Journal Articles 2020(4 publications) [publication]Casaleiro, R. and Paulo Silva and Simões, P. and Boavida, F. and Edmundo Monteiro and Marilia Curado and Tiago Cruz and Nuno Antunes and Marco Vieira and Riccio, G.M. and Verzillo, M.P. and Marek, P. and Goncalves, L. and Bagnato, A. and Valentini, A. and Intonti, B. and Manzo, R. and Posta, V.D. and Zampolini, L. and Rooij, J.v. and Houf, R. and Rios, E. and Iturbe, E. and Gutierrez, I. and Anguita, S. and Gomez, C. and Echevarria, J. and Houf, H. and Nicoletti, L. and Lotti, R. and Natale, D. and Pizzo, L.d. and Pane, F. and Schiavo, F. , "Protection and control of personal identifiable information: The PoSeID-on approach", Journal of Data Protection & Privacy, vol. 3, 2020 [publication]Martins, N. and Cruz, J.M. and Tiago Cruz and Pedro Henriques Abreu , "Adversarial Machine Learning applied to Intrusion and Malware Scenarios: a systematic review", IEEE Access, 2020 [publication]João Henriques and Caldeira, F. and Tiago Cruz and Simões, P. , "Combining K-Means and XGBoost Models for Anomaly Detection Using Log Datasets", Electronics (ISSN 2079-9292). Special Issue "Advanced Cybersecurity Services Design", vol. 9, 2020 [publication]Lima, A. and Rosa, L. and Tiago Cruz and Simões, P. , "A Security Monitoring Framework for Mobile Devices", Electronics (ISSN 2079-9292), 2020 2019(3 publications) [publication]João Henriques and Caldeira, F. and Tiago Cruz and Simões, P. , "On the Use of Ontology Data for Protecting Critical Infrastructures", Journal of Information Warfare - ISSN 1445-3312 (print) / ISSN 1445-3347 (online), vol. 17, pp. 38-55, 2019 [publication]Rosa, L. and Freitas, M.B.d. and Mazo, S. and Edmundo Monteiro and Tiago Cruz and Simões, P. , "A Comprehensive Security Analysis of a SCADA Protocol: from OSINT to Mitigation", IEEE Access (Open Access), 2019 [citation][year=2020]D. Pliatsios, P. Sarigiannidis, T. Lagkas and A. G. Sarigiannidis, "A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics," in IEEE Communications Surveys & Tutorials. April 2020. DOI: 10.1109/COMST.2020.2987688 [citation][year=2019]Aghenta, L.O.; Iqbal, M.T. "Low-Cost, Open Source IoT-Based SCADA System Design Using Thinger.IO and ESP32 Thing" Electronics 2019, 8, 822. DOI: 10.3390/electronics8080822 [citation][year=2019]Tidrea, A.; Korodi, A.; Silea, I. Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules. MDPI Sensors 2019, 19, 4191. DOI: 10.3390/s19194191 [citation][year=2019]Anass Sebbar, Karim Zkik, Mohammed Boulmalf, Mohamed Dafir Ech-Cherif El Kettani, New context-based node acceptance CBNA framework for MitM detection in SDN Architecture, Procedia Computer Science, Volume 160, 2019, Pages 825-830, ISSN 1877-0509, DOI: 10.1016/j.procs.2019.11.004 [publication]Maglaras, L. and Tiago Cruz and Ferrag, M.A. and Janicke, H. , "Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed", Internet Technology Letters, 2019 2018(7 publications) [publication]Maglaras, L. and Kim, K. and Janicke, H. and Ferrag, M.A. and Fragkou, P. and Maglaras, A. and Tiago Cruz , "Cyber Security of Critical Infrastructures", Elsevier ICT Express - Special Issue on CI & Smart Grid Cyber Security , 2018 [citation][year=2020]Ponchovny, Yu.L., "Analysis of cybersecurity management concepts for distributed IT infrastructures", Systemy ta tekhnolohiyi, No 2(58), 20192, ISSN 2521-6643, https://doi.org/10.32836/2521-6643-2019-2-58-5 [citation][year=2020]Luke Munn (2020) Injecting failure: Data center infrastructures and the imaginaries of resilience, The Information Society, DOI: 10.1080/01972243.2020.1737607 [citation][year=2020]Chelvachandran N., Kendzierskyj S., Shah Y., Jahankhani H. (2020) Cyberwarfare – Associated Technologies and Countermeasures. In: Jahankhani H., Kendzierskyj S., Chelvachandran N., Ibarra J. (eds) Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity. Advanced Sciences and Technologies for Security Applications. Springer, Cham. DOI: 10.1007/978-3-030-35746-7_2 [citation][year=2019]Handa A, Sharma A, Shukla SK. Machine learning in cybersecurity: A review. Wiley WIREs - Data Mining and Knowledge Discovery. 2019; DOI:10.1002/widm.1306 [citation][year=2019]Hu, Y., Li, H., Yang, H. et al., "Detecting stealthy attacks against industrial control systems based on residual skewness analysis", EURASIP J Wireless Com Network (2019) 2019: 74. DOI: 10.1186/s13638-019-1389-1 [citation][year=2019]Hu, Yan & Li, Hong & H. Luan, Tom & Yang, An & Sun, Limin & Wang, Zhiliang & Wang, Rui. (2018). Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. Future Generation Computer Systems. 10.1016/j.future.2018.07.027. [citation][year=2019]R. Jidin, S. N. Tukijan, I. Al-Bahadly, N. Jamil and Q. S. Qassim, "Prototyping a Lightweight Encryption on a Field Programmable Gate Array for Securing Tele-Control Data," 2018 8th IEEE International Conference on Control System, Computing and Engineering (ICCSCE), Penang, Malaysia, 2018, pp. 180-185. DOI: 10.1109/ICCSCE.2018.8685001 [citation][year=2019]Socarrás, H.E., Santana, I., "Cyber security for the industrial control system of the elquim’s chlorine plant [Ciberseguridad del sistema de control industrial de la planta cloro-sosa ELQUIM]", 2019, RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao, 2019 (32), pp. 83-96. DOI; 10.17013/risti.32.83–96 [citation][year=2019]Mikhail Gurin, Alexey Vulfin, Vladimir Vasilyev, Andrey Nikonov, "Intrusion detection system on the basis of data mining algorithms in the industrial network", in Proceedings of the Data Science Session at the V International Conference on Information Technology and Nanotechnology, Samara, Russia, May 21-24, 2019. Available at: http://ceur-ws.org/Vol-2416/ [citation][year=2019]W. Li, J. Jin and J. Lee, "Analysis of Botnet Domain Names for IoT Cybersecurity," in IEEE Access, vol. 7, pp. 94658-94665, 2019. doi: 10.1109/ACCESS.2019.2927355 [citation][year=2019]R. Colelli, S. Panzieri and F. Pascucci, "Securing connection between IT and OT: the Fog Intrusion Detection System prospective," 2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT), Naples, Italy, 2019, pp. 444-448. DOI: 10.1109/METROI4.2019.8792884 [citation][year=2019]Börner, Johannes and Scheurich, Simon and Steinke, Florian (2019): Nonlinear consensus for improved resilience of distributed secondary frequency control. Bucharest, Romania, In: 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), Bucharest, Romania, September 29 to October 2, 2019. [citation][year=2019]Viganò, Eleonora & Loi, Michele & Yaghmaei, Emad. (2019). Cybersecurity of critical infrastructure, in The Ethics of Cybersecurity, Springer, september 2019. [citation][year=2019]Veneta Yosifova, Roumen Trifonov, Antoniya Tasheva, and Ognian Nakov. 2019. Trends Review of the Contemporary Security Problems in the Cyberspace. In Proceedings of the 9th Balkan Conference on Informatics (BCI'19). ACM, New York, NY, USA, Article 10, 4 pages. DOI: https://doi.org/10.1145/3351556.3351560 [citation][year=2019]Carreño Pérez, Juan Carlos. "Metodología para evaluación de ciber vulnerabilidad en sistemas de transmisión de energía eléctrica “EVULCIB”, estudio de caso subestación eléctrica de 230kV ubicada en la ciudad de Bogotá-Colombia.", MSc thesis, Universidad Distrital Francisco Jose? De Caldas, Colombia, 2019. [citation][year=2019]Serrano, Will. "Deep Reinforcement Learning Algorithms in Intelligent Infrastructure." Infrastructures 4.3 (2019): 52. DOI: 0.3390/infrastructures4030052 [citation][year=2019]Vavra J., Hromada M. (2019) Optimization of the Novelty Detection Model Based on LSTM Autoencoder for ICS Environment. In: Silhavy R., Silhavy P., Prokopova Z. (eds) Intelligent Systems Applications in Software Engineering. CoMeSySo 2019 2019. Advances in Intelligent Systems and Computing, vol 1046. Springer, Cham. DOI: 10.1007/978-3-030-30329-7_28 [citation][year=2019]Mazzoccoli, A. and Naldi, M. (2019), Robustness of Optimal Investment Decisions in Mixed Insurance/Investment Cyber Risk Management. Risk Analysis. DOI:10.1111/risa.13416 [citation][year=2019]Raposo, Duarte & Rodrigues, André & Sinche, Soraya & Sá Silva, Jorge & Boavida, Fernando. (2019). Security and Fault Detection in In-node components of IIoT Constrained Devices, in Proc of Local Computer Networks Conference (LCN), October 2019 [citation][year=2019]R. Kekoa Koehler, "When the Lights Go Out: Vulnerabilities to US Critical Infrastructure, the Russian Cyber Threat, and a New Way Forward", Georgetown Security Studies Review, Volume 7, Issue 1 January 2019. ISSN 2474-8552 (print); ISSN 2474-8560 (online). URL: http://georgetownsecuritystudiesreview.org/wp-content/uploads/2019/01/GSSR-7.1-final-text-updated.pdf#page=27 [citation][year=2019]Y. Hu, Y. Sun, Y. Wang and Z. Wang, "An Enhanced Multi-Stage Semantic Attack Against Industrial Control Systems," in IEEE Access, vol. 7, pp. 156871-156882, 2019. doi: 10.1109/ACCESS.2019.2949645 [citation][year=2019]Noshina Tariq, Muhammad Asim, Farrukh Aslam Khan, “Securing SCADA-based Critical Infrastructures: Challenges and Open Issues”, Procedia Computer Science, Volume 155, 2019, Pages 612-617, ISSN 1877-0509, DOI: 10.1016/j.procs.2019.08.086. [citation][year=2019]Rodrigues, Bruno & Franco, Muriel & Parangi, Geetha & Stiller, Burkhard. (2019). SEConomy: A Framework for the Economic Assessment of Cybersecurity. DOI: 10.1007/978-3-030-36027-6_13. [citation][year=2019]Álvaro Roberto Rojas Castro, "Protección en infraestructuras críticas. Análisis de seguridad de los sistemas de control industrial", MsC thesis, Máster Interuniversitario en Seguridad de las Tecnologías de la Información y de las Comunicaciones (MISTIC), Universitat Oberta de Catalunya, January 2019. Available at: http://openaccess.uoc.edu/webapps/o2/bitstream/10609/88006/1/Memoria_TFM_arojascas_PEC4.pdf [citation][year=2019]Ponochovniy, Y. L. (2019). ANALYSIS OF CYBER SECURITY MANAGEMENT CONCEPTS FOR DISTRIBUTED IT INFRASTRUCTURES. Systems and Technologies, 2(58), 87-101. DOI: 10.32836/2521-6643-2019-2-58-5 [citation][year=2018]Lu KC., Liu IH., Sun MW., Li JS. (2019) A Survey on SCADA Security and Honeypot in Industrial Control System. In: Saeed F., Gazem N., Mohammed F., Busalim A. (eds) Recent Trends in Data Science and Soft Computing. IRICT 2018. Advances in Intelligent Systems and Computing, vol 843. Springer, Cham. DOI: 10.1007/978-3-319-99007-1_56 [citation][year=2018]Raposo, D.; Rodrigues, A.; Sinche, S.; Sá Silva, J.; Boavida, F., "Industrial IoT Monitoring: Technologies and Architecture Proposal". Sensors 2018, 18, 3568. DOI: 10.3390/s18103568 [citation][year=2018]Nicol, Cameron, "Cybersecurity and national resilience in Estonia", MSc Thesis in International Security, Intelligence and Strategic Studies (SECINTEL). May 2018. DOI: 20.500.11956/101734. [citation][year=2018]Raposo, Duarte & Rodrigues, André & Sinche, Soraya & Sá Silva, Jorge & Boavida, Fernando. (2018). Securing WirelessHART: Monitoring, Exploring and Detecting New Vulnerabilities. 1-9. 10.1109/NCA.2018.8548060. [citation][year=2018]Sameera, N. (2018). Protocol-Specific Intrusion Detection System using KNN Classifier. International Journal for Research in Applied Science and Engineering Technology. 6. 292-299. 