Grey Wolf Algorithm," 2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China, 2018, pp. 1-5. doi: 10.1109/ICCWAMTIP.2018.8632600 2015(1 publication) [publication]Rosa, L. and Alves, P. and Tiago Cruz and Simões, P. and Edmundo Monteiro , "A Comparative Study of Correlation Engines for Security Event Management", in In Proc. of 10th Int. Conf. on Cyber Warfare and Security (ICCWS-2015). ISBN: 978-1-910309-98-8 ISSN: 2048-9897, 2015 [citation][year=2020]M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks Against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1035-1044, Feb. 2020. doi: 10.1109/TII.2019.2926557 [citation][year=2020]Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1024-1034, Feb. 2020. doi: 10.1109/TII.2019.2925422 [citation][year=2019]Veeramany A, Hutton WJ, III, Sridhar S, Gourisetti S, Coles G, Skare P. A Framework for Development of Risk-Informed Autonomous Adaptive Cyber Controller. ASME. J. Comput. Inf. Sci. Eng. 2019;():1-31. DOI:10.1115/1.4043040 [citation][year=2017]Sandeep Sekharan, S & Kandasamy, Kamalanathan. (2017). Profiling SIEM tools and correlation engines for security analytics. in Proc of Conference: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 717-721. DOI: 10.1109/WiSPNET.2017.8299855. [citation][year=2017]VICTOR W. GITUKU, "A LOW COST SYSTEM FOR LOGON ANOMALY DETECTION BASED ON TIME AND LOCATION OF USERS ", MSc Thesis, UNITED STATES INTERNATIONAL UNIVERSITY - AFRICA, summer 2017. Available at: http://usiuservicedesk.usiu.ac.ke/bitstream/handle/11732/3533/VICTOR W GITUKU MSC 2017.pdf?sequence=1&isAllowed=y [citation][year=2017]Olivier Wang. Adaptive Rules Model : Statistical Learning for Rule-Based Systems. Machine Learning [cs.LG]. Université Paris-Saclay, 2017. English. . , PhD Thesis [citation][year=2016]Steinegger, RH, Hintz, N., Hippchen, B., Binder, G., Roeser, F., & Abeck, S. (2016, April). Log analysis with open source tools. In software technologies and processes: open source software in the industry, SMEs and the university environment 5. Conference STEP, 3.5. 2016 Furtwangen (p. 7). Walter de Gruyter GmbH & Co KG. [citation][year=2016]C. Suh-Lee, Ju-Yeon Jo and Yoohwan Kim, "Text mining for security threat detection discovering hidden information in unstructured log messages," 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, 2016, pp. 252-260. doi: 10.1109/CNS.2016.7860492 [citation][year=2016]Underwood, M. (2016) Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety, in Cyber-Assurance for the Internet of Things (ed T. T. Brooks), John Wiley & Sons, Inc., Hoboken, NJ, USA. doi: 10.1002/9781119193784.ch8 [citation][year=2016]A. Awad, S. Kadry, B. Lee, G. Maddodi and E. O'Meara, "Integrity Assurance in the Cloud by Combined PBA and Provenance," 2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST), Cardiff, UK, 2016, pp. 127-132.doi: 10.1109/NGMAST.2016.15 [citation][year=2015]Gianfranco Cerullo, Luigi Coppolino, Salvatore D’Antonio, Valerio Formicola, Gaetano Papale, Bruno Ragucci, “Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation“, in Proc. of the 9th Int. Symposium on Intelligent Distributed Computing – IDC'2015, Guimarães, Portugal, October 2015, Springer Studies in Computational Intelligence V. 616, pp 427-437, October 2015. DOI: 10.1007/978-3-319-25017-5_40. Book Chapters 2020(1 publication) [publication]Rosa, L. and Freitas, M.B.d. and João Henriques and Quitério, P. and Caldeira, F. and Tiago Cruz and Simões, P. , "Evolving the Security Paradigm for Industrial IoT Environments", in Cyber Security of Industrial Control Systems in the Future Internet Environment (upcoming), ISBN13: 9781799829102, ISBN10: 1799829103, EISBN13: 9781799829126, DOI: 10.4018/978-1-7998-2910-2, vol. N/A, 2020