10.22214/ijraset.2018.5049. [citation][year=2018]Vavra, J[an] & Hromada, M[artin] (2018). Comparative Study of Feature Selection Techniques Respecting Novelty Detection in the Industrial Control System Environment, Proceedings of the 29th DAAAM International Symposium, pp.1084-1091, B. Katalinic (Ed.), Published by DAAAM International, ISBN 978-3-902734-20-4, ISSN 1726-9679, Vienna, Austria. DOI: 10.2507/29th.daaam.proceedings.155 [publication]Barbatsalou, K. and Tiago Cruz and Simões, P. and Edmundo Monteiro , "Current and Future Trends in Mobile Device Forensics: A Survey", ACM Computing Surveys, vol. 51, pp. 46, 2018 [citation][year=2020]Dohyun Kim, Sangjin Lee, Study of identifying and managing the potential evidence for effective Android forensics, Forensic Science International: Digital Investigation, 2020, 200897, ISSN 2666-2817, https://doi.org/10.1016/j.fsidi.2019.200897. [citation][year=2019]Kruger, Jaco-Louis, and Hein Venter. "State of the art in Digital Forensics for the Internet of Things." International Conference on Cyber Warfare and Security. Academic Conferences International Limited, 2019. [citation][year=2019]S. Duarte, C. Paisner, A. Tian, J. Yuen, "Development of STC Corporate Mobile Application", Worcester Polytechnic Institute Digital WPI, BSc project. Available at: https://web.wpi.edu/Pubs/E-project/Available/E-project-022719-022919/ [citation][year=2019]Xiaolu Zhang, Kim-Kwang Raymond Choo, Nicole Lang Beebe, "How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform", IEEE Internet of Things Journal, 2019. DOI: 10.1109/JIOT.2019.2912118. [citation][year=2019]Zhang X., Yuen T.T., Choo KK.R. (2020) Experiential Learning in Digital Forensics. In: Zhang X., Choo KK. (eds) Digital Forensic Education. Studies in Big Data, vol 61. Springer, Cham, 25 july 2019. [citation][year=2019]Abdullahi Aminu Kazaure, Aman Jantan, Mohd Najwadi Yusoff, Aminu Maigari, Mohamad Khairi Ishak, Nor Rizuan Mar Noor, "Evidence Collection and Forensic Challenges in Cloud Environment", MACE Technical Journal, Vol.1(01), pp. 19-24, eISSN: 2710-6632, December 2019. [citation][year=2019]Yan Jiang, Youwen Zhu, Jian Wang, Yong Xiang, Efficient authentication protocol with anonymity and key protection for mobile Internet users, Journal of Parallel and Distributed Computing, Volume 137, 2020, Pages 179-191, ISSN 0743-7315, DOI: 10.1016/j.jpdc.2019.11.010. [citation][year=2018]Ibrar Yaqoob, Ibrahim Abaker Targio Hashem, Arif Ahmed, S.M. Ahsan Kazmi, Choong Seon Hong, Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges, Future Generation Computer Systems, 2018, ISSN 0167-739X, https://doi.org/10.1016/j.future.2018.09.058. [citation][year=2018]Li, C.-Y., Huang, C.-C., Lai, F., Lee, S.-L., Wu, J., "A Comprehensive Overview of Government Hacking Worldwide", (2018) IEEE Access, 6, art. no. 8470931, pp. 55053-55073. DOI: 10.1109/ACCESS.2018.2871762 [citation][year=2018]Umair A., Nanda P., He X., Choo KK.R. (2018) User Relationship Classification of Facebook Messenger Mobile Data using WEKA. In: Au M. et al. (eds) Network and System Security. NSS 2018. Lecture Notes in Computer Science, vol 11058. Springer, Cham. DOI: 10.1007/978-3-030-02744-5_25 [citation][year=2018]Atkinson, Jamiella. "Mobile Device Forensics: Overview, Challenges, and Guideline Developmental Opportunities." MsC thesis, Utica College, ProQuest Dissertations Publishing, 2018. 13422253. Available at: https://search.proquest.com/openview/a88b32750ae71056cbd608202fa18f12 [publication]C.Foglietta, . and Masucci, D. and Palazzo, C. and Santini, R. and Panzieri, S. and Rosa, L. and Tiago Cruz and Lev, L. , "From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment", IEEE Systems Journal , 2018 [citation][year=2020]Kordestani, Mojtaba & Chaibakhsh, Ali & Saif, Mehrdad. (2020). SMS–A Security Management System for Steam Turbines Using a Multisensor Array. IEEE Systems Journal. PP. 1-12. January 2020, 10.1109/JSYST.2019.2960149 [citation][year=2019]Qais Saif Qassim; Norziana Jamil; Maslina Daud; Hafizah Che Hasan, "Towards implementing scalable and reconfigurable SCADA security testbed in power system environment", International Journal of Critical Infrastructures, Vol.15 No.2, 2019. DOI: 10.1504/IJCIS.2019.098834 [citation][year=2019]A. Giuseppi, A. Tortorelli, R. Germanà, F. Liberati and A. Fiaschetti, "Securing Cyber-Physical Systems: An Optimization Framework based on OSSTMM and Genetic Algorithms," 2019 27th Mediterranean Conference on Control and Automation (MED), Akko, Israel, 2019, pp. 50-56. DOI: 10.1109/MED.2019.8798506 [citation][year=2019]Raposo, Duarte & Rodrigues, André & Sinche, Soraya & Sá Silva, Jorge & Boavida, Fernando. (2019). Security and Fault Detection in In-node components of IIoT Constrained Devices, in Proc of Local Computer Networks Conference (LCN), October 2019 [publication]Adamsky, F. and Aubigny, M. and Battisti, F. and Carli, M. and Cimorelli, F. and Tiago Cruz and Giorgio, A.d. and C.Foglietta, . and Galli, A. and Giuseppi, A. and Liberati, F. and Neri, A. and Panzieri, S. and Pascucci, F. and Proença, J. and Pucci, P. and Rosa, L. and Soua, R. , "Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach", International Journal of Critical Infrastructure Protection - Elsevier, 2018 [citation][year=2020]F. Liberati, A. Di Giorgio, A. Giuseppi, A. Pietrabissa and F. Delli Priscoli, "Efficient and Risk-Aware Control of Electricity Distribution Grids," in IEEE Systems Journal, January 2020. doi: 10.1109/JSYST.2020.2965633 [citation][year=2020]Arroyo-Figueroa, Gustavo, Isai Rojas-Gonzalez and José Alberto Hernández-Aguilar. "A Compressive Compilation of Cyber Security for Internet of Energy (IoE)." Cyber Security of Industrial Control Systems in the Future Internet Environment. IGI Global, 2020. 267-294. Web. 3 Mar. 2020. doi:10.4018/978-1-7998-2910-2.ch013 [citation][year=2019]Hunor Sándor, Béla Genge, Zoltán Szántó, Lõrinc Márton, Piroska Haller, "Cyber Attack Detection and Mitigation: Software Defined Survivable Industrial Control Systems", International Journal of Critical Infrastructure Protection, 2019, ISSN 1874-5482. DOI: 10.1016/j.ijcip.2019.04.002 [citation][year=2019]Juan Enrique Rubio, Cristina Alcaraz, Rodrigo Roman, Javier Lopez, "Current Cyber-Defense Trends in Industrial Control Systems", Computers & Security, 2019. DOI 10.1016/j.cose.2019.06.015. [citation][year=2019]Federico Lisi, Giacinto Losquadro, Francesco Delli Priscoli, Antonio Ornatelli, Manuel Donsante, Multi-Connectivity in 5G terrestrial-Satellite Networks: the 5G-ALLSTAR Solution, 25th Ka and Broadband Communications (Ka conference)", Sorrento (Italy), September 30 - October 2, 2019 (Session IX, Part 2). URL: https://arxiv.org/abs/2004.00368 [publication]Barbatsalou, K. and Tiago Cruz and Simões, P. and Edmundo Monteiro , "Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence", IEEE Access (Open Access), vol. 6, pp. 59705-59727, 2018 [publication]Graveto, V. and Rosa, L. and Tiago Cruz and Simões, P. , "A Stealth Monitoring Mechanism for Cyber-Physical Systems", International Journal of Critical Infrastructure Protection, 2018 [citation][year=2019]Abdul Wahid Mir, Ramkumar Ketti Ramachandran, (2019) "Security gaps assessment of smart grid based SCADA systems", Information & Computer Security, Vol. 27 Issue: 3, pp.434-452, DOI: 10.1108/ICS-12-2018-0146 [citation][year=2019]A. Giuseppi, A. Tortorelli, R. Germanà, F. Liberati and A. Fiaschetti, "Securing Cyber-Physical Systems: An Optimization Framework based on OSSTMM and Genetic Algorithms," 2019 27th Mediterranean Conference on Control and Automation (MED), Akko, Israel, 2019, pp. 50-56. DOI: 10.1109/MED.2019.8798506 [citation][year=2019]Natarajan, Jayapandian. "Cyber Secure Man-in-the-Middle Attack Intrusion Detection Using Machine Learning Algorithms." AI and Big Data’s Potential for Disruptive Innovation. IGI Global, 2020. 291-316. Web. 9 Sep. 2019. doi:10.4018/978-1-5225-9687-5.ch011 [citation][year=2019]Raposo, Duarte & Rodrigues, André & Sinche, Soraya & Sá Silva, Jorge & Boavida, Fernando. (2019). Security and Fault Detection in In-node components of IIoT Constrained Devices, in Proc of Local Computer Networks Conference (LCN), October 2019 [publication]J. Proenca and Simões, P. and Tiago Cruz and Edmundo Monteiro , "Virtualization of Residential Gateways: A Comprehensive Survey", IEEE Communications Surveys Tutorials, vol. 21, pp. 1462-1482, 2018 [citation][year=2019]Daniel Temp and Rodrigo Mansilha and Deivid Rodrigues and Diego Kreutz, Rumo á Delegação Escalável e Segura de Gerenciamento de LANs para ISPs, 17ª Escola Regional de Redes de Computadores, 16-19 setembro, 2019. Alegrete-RS, Brasil. Available at: http://errc.sbc.org.br/2019/papers/temp2019rumo.pdf [citation][year=2019]Ben Azzouz, Lamia, and Intissar Jamai. "SDN, slicing, and NFV paradigms for a smart home: A comprehensive survey." Transactions on Emerging Telecommunications Technologies, 2019. DOI: 10.1002/ett.3744 2017(1 publication) [publication]Stewart, B. and Rosa, L. and Maglaras, L. and Tiago Cruz and Ferrag, M.A. and Simões, P. and Janicke, H. , "A Novel Intrusion Detection Mechanism for SCADA systems that Automatically Adapts to Changes in Network Topology", EAI Transactions in Industrial Networks and Intelligent Systems (INISCOM 2016 Special Edition with extended papers), 2017 [citation][year=2019]Mohiuddin, Ghulam. (2019). Modeling Network Intrusion Detection System Using Feed-Forward Neural Network using UNSW-NB15 Dataset, in Proc of Smart Energy Grid Engineering, Canada, [citation][year=2019]L. Zhiqiang, G. Mohi-Ud-Din, L. Bing, L. Jianchao, Z. Ye and L. Zhijun, "Modeling Network Intrusion Detection System Using Feed-Forward Neural Network Using UNSW-NB15 Dataset," 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 2019, pp. 299-303. DOI: 10.1109/SEGE.2019.8859773 [citation][year=2019]Yin, Xiaochun & Liu, Zeng & Nkenyereye, Lewis & Ndibanje, Bruce. (2019). Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach. Sensors. 19. 4952. 10.3390/s19224952. [citation][year=2019]Muna Al-Hawawreh, Elena Sitnikova, and Frank den Hartog. 2019. An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things. In Proceedings of the 3rd International Conference on Big Data and Internet of Things (BDIOT 2019). ACM, New York, NY, USA, 83-87. DOI: https://doi.org/10.1145/3361758.3361762 [citation][year=2018]Ibrar Yaqoob, Ibrahim Abaker Targio Hashem, Arif Ahmed, S.M. Ahsan Kazmi, Choong Seon Hong, Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges, Future Generation Computer Systems, 2018, ISSN 0167-739X, https://doi.org/10.1016/j.future.2018.09.058. [citation][year=2018]Al-Hawawreh, Muna & Moustafa, Nour & Sitnikova, Elena. (2018). Identification of malicious activities in industrial internet of things based on deep learning models. Journal of Information Security and Applications. 41. 10.1016/j.jisa.2018.05.002. [citation][year=2017]M. Al-Zewairi, S. Almajali and A. Awajan, "Experimental Evaluation of a Multi-layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System," 2017 International Conference on New Trends in Computing Sciences (ICTCS), Amman, 2017, pp. 167-172. 2016(4 publications) [publication]Maglaras, L. and Jiang, J. and Tiago Cruz , "Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems", Elsevier Journal of Information Security and Applications, 2016 [citation][year=2020]Lu, Yutao; Wang, Juan; Liu, Miao; Zhang, Kaixuan; Gui, Guan; Ohtsuki, Tomoaki; et al. (2020): Semi-supervised Machine Learning Aided Anomaly Detection Method in Cellular Networks. TechRxiv. Preprint. https://doi.org/10.36227/techrxiv.11634720.v1 [citation][year=2020]Chaithanya P.S., Priyanga S., Pravinraj S., Shankar Sriram V.S. (2020) SSO-IF: An Outlier Detection Approach for Intrusion Detection in SCADA Systems. In: Ranganathan G., Chen J., Rocha Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 89. Springer, Singapore. DOI: 10.1007/978-981-15-0146-3_89. [citation][year=2020]Soumya Ray*, Kamta Nath Mishra and Sandip Dutta, “Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review”, Recent Advances in Computer Science and Communications (2020) 13: 1. https://doi.org/10.2174/2666255813666200224092717 [citation][year=2020]Abdullah Al-Noman Patwary, Anmin Fu, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Md Anwarul Kaium Patwary, Erfan Aghasian, "Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review", arXiv:2003.00395v1, March 2020 [citation][year=2020]Shamshe Alam, Sanjay Kumar Sonbhadra, Sonali Agarwal, P. Nagabhushan, One-class support vector classifiers: A survey, Knowledge-Based Systems, Volume 196, 2020, ISSN 0950-7051, DOI: 10.1016/j.knosys.2020.105754. [citation][year=2020]Shamshe Alam, Sanjay Kumar Sonbhadra, Sonali Agarwal, P. Nagabhushan, M. Tanveer, Sample reduction using farthest boundary point estimation (FBPE) for support vector data description (SVDD), Pattern Recognition Letters, Volume 131, 2020, Pages 268-276, ISSN 0167-8655, March 2020. DOI: 10.1016/j.patrec.2020.01.004. [citation][year=2020]DongInn Kim, Vafa Andalibi, and L Jean Camp. Fingerprinting Edge and Cloud Services in IoT. In Systematic Approaches to Digital Forensic Engineering, City University of New York (CUNY), New York City, May 2020. URL: http://www.usablesecurity.net/projects/IoT/papers/Fingerprinting_IoT_Final.pdf [citation][year=2020]Jakapan Suaboot, Adil Fahad, Zahir Tari, John Grundy, Abdun Naser Mahmood, Abdulmohsen Almalawi, Albert Y. Zomaya, and Khalil Drira. 2020. A Taxonomy of Supervised Learning for IDSs in SCADA Environments. ACM Comput. Surv. 53, 2, Article 40 (April 2020), 37 pages. https://doi.org/10.1145/3379499 [citation][year=2019]A. Damien, M. Marcourt, V. Nicomette, E. Alata and M. Kaâniche, "Implementation of a Host-Based Intrusion Detection System for Avionic Applications," 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto, Japan, 2019, pp. 178-17809. doi: 10.1109/PRDC47002.2019.00048 [citation][year=2019]R. Zhang and H. Chen, "Intrusion Detection of Industrial Control System Based on Stacked Auto-Encoder," 2019 Chinese Automation Congress (CAC), Hangzhou, China, 2019, pp. 5638-5643. DOI: 10.1109/CAC48633.2019.8997243 [citation][year=2019]Khan, Ahsan Al Zaki & Serpen, Gursel. (2019). Misuse Intrusion Detection Using Machine Learning for Gas Pipeline SCADA Networks, in Proc. of International Conf. Security and Management, SAM'19, Las Vegas (USA), 2019. ISBN: 1-60132-509-6, CSREA Pres. Available at: https://csce.ucmss.com/cr/books/2019/LFS/CSREA2019/SAM9718.pdf [citation][year=2019]Theekshana Dissanayake,Yasitha Rajapaksha, Roshan Ragel, Isuru Nawinne, (2019). An Ensemble Learning Approach for Electrocardiogram Sensor Based Human Emotion Recognition. Sensors. 19. 4495. 10.3390/s19204495. [citation][year=2019]Bodunde O Akinyemi, Johnson B Adekunle, Temitope A Aladesanmi, Adesola G Aderounmu, Beman H Kamagate, An Improved Anomalous Intrusion Detection Model, in FUOYE Journal of Engineering and Technology, Vol 4, no 2, 2019. Available at: http://engineering.fuoye.edu.ng/journal/index.php/engineer/article/view/418 [citation][year=2019]Kensuke TAMURA, Kanta MATSUURA, Improvement of Anomaly Detection Performance Using Packet Flow Regularity in Industrial Control Networks, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2019, Volume E102.A, Issue 1, Pages 65-73, Released January 01, 2019, Online ISSN 1745-1337, Print ISSN 0916-8508, https://doi.org/10.1587/transfun.E102.A.65 [citation][year=2019]Fatima-Zahra Benjelloun, Ayoub Ait Lahcen, and Samir Belfkih, "Outlier detection techniques for big data streams: focus on cyber security", in International Journal of Internet Technology and Secured Transactions 2019 9:4, 446-474, 2019. DOI: 10.1504/IJITST.2019.102799 [citation][year=2019]Aya Ayadi, Oussama Ghorbel, M.S. BenSalah, Mohamed Abid, Kernelized technique for outliers detection to monitoring water pipeline based on WSNs, Elsevier Computer Networks, Volume 150, 2019, Pages 179-189, ISSN 1389-1286, DOI: 10.1016/j.comnet.2019.01.004 [citation][year=2019]Nageswaran, Neha & Suresh, Seshan & Priyanga, S & Sriram, V.S. Shankar. (2019). SCO-RNN: A Behavioral based Intrusion Detection approach for Cyber Physical Attacks in SCADA System, in Proc of International Conference on Inventive Communication and Computational Technologies. [citation][year=2018]Subramaniyam Kannan, "Mitigating Multi-Stage Attacks in Software Defined Network-Based Distributed Systems", MsC Thesis, Purdue University. Available at: https://docs.lib.purdue.edu/dissertations/AAI10838651/ [citation][year=2018]Yafang Yang, Bin Guo, Zhu Wang, Mingyang Li, Zhiwen Yu, Xingshe Zhou, "BehaveSense: Continuous Authentication for Security-Sensitive Mobile Apps using Behavioral Biometrics", Elsevier Ad Hoc Networks, 2018, ISSN 1570-8705, https://doi.org/10.1016/j.adhoc.2018.09.015. (http://www.sciencedirect.com/science/article/pii/S1570870518306899) [citation][year=2018]F. Schuster, F. M. Kopp, A. Paul and H. König, "Attack and Fault Detection in Process Control Communication Using Unsupervised Machine Learning," 2018 IEEE 16th International Conference on Industrial Informatics (INDIN), Porto, Portugal, July 2018, pp. 433-438. doi: 10.1109/INDIN.2018.8472054 [citation][year=2018]F. Schuster, A. Paul, F. M. Kopp and H. König, "Catching Intrusions: Classifier Performances for Detecting Network-specific Anomalies in Energy Systems," 2018 International Conference on Smart Energy Systems and Technologies (SEST), Sevilla, Spain, Sep 2018, pp. 1-6. doi: 10.1109/SEST.2018.8495702 [citation][year=2018]Oyeniyi Akeem Alimi, Khmaies Ouahada, Security Assessment of the Smart Grid: A Review focusing on the NAN Architecture. In Proc. of Conference: 2018 IEEE 7th International Conference on Adaptive Science & Technology (ICAST), August 2018. DOI: 10.1109/ICASTECH.2018.8506847. [citation][year=2018]Paramkusem, Krishna Madhuri and Aygun, Ramazan S., "Classifying Categories of SCADA Attacks in a Big Data Framework", Annals of Data Science, january 2018. doi=10.1007/s40745-018-0141-8 [citation][year=2018]Mehrdad, S., Mousavian, S., Madraki, G. et al., "Cyber-Physical Resilience of Electrical Power Systems Against Malicious Attacks: a Review", in Springer Current Sustainable Renewable Energy Reports (2018). https://doi.org/10.1007/s40518-018-0094-8 [citation][year=2018]Li Ting ; Hong Zhennan ; Liu Zhiyong ; Xiao Tizheng, Intrusion Detection of Industrial Control System Based on Incremental Single Class Support Vector Machine, Information and Control, China Automation Society, issue 6, December 2018. DOI:10.13976/j.cnki.xk.2018.7431 [citation][year=2017]TRI SI DOAN, "ENSEMBLE LEARNING FOR MULTIPLE DATA MINING PROBLEMS", Ph.D Thesis, Department of Computer Science, University of Colorado Colorado Springs, Advisor: Professor, Chair Jugal Kalita. URL: https://dspace.library.colostate.edu/bitstream/handle/10976/166686/Doan_uccs_0892D_10279.pdf?sequence=1&isAllowed= [citation][year=2017]Moustafa, Nour. (2017). Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic, PhD Thesis, October 2017. [citation][year=2017]Kannan, Subramaniyam, Paul Wood, Larry Deatrick, Patricia Beane, Somali Chaterji, and Saurabh Bagchi. "MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks.", EAI Endorsed Transactions on Security and Safety, 2018. Available at: https://engineering.purdue.edu/dcsl/publications/papers/2017/final_maat_transactions18-security-n-safety.pdf [citation][year=2017]Shang Wenli, An Panfeng, Wan Ming, Zhao Jianming, Zeng Peng, "Research and development overview of intrusion detection technology in industrial control system", Journal of Application Research of Computers, Vol 34 (2), ISSN: 1001-3695,pp:328-333, 342 2017. Available at: http://ir.sia.cn/handle/173321/19380. DOI: 10.3969/j.issn.1001-3695.2017.02.002. [citation][year=2017]Ahmad, Rami Haidar and Al-Sakib Khan Pathan. "A Study on M2M (Machine to Machine) System and Communication: Its Security, Threats, and Intrusion Detection System." The Internet of Things: Breakthroughs in Research and Practice. IGI Global, 2017. 205-240. Web. 17 Aug. 2017. doi:10.4018/978-1-5225-1832-7.ch010 [citation][year=2017]Q. Niyaz, W. Sun, A. Javaid, "A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)", EAI Endorsed Transactions on Security and Safety 17(12): e2, published on the 28 dez 2017. DOI: 10.4108/eai.28-12-2017.153515 [citation][year=2017]Lamba, Anil & Singh, Satinderjeet & Singh, Balvinder & Dutta, Natasha & Sai, Sivakumar & Muni, Rela. (2017). MITIGATING CYBER SECURITY THREATS OF INDUSTRIAL CONTROL SYSTEMS (SCADA & DCS), International Journal For Technological Research In Engineering, Proc. of 3rd International Conference on Emerging Technologies in Engineering, Biomedical, Medical and Science(ETEBMS), July 2017. Available at: https://www.ijtre.com/images/scripts/16214.pdf [citation][year=2016]S. Lee, H. Yoo, J. Seo and T. Shon, "Packet Diversity-Based Anomaly Detection System with OCSVM and Representative Model," 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Chengdu, 2016, pp. 498-503. doi: 10.1109/iThings-GreenCom-CPSCom-SmartData.2016.116 [publication]Tiago Cruz and Rosa, L. and J. Proenca and Maglaras, L. and Aubigny, M. and Lev, L. and Jiang, J. and Simões, P. , "A Cyber Security Detection Framework for Supervisory Control and Data Acquisition Systems", IEEE Transactions on Industrial Informatics, ISSN (print): 1551-3203, ISSN (electronic): 1941-0050, vol. 12, pp. 1-11, 2016 [citation][year=2020]M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks Against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1035-1044, Feb. 2020. DOI: 10.1109/TII.2019.2926557 [citation][year=2020]Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1024-1034, Feb. 2020. doi: 10.1109/TII.2019.2925422 [citation][year=2020]LUO, Junzhou & HE, Yuan & ZHANG, Lan & LIU, Liang & SUN, Maojie & XIONG, Runqun & DONG, Fang. (2020). The architecture and key technologies for an industrial Internet with synergy between the cloud and clients. SCIENTIA SINICA Informationis. 50. 195-220. DOI: 10.1360/N112019-00005. [citation][year=2020]Soumya Ray*, Kamta Nath Mishra and Sandip Dutta, “Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review”, Recent Advances in Computer Science and Communications (2020) 13: 1. https://doi.org/10.2174/2666255813666200224092717 [citation][year=2020]Abdullah Al-Noman Patwary, Anmin Fu, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Md Anwarul Kaium Patwary, Erfan Aghasian, "Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review", arXiv:2003.00395v1, March 2020 [citation][year=2020]Claudio Zunino, Adriano Valenzano, Roman Obermaisser, Stig Petersen, Factory Communications at the Dawn of the Fourth Industrial Revolution, Computer Standards & Interfaces, Volume 71, 2020, ISSN 0920-5489, DOI: 10.1016/j.csi.2020.103433. [citation][year=2020]L. Ding, Q. Han, B. Ning and D. Yue, "Distributed Resilient Finite-Time Secondary Control for Heterogeneous Battery Energy Storage Systems Under Denial-of-Service Attacks," in IEEE Transactions on Industrial Informatics, vol. 16, no. 7, pp. 4909-4919, July 2020. [citation][year=2020]Jakapan Suaboot, Adil Fahad, Zahir Tari, John Grundy, Abdun Naser Mahmood, Abdulmohsen Almalawi, Albert Y. Zomaya, and Khalil Drira. 2020. A Taxonomy of Supervised Learning for IDSs in SCADA Environments. ACM Comput. Surv. 53, 2, Article 40 (April 2020), 37 pages. https://doi.org/10.1145/3379499 [citation][year=2019]Lin, L.; Wang, B.; Qi, J.; Wang, D.; Huang, N. Bearing Fault Diagnosis Considering the Effect of Imbalance Training Sample. Entropy 2019, 21, 386. DOI: 10.3390/e21040386 [citation][year=2019]Will Serrano, Erol Gelenbe, "Deep Learning Clusters in the Cognitive Packet Network", Neurocomputing, 2019, ISSN 0925-2312. DOI: 10.1016/j.neucom.2018.07.101. [citation][year=2019]Jiwoong Kang, Taein Kim, Jaehyun Park, "FPGA-based Real-time Abnormal Packet Detector for Critical Industrial Network", in Proc. of 2019 Workshop on Communications in Critical Embedded Systems (as part of IEEE ISCC 2019), june 30, 2019, Barcelona, Spain. DOI: 10.1109/ISCC47284.2019.8969630 [citation][year=2019]Venkataramanan, Venkatesh & Srivastava, Anurag & Hahn, Adam. (2019). CyPhyR: A Cyber-Physical Analysis Tool for Measuring and Enabling Resiliency in Microgrids. IET Cyber-Physical Systems: Theory & Applications. DOI: 10.1049/iet-cps.2018.5069. [citation][year=2019]Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, 2019. doi: 10.1109/TII.2019.2925422 [citation][year=2019]J. Yang, C. Zhou, Y. Tian and S. Yang, "A Software-defined Security Approach for Securing Field Zones in Industrial Control Systems," in IEEE Access, 2019. doi: 10.1109/ACCESS.2019.2924800 [citation][year=2019]Qi Min, "Research on the Importance of Maintaining Network Ideology Security in the Context of Globalization", in Proc. of 2019 4th International Social Sciences and Education Conference (ISSEC 2019) , Xiamen, China, 27-28 june 2019. Available at: https://www.webofproceedings.org/proceedings_series/ESSP/ISSEC 2019/ISSEC19040.pdf [citation][year=2019]M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2019.2926557 [citation][year=2019]D. Sun, G. Zhang and S. Gao, "Data Management across Geographically-Distributed Autonomous Systems: Architecture, Implementation, and Performance Evaluation," in IEEE Transactions on Industrial Informatics ,2019. DOI: 10.1109/TII.2019.2936298 [citation][year=2019]Y. Liu, A. Liu, X. Liu and M. Ma, "A Trust-based Active Detection for Cyber-physical Security in Industrial Environments," in IEEE Transactions on Industrial Informatics, 2019. doi: 10.1109/TII.2019.2931394 [citation][year=2019]D. A. Noby and A. Khattab, "A Survey of Blockchain Applications in IoT Systems," 2019 14th International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt, 2019, pp. 83-87. DOI: 10.1109/ICCES48960.2019.9068170 [citation][year=2019]H. F. M. de Figueiredo, M. K. Ferst and G. W. Denardin, "An Overview About Detection of Cyber-Attacks on Power SCADA Systems," 2019 IEEE 15th Brazilian Power Electronics Conference and 5th IEEE Southern Power Electronics Conference (COBEP/SPEC), Santos, Brazil, 2019, pp. 1-6. DOI: 10.1109/COBEP/SPEC44138.2019.9065353 [citation][year=2019]D. Sun, G. Zhang and S. Gao, "Data Management across Geographically Distributed Autonomous Systems: Architecture, Implementation, and Performance Evaluation," 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Zhangjiajie, China, 2019, pp. 2284-2292. DOI: 10.1109/HPCC/SmartCity/DSS.2019.00317 [citation][year=2019]Henry Hui , Peter Maynard , Kieran McLaughlin, "ICS Interaction Testbed: A Platform for Cyber-Physical Security Research", in proc of 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR), September 2019. DOI: 10.14236/ewic/icscsr19.12 [citation][year=2019]A. Li et al., "BCRAM: A Social-Network-Inspired Breast Cancer Risk Assessment Model," in IEEE Transactions on Industrial Informatics, vol. 15, no. 1, pp. 366-376, Jan. 2019. doi: 10.1109/TII.2018.2825345 [citation][year=2019]L. Lu, H. J. Liu, H. Zhu and C. Chu, "Intrusion Detection in Distributed Frequency Control of Isolated Microgrids," in IEEE Transactions on Smart Grid, vol. 10, no. 6, pp. 6502-6515, Nov. 2019. doi: 10.1109/TSG.2019.2906573 [citation][year=2019]Yin, Xiaochun & Liu, Zeng & Nkenyereye, Lewis & Ndibanje, Bruce. (2019). Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach. Sensors. 19. 4952. 10.3390/s19224952. [citation][year=2019]Hongwen Hui, Xingshuo An, Haoyu Wang, Weijia Ju, Huixuan Yang, Hongjie Gao, and Fuhong Lin, “Survey on Blockchain for Internet of Things”, Journal of Internet Services and Information Security (JISIS), 9(2): 1-30, May 2019, DOI: 10.22667/JISIS.2019.05.31.001 [citation][year=2019]Yong Chen, A Survey on Industrial Information Integration 2016-2019, in Journal of Industrial Integration and Management, DOI: 10.1142/S2424862219500167 [citation][year=2018]P. M. Nasr and A. Yazdian-Varjani, "Toward Operator Access Management in SCADA System: Deontological Threat Mitigation," in IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3314-3324, Aug. 2018. doi: 10.1109/TII.2017.2781285 [citation][year=2018]X. Li, C. Zhou, Y. Tian and Y. Qin, "A Dynamic Decision-Making Approach for Intrusion Response in Industrial Control Systems," in IEEE Transactions on Industrial Informatics, August 2018. doi: 10.1109/TII.2018.2866445 [citation][year=2018]Zeng P., Zhou P. (2018) Intrusion Detection in SCADA System: A Survey. In: Li K., Fei M., Du D., Yang Z., Yang D. (eds) Intelligent Computing and Internet of Things. ICSEE 2018, IMIOT 2018. Communications in Computer and Information Science, vol 924. Springer, Singapore. DOI: 10.1007/978-981-13-2384-3_32 [citation][year=2018]Ming Wan, Yan Song, Yuan Jing, and Junlu Wang, “Function-Aware Anomaly Detection Based on Wavelet Neural Network for Industrial Control Communication,” Security and Communication Networks, vol. 2018, Article ID 5103270, 11 pages, 2018. https://doi.org/10.1155/2018/5103270. [citation][year=2018]Will Serrano."Deep Learning Cluster Structures for Management Decisions: The Digital CEO". Sensors. 18. 3327. DOI: 10.3390/s18103327. 2018. [citation][year=2018]Amin Mansouri, Babak Majidi & Abdolah Shamisa (2018) Metaheuristic neural networks for anomaly recognition in industrial sensor networks with packet latency and jitter for smart infrastructures, International Journal of Computers and Applications, DOI: 10.1080/1206212X.2018.1533613 [citation][year=2018]Serrano W. (2019) The Cognitive Packet Network with QoS and Cybersecurity Deep Learning Clusters. In: Arai K., Kapoor S., Bhatia R. (eds) Intelligent Systems and Applications. IntelliSys 2018. Advances in Intelligent Systems and Computing, vol 868. Springer, Cham. Volume 1. 62-85. DOI: 10.1007/978-3-030-01054-6_5. [citation][year=2018]Mohamed Najeh Lakhoua, "Cyber Security of SCADA Network in Thermal Power Plants", in Proc of Conference: 2018 International Conference on Smart Communications and Networking (SmartNets), November 2018. DOI: 10.1109/SMARTNETS.2018.8707398 [citation][year=2018]Weize Li, Lun Xie, and Zhiliang Wang, “A Novel Covert Agent for Stealthy Attacks on Industrial Control Systems Using Least Squares Support Vector Regression,” Journal of Electrical and Computer Engineering, vol. 2018, Article ID 7204939, 14 pages, 2018. doi:10.1155/2018/7204939 [citation][year=2018]Kim, Junsik, and Jaehyun Park. "FPGA-based network intrusion detection for IEC 61850-based industrial network." ICT Express (2018). DOI: 10.1016/j.icte.2018.01.002 [citation][year=2018]Shama N. Islam, M.A. Mahmud, A.M.T. Oo, Impact of optimal false data injection attacks on local energy trading in a residential microgrid, ICT Express, Available online 21 February 2018, ISSN 2405-9595, https://doi.org/10.1016/j.icte.2018.01.015. [citation][year=2018]Li X., Wang G., Ali S., He Q. (2018) Android Malware Detection Using Category-Based Permission Vectors. In: Vaidya J., Li J. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science, vol 11337. Springer, Cham. DOI: 10.1007/978-3-030-05063-4_31 [citation][year=2018]J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an and H. Ye, "Significant Permission Identification for Machine-Learning-Based Android Malware Detection," in IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 3216-3225, July 2018. doi: 10.1109/TII.2017.2789219 [citation][year=2018]Varun Mohta, Zhipeng Zhao, Michael Sylvester Pukish, "Real-time anomaly detection in a network using state transitions", Patent Grant US-10050987-B1. Publication date: 2018/08/14. Available at: https://patents.google.com/patent/US10050987B1/en [citation][year=2017]Yufei Liu, De-Chang Pi, and Cui Lin, Mining Community-level Influence in Microblogging Network: A Case Study on Sina Weibo, Hindawi/Wiley Complexity, Received 7 June 2017; Accepted 12 November 2017. Availablle at: https://www.hindawi.com/journals/complexity/aip/4783159/ [citation][year=2017]Q. Niyaz, W. Sun, A. Javaid, "A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)", EAI Endorsed Transactions on Security and Safety 17(12): e2, published on the 28 dez 2017. DOI: 10.4108/eai.28-12-2017.153515 [citation][year=2017]Mohamed Najeh, Lakhoua, "Review on SCADA Cybersecurity for Critical Infrastructures". Journal of Computer Science & Control Systems. May2017, Vol. 10 Issue 1, p15-18. 4p. [citation][year=2017]Lamba, Anil & Singh, Satinderjeet & Singh, Balvinder & Dutta, Natasha & Sai, Sivakumar & Muni, Rela. (2017). MITIGATING CYBER SECURITY THREATS OF INDUSTRIAL CONTROL SYSTEMS (SCADA & DCS), International Journal For Technological Research In Engineering, Proc. of 3rd International Conference on Emerging Technologies in Engineering, Biomedical, Medical and Science(ETEBMS), July 2017. Available at: https://www.ijtre.com/images/scripts/16214.pdf [citation][year=2017]Lei Yang, Fengjun Li, Securing Smart Grid In-Network Aggregation through False Data Detection, EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 17(10): e5, EAI, 2017, DOI: 10.4108/eai.1-2-2017.152156. [publication]Tiago Cruz and Simões, P. and Edmundo Monteiro , "Virtualizing Programmable Logic Controllers: towards a convergent approach", IEEE Embedded Systems Letters, ISSN (print): 1943-0663, ISSN (Electronic): 1943-0671 , 2016 [citation][year=2019]Mohammadreza Barzegaran, Anton Cervin, and Paul Pop. Towards quality-of-control-aware scheduling of industrial applications on fog computing platforms. In Proceedings of the Workshop on Fog Computing and the IoT (IoT-Fog '19). ACM, New York, NY, USA, 1-5. 2019. DOI: https://doi.org/10.1145/3313150.3313217 [citation][year=2019]Lee, Sang-Hun et al. “Virtualization of Industrial Real-Time Networks for Containerized Controllers.” Sensors (Basel, Switzerland) vol. 19,20 4405. 11 Oct. 2019, doi:10.3390/s19204405 [citation][year=2019]T. Taleb, I. Afolabi and M. Bagaa, "Orchestrating 5G Network Slices to Support Industrial Internet and to Shape Next-Generation Smart Factories," in IEEE Network. DOI: 10.1109/MNET.2018.1800129 [citation][year=2017]Wafaa Ait-Cheik-Bihi, Denis Chalon, "Digital Twin based virtualization of Programmable Logic Controllers", November. 2017. available at: https://www.researchgate.net/publication/321134316_Digital_Twin_based_virtualization_of_Programmable_Logic_Controllers [publication]Tiago Cruz and Queiroz, R. and J. Proenca and Simões, P. and Edmundo Monteiro , "Leveraging Virtualization Technologies to Improve SCADA ICS Security", Journal of Information Warfare. Vol. 15, No. 3 (2016), pp. 81-100 - ISSN 1445-3312 (print)/ISSN 1445-334, vol. 15, 2016 [citation][year=2017]Hallman, R., Bryan, J., Palavicini, G., Divita, J. and Romero-Mariona, J., "IoDDoS — The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets.", In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017), pages 47-58, ISBN: 978-989-758-245-5 2015(2 publications) [publication]Tiago Cruz and J. Proenca and Simões, P. and Aubigny, M. and Ouedrago, M. and Graziano, A. and Yasakhetu, L. , " Improving Cyber-Security Awareness on Industrial Control Systems: The CockpitCI Approach", Journal of Information Warfare, Vol. 13, No. 4 (2014), pp. 27-41 - ISSN 1445 3347 (online) / ISSN 445-3312 (printed), vol. 13, 2015 [citation][year=2020]Sufang, W. An adaptive ensemble classification framework for real-time data streams by distributed control systems. Neural Comput & Applic (2020). https://doi.org/10.1007/s00521-020-04759-0 [citation][year=2019]F. Januário, A. Cardoso and P. Gil, "A Distributed Multi-Agent Framework for Resilience Enhancement in Cyber-Physical Systems," in IEEE Access. March 2019. doi: 10.1109/ACCESS.2019.2903629 [citation][year=2019]Konstantinos Demertzis, Lazaros Iliadis, Panayiotis Kikiras, Nikos Tziritas (2019). Cyber-Typhon: An Online Multi-task Anomaly Detection Framework. in book: Artificial Intelligence Applications and Innovations, 15th IFIP WG 12.5 International Conference, AIAI 2019, Hersonissos, Crete, Greece, May 24–26, 2019, Proceedings. DOI: 10.1007/978-3-030-19823-7_2 [citation][year=2019]F. Januário, A. Cardoso and P. Gil, "A Multi-Agent Middleware for Resilience Enhancement in Heterogeneous Control Systems," 2019 IEEE International Conference on Industrial Technology (ICIT), Melbourne, Australia, 2019, pp. 988-993. DOI: 10.1109/ICIT.2019.8755011 [citation][year=2018]Uchenna D. Ani, Nneka Daniel, Francisca Oladipo & Sunday E. Adewumi (2018) Securing industrial control system environments: the missing piece, Journal of Cyber Security Technology, 2:3-4, 131-163, DOI: 10.1080/23742917.2018.1554985 [citation][year=2018]Uchenna D. Ani, Nneka Daniel, Francisca Oladipo & Sunday E. Adewumi (2018) Securing industrial control system environments: the missing piece, Journal of Cyber Security Technology, 2:3-4, 131-163, DOI: 10.1080/23742917.2018.1554985 [citation][year=2017]Jacek Jarmakiewicz, Krzysztof Parobczak, Krzysztof Ma?lanka, Cybersecurity protection for power grid control infrastructures, International Journal of Critical Infrastructure Protection, Available online 20 July 2017, ISSN 1874-5482, https://doi.org/10.1016/j.ijcip.2017.07.002. (http://www.sciencedirect.com/science/article/pii/S1874548216300324) [citation][year=2016]F. Januário, C. Carvalho, A. Cardoso and P. Gil, "Security challenges in SCADA systems over Wireless Sensor and Actuator Networks," 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Lisbon, Portugal, 2016, pp. 363-368. doi: 10.1109/ICUMT.2016.7765386 [publication]Tiago Cruz and Simões, P. and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "Cooperative security management for broadband network environments", Wiley Security and Communication Networks (ISSN 1939-0122), 2015 [citation][year=2018]Di Mauro, Mario, and Cesario Di Sarno. "Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection." Journal of Information Security and Applications 38 (2018): 85-95. [citation][year=2018]Pecorella, T.; Pierucci, L.; Nizzi, F. “Network Sentiment” Framework to Improve Security and Privacy for Smart Home, Future Internet, Vol 10, Issue 12, pp125, December 2018. DOI: 10.3390/fi10120125 [citation][year=2018]Norbert Nthala, Ivan Flechais, "Rethinking Home Network Security", in Proc. of Conference: European Workshop on Usable Security (EuroUSEC), London, England, April 2018. DOI: 10.14722/eurousec.2018.23011 [citation][year=2016]K. M. Lee, W. G. Teng and T. W. Hou, "DRASE: A Dynamic Rescheduling and Self-Adaptive Estimation Technique to Enhance ACS Throughputs in CWMP," in IEEE Communications Letters, vol. 20, no. 11, pp. 2161-2164, Nov. 2016. doi: 10.1109/LCOMM.2016.2602198 [citation][year=2016]Li Kunmin, Toward Optimizing System Capabilities in a CWMP Network, PhD. Thesis, Cheng Kung University Engineering Science degree thesis, 2016 (http://www.airitilibrary.com/Publication/alDetailedMesh?docid=U0026-2706201617101000) 2014(2 publications) [publication]Jiang, J. and Maglaras, L. and Tiago Cruz , "Integrated OCSVM mechanism for intrusion detection in SCADA systems", IET Electronics Letters, vol. 50, pp. 1935-1936, 2014 [citation][year=2020]Shamshe Alam, Sanjay Kumar Sonbhadra, Sonali Agarwal, P. Nagabhushan, One-class support vector classifiers: A survey, Knowledge-Based Systems, Volume 196, 2020, ISSN 0950-7051, DOI: 10.1016/j.knosys.2020.105754. [citation][year=2019]Yuan, Y.; Ma, S.; Wu, J.; Jia, B.; Li, W.; Luo, X. Frequency Feature Learning from Vibration Information of GIS for Mechanical Fault Detection. Sensors 2019, 19, 1949. DOI: 10.3390/s19081949 [citation][year=2019]Gao, Jun. et al. (2019). Omni SCADA Intrusion Detection Using Deep Learning Algorithms. Preprint. DOI: 10.13140/RG.2.2.33417.80488. arXiv:1908.01974 [citation][year=2019]Tusheng Chen, Peng Lin and Jie Ling (2019). An Intrusion Detection Method for Industrial Control System Based on Gate Recurrent Unit. Journal of Physics: Conference Series. 1302. 022016. DOI: 10.1088/1742-6596/1302/2/022016. August 2019 [citation][year=2019]Benisha, R. & Ratna, S.. (2019). Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks. Security and Communication Networks. 2019. 1-12. 10.1155/2019/1082485. [citation][year=2019]Yu, W.; Wang, Y.; Song, L. A Two Stage Intrusion Detection System for Industrial Control Networks Based on Ethernet/IP. Electronics 2019, 8, 1545. DOI: 10.3390/electronics8121545 [citation][year=2018]Yan Tengfei, Shang Wenli, Zhao Jianming, Qiao Feng, Zeng Peng, "Anomaly detection algorithm based on OCSVM double contour model of genetic algorithm optimization for industrial control system", Application Research of Computers Journal, Volume 36, 2019, Issue 11. DOI: 10.3969/j.issn.1001-3695.2018.04.0313. Available at: http://www.arocmag.com/article/02-2019-11-038.html (published online: August 2018) [citation][year=2018]Hong KS., Kim HB., Kim DH., Seo JT. (2019), Detection of Replay Attack Traffic in ICS Network. In: Lee R. (eds) Applied Computing and Information Technology. ACIT 2018. Studies in Computational Intelligence, vol 788. Springer, Cham. DOI: 10.1007/978-3-319-98370-7_10 [citation][year=2018]H. Yang and Z. Zhou, "A Novel Intrusion Detection Scheme Using Cloud Grey Wolf Optimizer," 2018 37th Chinese Control Conference (CCC), Wuhan, China, 2018, pp. 8297-8302. doi: 10.23919/ChiCC.2018.8483324 [citation][year=2018]Gökhan TI?ILSEL Güleser Kalayc? DEMiR, "Texture Recognition Using Importance Based One-Class Classifier", (orig) "Önem Tahminleme Tabanl? Tek S?n?f S?n?flay?c? ile Doku Tan?ma", Dokuz Eylul University-Faculty of Engineering Journal of Science and Engineering, January 2018. doi: 10.21205/deufmd.2018205807 [citation][year=2018]R. Liu, W. Li, X. Liu, X. Lu, T. Li and Q. Guo, "An Ensemble of Classifiers Based on Positive and Unlabeled Data in One-Class Remote Sensing Classification," in IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. PP, no. 99, pp. 1-13. doi: 10.1109/JSTARS.2017.2789213 [citation][year=2018]Cyntia Vargas Martínez, Birgit Vogel-Heuser (2018). Towards Industrial Intrusion Prevention Systems: A Concept and Implementation for Reactive Protection. Applied Sciences. 8. 2460. DOI: 10.3390/app8122460. [citation][year=2018]Li Ting ; Hong Zhennan ; Liu Zhiyong ; Xiao Tizheng, Intrusion Detection of Industrial Control System Based on Incremental Single Class Support Vector Machine, Information and Control, China Automation Society, issue 6, December 2018. DOI:10.13976/j.cnki.xk.2018.7431 [citation][year=2018]Nithya, K. and M. LakshmiPriya. “Pattern Matching Algorithm for Network Intrusion Detection Systems.” (2018) in IJSRD - International Journal for Scientific Research & Development| Vol. 6, Issue 07, 2018 | ISSN (online): 2321-0613 [citation][year=2017]M. Keshk, N. Moustafa, E. Sitnikova and G. Creech, "Privacy preservation intrusion detection technique for SCADA systems," 2017 Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, 2017, pp. 1-6. doi: 10.1109/MilCIS.2017.8190422 [citation][year=2017]S. Shitharth, D. Prince Winston, An enhanced optimization based algorithm for intrusion detection in SCADA network, Computers & Security, Available online 2 May 2017, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2017.04.012. (http://www.sciencedirect.com/science/article/pii/S0167404817300901) [citation][year=2017]M. Wan, W. Shang and P. Zeng, "Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems," in IEEE Transactions on Information Forensics and Security, vol. 12, no. 12, pp. 3011-3023, Dec. 2017. doi: 10.1109/TIFS.2017.2730581 [citation][year=2017]CTJ Dodson (2017) On some information geometric approaches to cyber security. In: Nicholas J Daras and Thermistocles M Rassias, (eds). Operations Research, Engineering, and Cyber Security. Springer Optimization and Its Applications (113). Springer, Germany. DOI: 10.1007/978-3-319-51500-7_9 [citation][year=2017]Koch, Robert & Kühn, Teo, "Defending the grid: Backfitting non-expandable control systems", in Proc. of Conference: 2017 9th International Conference on Cyber Conflict (CyCon), May 2017. DOI: 10.23919/CYCON.2017.8240335. [citation][year=2016]A. Almalawi, A. Fahad, Z. Tari, A. Alamri, R. AlGhamdi and A. Y. Zomaya, "An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems," in IEEE Transactions on Information Forensics and Security, vol. 11, no. 5, pp. 893-906, May 2016. doi: 10.1109/TIFS.2015.2512522 [citation][year=2016]Ming Zeng, Yu Yang, Junsheng Cheng, "A generalized Mitchell-Dem'yanov-Malozemov algorithm for one-class support vector machine", Knowledge-Based Systems, Available online 15 June 2016, ISSN 0950-7051, http://dx.doi.org/10.1016/j.knosys.2016.06.015. [citation][year=2016]A. Ghaleb, S. Zhioua, A. Almulhem. SCADA-SST: A SCADA Security Testbed. World Congress on Industrial Control Systems Security (WCICSS-2016). December 12-14, 2016, London, UK. [citation][year=2015]AlMajed, N et al, "Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Activities", EAI Transactions on Secutiry and Safety, 2015 [citation][year=2015]A. Al-Mahrouqi, S. Abdalla and T. Kechadi, "Efficiency of network event logs as admissible digital evidence," Science and Information Conference (SAI), 2015, London, 2015, pp. 1257-1265. doi: 10.1109/SAI.2015.7237305 [citation][year=2015]Janicke, Helge, et al. "Runtime-Monitoring for Industrial Control Systems." Electronics 4.4 (2015): 995-1017. [citation][year=2015]Shang, Wenli, et al. "Intrusion detection algorithm based on OCSVM in industrial control system." Security and Communication Networks (2015). [citation][year=2015]Zeng, Ming, Yu Yang, and Junsheng Cheng. "A generalized Gilbert algorithm and an improved MIES for one-class support vector machine." Knowledge-Based Systems 90 (2015): 211-223. [publication]Tiago Cruz and J. Proenca and Simões, P. and Aubigny, M. and Ouedrago, M. and Graziano, A. and Maglaras, L. , "A Distributed IDS for Industrial Control Systems", International Journal of Cyber Warfare and Terrorism, vol. 4, pp. 1-22, 2014 [citation][year=2017]Jacek Jarmakiewicz, Krzysztof Parobczak, Krzysztof Maslanka, Cyberse- ´ curity protection for power grid control infrastructures, International Journal of Critical Infrastructure Protection (2017), doi: 10.1016/j.ijcip.2017.07.002 [citation][year=2017]Lamba, Anil & Singh, Satinderjeet & Singh, Balvinder & Dutta, Natasha & Sai, Sivakumar & Muni, Rela. (2017). MITIGATING CYBER SECURITY THREATS OF INDUSTRIAL CONTROL SYSTEMS (SCADA & DCS), International Journal For Technological Research In Engineering, Proc. of 3rd International Conference on Emerging Technologies in Engineering, Biomedical, Medical and Science(ETEBMS), July 2017. Available at: https://www.ijtre.com/images/scripts/16214.pdf 2013(1 publication) [publication]Tiago Cruz and Simões, P. and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "A Framework for Internet Media Services Delivery to the Home Environment", Journal of Network and Systems Management, vol. 21, pp. 99-127, 2013 [citation][year=2019]Maxweel Carmo, Felipe S. Dantas Silva, Augusto Venâncio Neto, Daniel Corujo, and Rui Aguiar, “Network-Cloud Slicing Definitions for Wi-Fi Sharing Systems to Enhance 5G Ultra Dense Network Capabilities,” Wireless Communications and Mobile Computing, vol. 2019, Article ID 8015274, 17 pages, 2019. https://doi.org/10.1155/2019/8015274. [citation][year=2015]Chien-Cheng Lai - ID 665452, "IP multimedia in home networks – DLNA and UPnP", Melbourne School of Engineering The University of Melbourne - Multimedia Content Delivery (ELEN90014) Project. Available at: https://www.slideshare.net/JamesLai10/upnp-and-dlna-in-the-home-network-v2 [citation][year=2014]Abhishek Kasana, Niharika Mittal, Ratika Sharma, Vartika Aggarwal, Analyzing the Best Communication Media for Physical Layer: A Critical Study, International Journal of Scientific Research Engineering & Technology (IJSRET), Vol. 2 Issue 11 pp 798-801 February 2014 www.ijsret.org ISSN 2278 – 0882 [citation][year=2013]Yun Cui, Myoungjin Kim, and Hanku Lee, “Cloud-based Home Media System Model: Providing a Novel Media Streaming Service using UPnP Technology in a Home Environment”, Int. Journal of Software Engineering and Its Applications, Vol. 7, No. 4, pp. 127-136, July, 2013. [citation][year=2012]S Pablo Garcáa Sánchez, Juan Julián Merelo, Pedro Castillo, A. M. Mora, Rubén H. García, Miguel Angel López, María Isabel López, “Servidor de Aplicaciones MHP para TDT”, in Proc. of Jornadas Sarteco, 19-21 Setembro 2012, Elx (http:// http://www.jornadassarteco.org/) Conference Articles 2020(2 publications) [publication]Freitas, M.B.d. and Quitério, P. and Rosa, L. and Tiago Cruz and Simões, P. , "SDN-assisted containerized security and monitoring components", in IEEE/IFIP Network Operations and Management Symposium (NOMS) 2020, 2020 [publication]Tiago Cruz and Simões, P. , "Fostering cybersecurity awareness among computing science undergraduate students: motivating by example", in 19th European Conference on Cyber Warfare and Security (ECCWS 2020), Chester, UK, 2020 2019(2 publications) [publication]Craveiro, A. and Oliveira, A. and Proença, J. and Tiago Cruz and Simões, P. , "A Framework for Improved Home Network Security", in 18th European Conference on Cyber Warfare and Security (ECCWS 2019), Coimbra, Portugal, 4-5 July 2019, 2019 [publication]Martins, N. and Cruz, J.M. and Tiago Cruz and Pedro Henriques Abreu , "Analysing the Footprint of Classifiers in Adversarial Denial of Service Contexts", in in Proc of 19th EPIA Conference on Artificial Intelligence, Vila Real, Portugal, September 3rd-6th, 2019, 2019 2018(4 publications) [publication]João Henriques and Caldeira, F. and Tiago Cruz and Simões, P. , "On the Use of Ontology Data for Protecting Critical Infrastructures", in in Proc. of ECCWS 2018 - 17th European Conference on Cyber Warfare and Security (Publishers: ACPI, UK). ISBN: 978-1-911218-85-2, 2018 [publication]João T. Fernandes and Rocha, B.M.M. and Paiva, R.P. and Tiago Cruz , "Using Low Cost Embedded Systems for Respiratory Sounds Auscultation", in 15th International Symposium on Wireless Communication Systems (ISWCS 2018), 2018 [publication]Frazão, I. and Pedro Henriques Abreu and Tiago Cruz and Araújo, H. and Simões, P. , "Denial of Service Attacks: Detecting the frailties of machine learning algorithms in the Classication Process", in 13th International Conference on Critical Information Infrastructures Security (CRITIS 2018), ed. Springer, Kaunas, Lithuania, September 24-26, 2018, Springer series on Security and Cryptology , 2018 [citation][year=2020]Abiodun Ayodeji, Yong-kuo Liu , "Machine Learning -based process control monitoring and cyber security: Similarities, conflicts and limitations", in Proc. of International Conference on Nuclear Security 2020, Vienna, Austria, February 2020. [citation][year=2020]Anthi, E., Williams, L., Rhode, M., Burnap, P., & Wedgbury, A. (2020). Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems. arXiv preprint arXiv:2004.05005. [citation][year=2019]A. Giuseppi, A. Tortorelli, R. Germanà, F. Liberati and A. Fiaschetti, "Securing Cyber-Physical Systems: An Optimization Framework based on OSSTMM and Genetic Algorithms," 2019 27th Mediterranean Conference on Control and Automation (MED), Akko, Israel, 2019, pp. 50-56. DOI: 10.1109/MED.2019.8798506 [publication]Freitas, M. and Rosa, L. and Tiago Cruz and Simões, P. , "SDN-enabled virtual data diode", in 4th ESORICS Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2018) , 2018 [citation][year=2020]D. Pliatsios, P. Sarigiannidis, T. Lagkas and A. G. Sarigiannidis, "A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics," in IEEE Communications Surveys & Tutorials. April 2020. DOI: 10.1109/COMST.2020.2987688 [citation][year=2019]Aasen, Øyvind, "Using Bi-directional Data Diodes to Limit Propagation of Network Attacks", MSc Thesis, Norwegian University of Science and Technology, Faculty of Information Technology and Electrical Engineering - Department of Information Security and Communication Technology. July 2019. Available at: http://hdl.handle.net/11250/2617747 2017(5 publications) [publication]J. Proenca and Tiago Cruz and Simões, P. and Gaspar, G. and Parreira, B. and Laranjeira, A. and Bastos, F. , "Building an NFV-Based vRGW: lessons learned", in 14th IEEE Consumer Communications and Networking Conference (CCNC 2017), 2017 [citation][year=2019]Ben Azzouz, Lamia, and Intissar Jamai. "SDN, slicing, and NFV paradigms for a smart home: A comprehensive survey." Transactions on Emerging Telecommunications Technologies, 2019. DOI: 10.1002/ett.3744 [citation][year=2018]P. Wang, F. Ye, X. Chen and Y. Qian, "DataNet: Deep Learning based Encrypted Network Traffic Classification in SDN Home Gateway," in IEEE Access, October 2018. doi: 10.1109/ACCESS.2018.2872430 [publication]Rosa, L. and Tiago Cruz and Simões, P. and Edmundo Monteiro and Lev, L. , "Attacking SCADA systems: a practical perspective", in IFIP/IEEE International Symposium on Integrated Network Management 2017, 2017 [citation][year=2019]Tidrea, A.; Korodi, A.; Silea, I. Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules. MDPI Sensors 2019, 19, 4191. DOI: 10.3390/s19194191 [citation][year=2019]Dutta N., Jadav N., Dutiya N., Joshi D. (2020) Using Honeypots for ICS Threats Evaluation. In: Pricop E., Fattahi J., Dutta N., Ibrahim M. (eds) Recent Developments on Industrial Control Systems Resilience. Studies in Systems, Decision and Control, vol 255. Springer, Cham. DOI: 10.1007/978-3-030-31328-9_9 [citation][year=2018]Teixeira, Marcio & Salman, Tara & Zolanvari, Maede & Jain, Raj. (2018). SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach. Future Internet. 10. DOI: 10.3390/fi10080076 [citation][year=2018]Syed Hazrat, Pooja Khatri, Muheet Butt, Majid Zaman, "Review of SCADA systems for Photovoltaic Power Plants", International Journal of Creative Research Thoughts, Volume 6, Issue 2 April 2018. ISSN: 2320-2882. Available at: http://www.ijcrt.org/viewfull.php?&p_id=IJCRT1892239 [publication]Lima, A. and Tiago Cruz and Sousa, B. and Simões, P. , "Security monitoring for mobile device assets: a survey", in In Proc. of 12th International Conference on Cyber Warfare and Security - ICCWS 2017. ISBN: 978-1-911218-26-5, 2017 [citation][year=2020]Thomas N Cooke, Metadata, Jailbreaking, and the Cybernetic Governmentality of iOS: Or, the Need to Distinguish Digital Privacy from digital privacy, Surveillance & Society, Vol 18 No 1 (2020): Open Issue. DOI: 10.24908/ss.v18i1.13118 [citation][year=2017]Yang Hu, John C.S. Lui, Wenjun Hu, Xiaobo Ma, Jianfeng Li, Xiao Liang, Taming energy cost of disk encryption software on data-intensive mobile devices, In Future Generation Computer Systems, 2017, , ISSN 0167-739X, https://doi.org/10.1016/j.future.2017.09.025. [publication]Rosa, L. and J. Proenca and João Henriques and Graveto, V. and Tiago Cruz and Simões, P. and Caldeira, F. and Edmundo Monteiro , "An evolved security architecture for distributed Industrial Automation and Control Systems", in In Proc. of 16th European Conference on Cyber Warfare and Security (ECCWS 2017). ISBN: 978-1-911218-43-2, 2017 [citation][year=2018]Raposo, Duarte & Rodrigues, André & Sinche, Soraya & Sá Silva, Jorge & Boavida, Fernando. (2018). Securing WirelessHART: Monitoring, Exploring and Detecting New Vulnerabilities. 1-9. 10.1109/NCA.2018.8548060. [publication]Konstantia Barbatsalou, Konstantia Barmpatsalou and Tiago Cruz and Edmundo Monteiro and Simões, P. , "Fuzzy System-based Suspicious Pattern Detection in Mobile Forensic Evidence ", in Digital Forensics and Cyber Crime. 9th EAI International Conference on Digital Forensics & Cyber Crime, ICDF2C 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, , 2017 [citation][year=2020]Faruk Süleyman BERBER, Ecir Ugur Kucuksille. Rating Of The Relationship Between Users Using The Data From The Implemented Mobile Forensic Software. Pamukkale Univ Muh Bilim Derg. 2020; 26(2): 359-370. DOI: 10.5505/pajes.2019.29599 : [citation][year=2019]Faruk Süleyman Berber, Ecir Ugur Kucuksille, Rating Of The Relationship Between Users Using The Data From The Implemented Mobile Forensic Software, in Pamukkale University Journal of Engineering Sciences, DOI: 10.5505/pajes.2019.29599 [citation][year=2018]Y. Hu, H. Lu, C. Guo, X. Liu, R. Wang and H. Chen, "Robust Stability for Nonlinear Fuzzy Network Control Systems with Time Varying Delay," 2018 IEEE 7th Data Driven Control and Learning Systems Conference (DDCLS), Enshi, 2018, pp. 1095-1100. DOI: 10.1109/DDCLS.2018.8516077 2016(4 publications) [publication]Tiago Cruz and Simões, P. and Edmundo Monteiro , "Security implications of SCADA ICS virtualization: survey and future trends", in In Proc. of ECCWS 2016 - 15th European Conference on Cyber Warfare and Security. ISBN: 978-1-5108-2544-4 , 2016 [citation][year=2020]F. Wang, W. Qi and T. Qian, "A Dynamic Cybersecurity Protection Method based on Software-defined Networking for Industrial Control Systems," 2019 Chinese Automation Congress (CAC), Hangzhou, China, 2019, pp. 1831-1834. doi: 10.1109/CAC48633.2019.8996244 [citation][year=2020]D. Pliatsios, P. Sarigiannidis, T. Lagkas and A. G. Sarigiannidis, "A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics," in IEEE Communications Surveys & Tutorials. April 2020. DOI: 10.1109/COMST.2020.2987688 [citation][year=2019]F. Wang, W. Qi and T. Qian, "A Dynamic Cybersecurity Protection Method based on Software-defined Networking for Industrial Control Systems," 2019 Chinese Automation Congress (CAC), Hangzhou, China, 2019, pp. 1831-1834. [citation][year=2018]Ferruzola-Gómez E., Duchimaza-Supliguicha J., Bermeo-Almeida O., Pérez-Espinoza C., Samaniego-Cobo T., Bazán-Vera W. (2018), "Risk Analysis of Implanted Electronic Devices in Human Beings", In: Botto-Tobar M., Esparza-Cruz N., León-Acurio J., Crespo-Torres N., Beltrán-Mora M. (eds) Technology Trends. CITT 2017. Communications in Computer and Information Science, vol 798. Springer, Cham. DOI: 10.1007/978-3-319-72727-1_7 [citation][year=2017]Hallman, R., Bryan, J., Palavicini, G., Divita, J. and Romero-Mariona, J., “IoDDoS — The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets“, Proc. of the 2nd Int. Conf. on Internet of Things, Big Data and Security (IoTBDS 2017), pp. 47-58. ISBN: 978-989-758-245-5 [publication]Lopes, F. and Tiago Cruz and Amilcar Cardoso , "Musical Object", in In Proc. of the International Conference on Interfaces and Human Computer Interaction (IHCI) 2016 - Part of the Multi Conference on Computer Science and Information Systems 2016. ISBN: 978-989853352-4, 2016 [publication]Stewart, B. and Rosa, L. and Maglaras, L. and Tiago Cruz and Simões, P. and Janicke, H. , "Effect of Network Architecture Changes on OCSVM based Intrusion Detection System", in 2nd International Conference on Industrial Networks and Intelligent Systems (INISCOM 2016), Leicester, United Kingdom - Springer International Publishing, Lecture Notes of the Institute for Computer Sciences, 2016 [citation][year=2019]L. N. Tidjon, M. Frappier and A. Mammar, "Intrusion Detection Systems: A Cross-Domain Overview," in IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3639-3681, Fourthquarter 2019. doi: 10.1109/COMST.2019.2922584 [citation][year=2018]H. Jiao, J. Li and T. Jiang, "The Cloud Resource Load Security Detection Based on Wavelet Packet Transform and Grey Wolf Algorithm," 2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China, 2018, pp. 1-5. doi: 10.1109/ICCWAMTIP.2018.8632600 [publication]Ana Rodrigues and Costa, E. and Amilcar Cardoso and Penousal Machado and Tiago Cruz , "Evolving L-Systems with Musical Notes", in Evolutionary and Biologically Inspired Music, Sound, Art and Design: 5th International Conference, EvoMUSART 2016, Proceedings, 2016 [citation][year=2018]Cao, Xizheng & Zhan, Wen. (2018). Intelligent composition method for the prairie-song melodies of northern China. Journal of Intelligent & Fuzzy Systems. 1-15. DOI: 10.3233/JIFS-18920. [citation][year=2017]ALVES DA VEIGA, Pedro. Generative Theatre of Totality. Journal of Science and Technology of the Arts, [S.l.], v. 9, n. 3, p. 33-43, dec. 2017. ISSN 2183-0088. Available at: . Date accessed: 26 Dec. 2017. doi:http://dx.doi.org/10.7559/citarj.v9i3.422. 2015(3 publications) [publication]Rosa, L. and Alves, P. and Tiago Cruz and Simões, P. and Edmundo Monteiro , "A Comparative Study of Correlation Engines for Security Event Management", in In Proc. of 10th Int. Conf. on Cyber Warfare and Security (ICCWS-2015). ISBN: 978-1-910309-98-8 ISSN: 2048-9897, 2015 [citation][year=2020]M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks Against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1035-1044, Feb. 2020. doi: 10.1109/TII.2019.2926557 [citation][year=2020]Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1024-1034, Feb. 2020. doi: 10.1109/TII.2019.2925422 [citation][year=2019]Veeramany A, Hutton WJ, III, Sridhar S, Gourisetti S, Coles G, Skare P. A Framework for Development of Risk-Informed Autonomous Adaptive Cyber Controller. ASME. J. Comput. Inf. Sci. Eng. 2019;():1-31. DOI:10.1115/1.4043040 [citation][year=2017]Sandeep Sekharan, S & Kandasamy, Kamalanathan. (2017). Profiling SIEM tools and correlation engines for security analytics. in Proc of Conference: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 717-721. DOI: 10.1109/WiSPNET.2017.8299855. [citation][year=2017]VICTOR W. GITUKU, "A LOW COST SYSTEM FOR LOGON ANOMALY DETECTION BASED ON TIME AND LOCATION OF USERS ", MSc Thesis, UNITED STATES INTERNATIONAL UNIVERSITY - AFRICA, summer 2017. Available at: http://usiuservicedesk.usiu.ac.ke/bitstream/handle/11732/3533/VICTOR W GITUKU MSC 2017.pdf?sequence=1&isAllowed=y [citation][year=2017]Olivier Wang. Adaptive Rules Model : Statistical Learning for Rule-Based Systems. Machine Learning [cs.LG]. Université Paris-Saclay, 2017. English. . , PhD Thesis [citation][year=2016]Steinegger, RH, Hintz, N., Hippchen, B., Binder, G., Roeser, F., & Abeck, S. (2016, April). Log analysis with open source tools. In software technologies and processes: open source software in the industry, SMEs and the university environment 5. Conference STEP, 3.5. 2016 Furtwangen (p. 7). Walter de Gruyter GmbH & Co KG. [citation][year=2016]C. Suh-Lee, Ju-Yeon Jo and Yoohwan Kim, "Text mining for security threat detection discovering hidden information in unstructured log messages," 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, 2016, pp. 252-260. doi: 10.1109/CNS.2016.7860492 [citation][year=2016]Underwood, M. (2016) Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety, in Cyber-Assurance for the Internet of Things (ed T. T. Brooks), John Wiley & Sons, Inc., Hoboken, NJ, USA. doi: 10.1002/9781119193784.ch8 [citation][year=2016]A. Awad, S. Kadry, B. Lee, G. Maddodi and E. O'Meara, "Integrity Assurance in the Cloud by Combined PBA and Provenance," 2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST), Cardiff, UK, 2016, pp. 127-132.doi: 10.1109/NGMAST.2016.15 [citation][year=2015]Gianfranco Cerullo, Luigi Coppolino, Salvatore D’Antonio, Valerio Formicola, Gaetano Papale, Bruno Ragucci, “Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation“, in Proc. of the 9th Int. Symposium on Intelligent Distributed Computing – IDC'2015, Guimarães, Portugal, October 2015, Springer Studies in Computational Intelligence V. 616, pp 427-437, October 2015. DOI: 10.1007/978-3-319-25017-5_40. [publication]Tiago Cruz and Barrigas, J. and J. Proenca and Graziano, A. and Panzieri, S. and Lev, L. and Simões, P. , "Improving Network Security Monitoring for Industrial Control Systems", in 14th IFIP/IEEE Int. Symposium on Integrated Management (IM 2015), 2015 [citation][year=2020]Lijuan Xu, Bailing Wang, Lianhai Wang, Dawei Zhao, Xiaohui Han, Shumian Yang, PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints, Computers & Security, Volume 92, 2020, 101749, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.101749. [citation][year=2020]Pranshu Bajpai, Richard Enbody, and Betty H.C. Cheng. 2020. Ransomware Targeting Automobiles. In Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security (AutoSec ’20). Association for Computing Machinery, New York, NY, USA, 23–29. DOI:https://doi.org/10.1145/3375706.3380558 [citation][year=2019]Handa A, Sharma A, Shukla SK. Machine learning in cybersecurity: A review. Wiley WIREs - Data Mining and Knowledge Discovery. 2019; DOI:10.1002/widm.1306 [citation][year=2019]T. Abdelghani, "Industrial control systems (ics) security in power transmission network," 2019 Algerian Large Electrical Network Conference (CAGRE), Algiers, Algeria, 2019, pp. 1-4. DOI: 10.1109/CAGRE.2019.8713289 [citation][year=2019]D. Zegzhda, D. Lavrova, and M. Poltavtseva, "Multifractal Security Analysis of Cyberphysical Systems", in NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, Vol.22, No.2, pp.196 - 204, 2019. [citation][year=2019]Khaoula Es-Salhi. Segmentation and segregation mechanisms and models to secure the integration of Industrial control Systems (ICS) with corporate system. Systems and Control [cs.SY]. Ecole nationale supérieure Mines-Télécom Atlantique, 2019. English. ffNNT : 2019IMTA0143ff. fftel-02298847f. URL: https://tel.archives-ouvertes.fr/tel-02298847/document [citation][year=2019]Muhammad Rizwan Asghar, Qinwen Hu, Sherali Zeadally, Cybersecurity in industrial control systems: Issues, technologies, and challenges, Computer Networks, Volume 165, 2019, ISSN 1389-1286. DOI: 10.1016/j.comnet.2019.106946. [citation][year=2019]H. Gao, J. Li and J. Cheng, "Industrial Control Network Security Analysis and Decision-Making by Reasoning Method Based on Strong Relevant Logic," 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Fukuoka, Japan, 2019, pp. 289-294. doi: 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00060 [citation][year=2018]Yau K., Chow KP., Yiu SM. (2018) A Forensic Logging System for Siemens Programmable Logic Controllers. In: Peterson G., Shenoi S. (eds) Advances in Digital Forensics XIV. DigitalForensics 2018. IFIP Advances in Information and Communication Technology, vol 532. Springer, Cham. DOI: 10.1007/978-3-319-99277-8_18 [citation][year=2018]P. Palaniswamy and B. McMillin, "Cyber-Physical Security of an Electric Microgrid," 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan, 2018, pp. 74-83. doi: 10.1109/PRDC.2018.00018 [citation][year=2018]S. S. Patlolla, B. McMillin, S. Adepu and A. Mathur, "An Approach for Formal Analysis of the Security of a Water Treatment Testbed," 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan, 2018, pp. 115-124. doi: 10.1109/PRDC.2018.00022 [citation][year=2018]Julius C AgumaBruce McMillin, "Introduction of a Hybrid Monitor to Cyber-Physical Systems", May 2018. arXiv:1805.01975 [citation][year=2018]T. Terzimehic, S. Voss and M. Wenger, "Using Design Space Exploration to Calculate Deployment Configurations of IEC 61499-based Systems," 2018 IEEE 14th International Conference on Automation Science and Engineering (CASE), Munich, Germany, 2018, pp. 881-886. DOI: 10.1109/COASE.2018.8560591. [citation][year=2018]Patlolla, Sai Sidharth, "An approach for formal analysis of the security of a water treatment testbed" (2018). Master's Thesis, Missouri University of Science and Technology. http://scholarsmine.mst.edu/masters_theses/7778 [citation][year=2017]Palavicini Jr G., Bryan J., Sheets E., Kline M. and San Miguel J. (2017). Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting.In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, ISBN 978-989-758-245-5, pages 470-477. Jan 2017, Porto, Portugal. DOI: 10.5220/0006393704700477 [citation][year=2017]Stergiou, C., Psannis, K., Plageras, A., Kokkonis, G., Ishibashi, Y, "Architecture for security monitoring in IoT environments", in Proc. of 26th IEEE International Symposium on Industrial Electronics, 19-21 June 2017 Edinburgh, Scotland, UK, At Edinburgh, Scotland, UK. [citation][year=2017]P. R. Dunaka and B. McMillin, "Cyber-Physical Security of a Chemical Plant," 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, 2017, pp. 33-40. doi: 10.1109/HASE.2017.23 [citation][year=2017]Eden, Peter and Blyth, Andrew and Jones, Kevin and Soulsby, Hugh and Burnap, Pete and Cherdantseva, Yulia and Stoddart, Kristan, "SCADA System Forensic Analysis Within IIoT", in Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, pp73-101, ed. Thames, Lane and Schaefer, Dirk, Springer International Publishing, April 2017.. doi:10.1007/978-3-319-50660-9_4. [citation][year=2017]A. Gharaibeh et al., "Smart Cities: A Survey on Data Management, Security, and Enabling Technologies," in IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2456-2501, Fourthquarter 2017. doi: 10.1109/COMST.2017.2736886 [citation][year=2017]Dunaka, Prakash Rao, "Cyber-physical security of a chemical plant" (2017). M.Sc. Thesis in Computer Science, Missouri University of Science an Technology. Available at: http://scholarsmine.mst.edu/masters_theses/7638 [citation][year=2017]Korkmaz E., Davis M., Dolgikh A., Skormin V. (2017) Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. In: Rak J., Bay J., Kotenko I., Popyack L., Skormin V., Szczypiorski K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science, vol 10446. Springer, DOI: 10.1007/978-3-319-65127-9_6 [citation][year=2017]Romero-Mariona J. et al. (2017) An Approach to Organizational Cybersecurity. In: Chang V., Ramachandran M., Walters R., Wills G. (eds) Enterprise Security. Lecture Notes in Computer Science, vol 10131. Springer, Cham, DOI: 10.1007/978-3-319-54380-2_9 [citation][year=2016]Hallman, R., Kerr, L., et al., "TMT: Technology Matching Tool for SCADA Network Security", in Proc. of Cybersecurity Symposium 2016, Coeur d’Alene, Idaho, 18-20 April 2016, pp. 38-43. DOI: 10.1109/CYBERSEC.2016.014 [citation][year=2016]Daniel Cunningham, Geancarlo Palavicini Jr., Jose Romero-Mariona, Towards Effective Cybersecurity for Modular, Open Architecture Satellite Systems, Proceedings of the AIAA/USU Conference on Small Satellites, SSC16-IV-6, 2016. http://digitalcommons.usu.edu/smallsat/2016/TS4AdvTech1/6/ [citation][year=2015]P. Eden, A. Blyth, P. Burnap, K. Jones & K. Stoddart, “A Forensic Taxonomy of SCADA Systems and Approach to Incident Response“, Proc. of the 3rd Int. Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015), 17-18 Sept. 2015, University of Applied Sciences Ingolstadt, Germany, DOI: 10.14236/ewic/ICS2015.5. [publication]J. Proenca and Tiago Cruz and Simões, P. and Edmundo Monteiro , "How to use Software-Defined Networking to Improve Security – a Survey", in In Proc. of 14th European Conference on Cyber Warfare and Security (ECCWS 2015). ISBN: 978-1-910810-28-6 ISSN: 2048-8602, 2015 [citation][year=2019]Marzuqi, Oki; Virgono, Agus; Negara, Ridha Muldina. "Implementation model architecture software defined network using raspberry Pi: a review paper" TELKOMNIKA Telecommunication, Computing, Electronics and Control; Yogyakarta Vol. 17, Iss. 3, (Jun 2019): 1136-1141. DOI:10.12928/TELKOMNIKA.v17i3.8859 [citation][year=2019]Soua, Ridha et al. (2019). Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection, in Proc. of Network of The Future (NoF) conference, Rome, Italy, September 2019. [citation][year=2016]C. Trois; M. D. Didonet Del Fabro; L. C. E. de Bona; M. Martinello, "A Survey on SDN Programming Languages: Towards a Taxonomy," in IEEE Communications Surveys & Tutorials. doi: 10.1109/COMST.2016.2553778 2014(5 publications) [publication]Tiago Cruz and J. Proenca and Simões, P. and Aubigny, M. and Ouedrago, M. and Graziano, A. and Yasakhetu, L. , "Improving cyber-security awareness on Industrial Control Systems: the CockpitCI approach", in In Proc. of 13th European Conference on Information Warfare and Security ECCWS 2014. ISBN: 978-1-63266-831-8 , 2014 [citation][year=2019]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao and Gail-Joon Ahn, "ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems", in Proc. of 7th IEEE Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES 2019), Montreal, Canada, 15 April 2019. [citation][year=2017]Palavicini Jr G., Bryan J., Sheets E., Kline M. and San Miguel J. (2017). Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting.In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, ISBN 978-989-758-245-5, pages 470-477. Jan 2017, Porto, Portugal. DOI: 10.5220/0006393704700477 [citation][year=2015]P. Eden, A. Blyth, P. Burnap, K. Jones & K. Stoddart, “A Forensic Taxonomy of SCADA Systems and Approach to Incident Response“, Proc. of the 3rd Int. Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015), 17-18 Sept. 2015, University of Applied Sciences Ingolstadt, Germany, DOI: 10.14236/ewic/ICS2015.5. [citation][year=2015]Gimwoonyeon, yisuyeon, "Foreign industrial control system security technology research and development trends", The Information Security Journal 25, No. 5, 2015.10, 5-11 (7 pages), ISSN : 1598-3978(Print). [publication]Andre Riker and Tiago Cruz and Marques, B. and Marilia Curado and Simões, P. and Edmundo Monteiro , "Efficient and Secure M2M Communications for Smart Metering", in ETFA 2014 (19th IEEE Int. Conference on Emerging Technology & Factory Automation), 2014 [citation][year=2020]Bana, S. "A Priority-based Fair Queuing (PFQ) Model for Wireless Healthcare System", PhD. Thesis, University of Westminster, January 2020. URL: https://westminsterresearch.westminster.ac.uk/download/1d125f4ecda41c992a200a27188dd9ed7b3743463d47f8f584dbcd58539c7e3f/4793957/A Priority-based Fair Queuing (PFQ) Model for Wireless Healthcare System.pdf [citation][year=2019]Ouaissa, Mariya & ab, Rhattoy. (2019). A Secure Model for Machine to Machine Device Domain Based Group in a Smart City Architecture. International Journal of Intelligent Engineering and Systems. Vol 12. DOI: 10.22266/ijies2019.0228.1 [citation][year=2017]Ahmad, Rami Haidar and Al-Sakib Khan Pathan. "A Study on M2M (Machine to Machine) System and Communication: Its Security, Threats, and Intrusion Detection System." The Internet of Things: Breakthroughs in Research and Practice. IGI Global, 2017. 205-240. Web. 17 Aug. 2017. doi:10.4018/978-1-5225-1832-7.ch010 [citation][year=2015]Lucic, Drazen; Caric, Antun; Lovrek, Ignac, "Standardisation and regulatory context of machine-to-machine communication," in Telecommunications (ConTEL), 2015 13th International Conference on, pp.1-7, 13-15 July 2015 doi: 10.1109/ConTEL.2015.7231216 [publication]Ouedrago, M. and Kuo, C. and Tjoa, S. and Preston, D. and Dubois, E. and Simões, P. and Tiago Cruz , "Keeping an Eye on Your Security Through Assurance Indicators", in SECRYPT’2014 (11th International Conference on Security and Criptography), 2014 [citation][year=2019]Katt, Basel and Nishu Prasher. "Quantitative Security Assurance." In Exploring Security in Software Architecture and Design, ed. Michael Felderer and Riccardo Scandariato, 15-46 (2019). doi:10.4018/978-1-5225-6313-6.ch002 [citation][year=2018]Katt, B., Prasher, N., Quantitative security assurance metrics: REST API case studies. In Proceedings of the 12th European Conference on Software Architecture (ECSA): Companion Proceedings, Madrid, Spain — September 24 - 28, 2018. DOI: 10.1145/3241403.3241464. [citation][year=2018]Kuo, Chien-Ting, et al. "SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service." Future Generation Computer Systems (2018). DOI: 10.1016/j.future.2017.12.069. [citation][year=2015]Lan, Yuqing, and Tao Han. "SADP: Security assurance development process for building reliable Linux-based operating system." Computer and Communications (ICCC), 2015 IEEE International Conference on. IEEE, 2015. [publication]Fonseca, H. and Tiago Cruz and Simões, P. and Edmundo Monteiro and Silva, J. and Centeio, N. and Gomes, P. , "A comparison of classification techniques for detection of VoIP traffic", in NGMAST’2014 (8th International Conference on Next Generation Mobile Apps, Services and Technologies), 2014 [citation][year=2016]AL-NAYMAT, G., et al. "CLASSIFICATION OF VOIP AND NON-VOIP TRAFFIC USING MACHINE LEARNING APPROACHES." Journal of Theoretical & Applied Information Technology (2016). [citation][year=2015]Sz?szo?, K. and Ciosmak, J.., "Metody hybrydowe identyfikacji ruchu Voip w transmisji szyfrowanej", Logistyka, Vol 4, pp: 6002--6008, CD 2, Instytut Logistyki i Magazynowania, 2015 - Available at: https://www.infona.pl/resource/bwmeta1.element.baztech-b84fed80-4a97-4ec8-a7cd-de03a7b3527b/tab/summary?&locale=en [publication]Ana Rodrigues and Tiago Cruz and Amilcar Cardoso , "Sound Objects", in 1st Transcreativa Conference, 2014 2013(7 publications) [publication]Tiago Cruz and Simões, P. and Rodrigues, J. and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "Managed Hybrid Storage for Home and SOHO Environments", in IM 2013 (IFIP/IEEE International Symposium on Integrated Network Management), 2013 [citation][year=2014]Michael K. Bugenhagen, Auto file locker, US Patent US8631236 B2, January 2014. [publication]Tiago Cruz and Simões, P. and Reis, N. and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "An Architecture for Virtualized Home Gateways ", in IM 2013 (IFIP/IEEE International Symposium on Integrated Network Management), 2013 [citation][year=2019]Maxweel Carmo, Felipe S. Dantas Silva, Augusto Venâncio Neto, Daniel Corujo, and Rui Aguiar, “Network-Cloud Slicing Definitions for Wi-Fi Sharing Systems to Enhance 5G Ultra Dense Network Capabilities,” Wireless Communications and Mobile Computing, vol. 2019, Article ID 8015274, 17 pages, 2019. https://doi.org/10.1155/2019/8015274. [citation][year=2019]Georgescu, T.-M.; Iancu, B.; Zurini, M. Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks. Sensors 2019, 19, 3380. DOI: 10.3390/s19153380 [citation][year=2017]Flores Moyano R, Fernández D, Bellido L, González C. A software-defined networking approach to improve service provision in residential networks. Int J Network Mgmt. 2017;e1984. https://doi.org/10.1002/nem.1984 [citation][year=2017]Ricardo Flores Moyano, David Fernández Cambronero, Luis Bellido Triana, A User-Centric SDN Management Architecture for NFV-based Residential Networks, Computer Standards & Interfaces, Available online 27 January 2017, ISSN 0920-5489, http://dx.doi.org/10.1016/j.csi.2017.01.010. [citation][year=2016]Apostolos Papageorgiou, Roberto Bifulco, Ernö Kovacs, Hans-Jörg Kolbe. Dynamic M2M Device Attachment and Redirection in Virtual Home Gateway Environments. IEEE International Conference on Communications (ICC '16). IEEE, May 2016. ISBN: 978-1-4799-6664-6 [citation][year=2016]Cardoso, I. D., Barraca, J. P., Gonçalves, C., and Aguiar, R. L. (2016) Seamless integration of cloud and fog networks. Int. J. Network Mgmt, doi: 10.1002/nem.1944. [citation][year=2016]D. Modig and J. Ding, "Performance impacts on container based virtualization in virtualized residential gateways," 2016 39th International Conference on Telecommunications and Signal Processing (TSP), Vienna, Austria, 2016, pp. 27-32. doi: 10.1109/TSP.2016.7760823 [citation][year=2016]R. Bonafiglia, S. Miano, S. Nuccio, F. Risso and A. Sapio, "Enabling NFV Services on Resource-Constrained CPEs," 2016 5th IEEE International Conference on Cloud Networking (Cloudnet), Pisa, Italy, 2016, pp. 83-88. doi: 10.1109/CloudNet.2016.24 [citation][year=2015]Niwa, Tomonobu; Miyazawa, Masanori; Hayashi, Michiaki; Stadler, Rolf, "Universal fault detection for NFV using SOM-based clustering," in Network Operations and Management Symposium (APNOMS), 2015 17th Asia-Pacific , vol., no., pp.315-320, 19-21 Aug. 2015. doi: 10.1109/APNOMS.2015.7275446 [citation][year=2015]Herbaut, N.; Negru, D.; Xilouris, G.; Yiping Chen, "Migrating to a NFV-based Home Gateway: Introducing a Surrogate vNF approach," in Network of the Future (NOF), 2015 6th International Conference on the , vol., no., pp.1-7, Sept. 30 2015-Oct. 2 2015 [citation][year=2015]Cardoso, Igor Duarte; Barraca, Joao Paulo; Goncalves, Carlos; Aguiar, Rui L., "Seamless integration of Cloud and Fog networks," Network Softwarization (NetSoft), 2015 1st IEEE Conference on , vol., no., pp.1,9, 13-17 April 2015. doi: 10.1109/NETSOFT.2015.7116140 [citation][year=2014]Cardoso, Igor Duarte, "Network infrastructure control for virtual campuses", MSc. Thesis, University of Aveiro, 2014. Available at: http://ria.ua.pt/handle/10773/14707 [citation][year=2014]M. Boussard, D. T. Bui, R. Douville, N. Le Sauze, L. Noirie, P. Peloso, R. Varloot, M. Vigoureux, The Majord'Home: a SDN Approach to Let ISPs Manage and Extend Their Customers' Home Networks, Proc. of 10th CNSM and Workshop – ManSDN/NFV Short Paper, pp.430-434, ISBN 978-3-901882-67-8. [publication]Tiago Cruz and Simões, P. , "A Management Framework for Residential Broadband Environment", in IM 2013 (IFIP/IEEE International Symposium on Integrated Network Management), 2013 [publication]Simões, P. and Tiago Cruz and J. Proenca and Edmundo Monteiro , "On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks", in In Proc. of 12th European Conference on Information Warfare and Security (ECIW 2013). ISBN: 978-1-909507-34-0 ISSN: 2048-8602, 2013 [citation][year=2020]Cifranic, Nicholas & Romero-Mariona, Jose & Souza, Brian & Hallman, Roger. (2020). Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures, in Proc of 5th International Conference on Internet of Things, Big Data and Security (IoTBDS 2020)At: Prague, Czech Republic. May 2020 [citation][year=2019]Amine Belqruch and Abdelilah Maach. "SCADA security using SSH honeypot". In Proceedings of the 2nd International Conference on Networking, Information Systems & Security (NISS19). ACM, New York, NY, USA, Article 2, 5 pages. DOI: https://doi.org/10.1145/3320326.3320328 [citation][year=2019]Maglaras L., Ferrag M.A., Derhab A., Mukherjee M., Janicke H. (2019) Cyber Security: From Regulations and Policies to Practice. In: Kavoura A., Kefallonitis E., Giovanis A. (eds) Strategic Innovative Marketing and Tourism. Springer Proceedings in Business and Economics. Springer, Cham. DOI: 10.1007/978-3-030-12453-3_88 [citation][year=2019]William Hofer, Thomas Edgar, Draguna Vrabie, Katy Nowak “Model-driven Deception for Control System Environments”, in Proc of 2019 IEEE International Symposium onTechnologies for Homeland Security, November 5 - 6, 2019 Woburn, MA USA [citation][year=2018]Maglaras, Leandros & Ferrag, Mohamed Amine & Derhab, Abdelouahid & Mukherjee, Mithun & Janicke, Helge. (2018). Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. Security and Safety. [citation][year=2018]Palleti, V.R., Tan, Y.C., Samavedham, L., A mechanistic fault detection and isolation approach using Kalman filter to improve the security of cyber physical systems, (2018) Journal of Process Control, 68, pp. 160-170. DOI: 10.1016/j.jprocont.2018.05.005 [citation][year=2018]Adam Rose, Noah Miller, Jonathan Eyer, Joshua Banks, (2018). Economic Effectiveness of Mitigation and Resilience. 315-351. 10.1007/978-3-319-77492-3_14. May 2018. [citation][year=2017]Angséus, J., Ekbom, R., "Network-based Intrusion Detection Systems for Industrial Control Systems", Master’s thesis in Computer Systems and Networks (MPCSN), Department of Computer Science and Engineering. CHALMERS UNIVERSITY OF TECHNOLOGY/UNIVERSITY OF GOTHENBURG, Gothenburg, Sweden 2017 [citation][year=2017]Ibraheem Frieslaar and Barry Irwin. 2017. Investigating the effects various compilers have on the electromagnetic signature of a cryptographic executable. In Proceedings of the South African Institute of Computer Scientists and Information Technologists (SAICSIT '17). ACM, New York, NY, USA, Article 15, 10 pages. DOI: https://doi.org/10.1145/3129416.3129436 [citation][year=2016]Jaehee Lee, Jinhyeok Jeon, Changyeob Lee, Junbeom Lee, Jaebin Cho, An implementation of log visualization system combined SCADA Honeypot, Proc. of the Int. Conf. on Advanced Communications Technology (ICACT2016), pp. 441-444, Phoenix Park, South Korea, Jan 31 – Feb 03, 2016 [citation][year=2016]J. Nurmi, J. Kannisto and M. Vajaranta, "Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet," 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), Fukuoka, Japan, 2016, pp. 55-59. doi: 10.1109/AsiaJCIS.2016.31 [citation][year=2015]Kamil Koltys and Robert Gajewski, SHaPe: A Honeypot for Electric Power Substation, Journal of Telecommunications and Information Technology, 2015, vol. 4, pp. 37-43. [publication]Simões, P. and Tiago Cruz and J. Proenca and Edmundo Monteiro , "Honeypots especializados para Redes de Controlo Industrial", in In Proc. of CIBSI 2013 (Congreso Iberoamericano de Seguridad Informática). ISBN: 978-9962-676-43-0, 2013 [citation][year=2019]Kamlofsky, Jorge & Abdel Masih, Samira & Colombo, Hugo & Milio, Claudio & Hecht, Juan Pedro. (2019). Ciberseguridad en los Sistemas de Control Industrial: Clave para la Ciberdefensa de las Infraestructuras Críticas, in Proc of XXI Workshop de Investigadores en Ciencias de la ComputaciónAt: San Juan, Argentina, maio 2019. [citation][year=2017]J Kamlofsky, SA Masih, H Colombo, D Veiga, E Costa, "Seguridad en Redes las Industriales: Clave para la Ciberdefensa de las Infraestructuras Críticas", in Proc of WICC 2017 - XIX Workshop de Investigadores en Ciencias de la Computación, 27-28 April 2017, Instituto Tecnológico de Buenos Aires (ITBA), Buenos Aires, Argentina. Available at: http://wicc.it.itba.edu.ar/pdf/Libro_WICC_2017_ISBN_978-987-42-5143-5.pdf [citation][year=2016]Kamlofsky, Jorge, et al. "Ciberdefensa en redes industriales." XVIII Workshop de Investigadores en Ciencias de la Computación (WICC 2016, Entre Ríos, Argentina). 2016. [citation][year=2015]Kamlofsky, Jorge, et al. "Ciberdefensa de infraestructuras industriales." XVII Workshop de Investigadores en Ciencias de la Computación (Salta, 2015). 2015. [citation][year=2015]Jorge Kamlofsky, Hugo Colombo, Matías Sliafertas, Juan Pedernera (2015). “Un Enfoque para Disminuir los Efectos de los Ciber-ataques a las Infraestructuras Críticas”. Libro: 3er. Congreso Nacional de Ingeniería Informática / Sistemas de Información CoNaIISI 2015. Organizado por la red de carreras de Ingeniería Informática / Sistemas de Información (RIISIC) perteneciente al CONFEDI. 19 y 20 de Noviembre. UTN, Facultad Regional Buenos Aires. Institución de origen: Facultad de Informática, UNLP. ISBN: 978-987-1896-47-9. [publication]Tiago Cruz and Simões, P. and Cabaço, P. and A. S. Gomes and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "On the Use of Thin-client Set-Top Boxes for IPTV Services", in 38th Annual IEEE Conf. on Local Computer Networks (LCN 2013), 2013 [citation][year=2017]Anton Dahlin, Enabling Pro-active Problem Management by Predictive Modelling: Data mining and statistical analysis of past problems to enable pro-active actions for Internet Protocol Television, Independent thesis Advanced level (professional degree), KTH School of Information and Communication Technology (ICT), UK, 2017. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210636 [citation][year=2016]E. S. Jung, J. Bang, Y. T. Lee and W. Ryu, "Power saving with passive standby mode using bitmap-based activity logs for energy-efficient set-top box," in IEEE Transactions on Consumer Electronics, vol. 62, no. 1, pp. 62-68, February 2016. doi: 10.1109/TCE.2016.7448564 [citation][year=2016]Irena Battelino ,"EVOLUTION OF TV CONTENT DELIVERY AND ON-DEMAND VIDEO DELIVERY TO THE END-USER", (Master Thesis), University of Ljubljana, advisor: Dr. Matej Zajc, 2016, https://repozitorij.uni-lj.si/IzpisGradiva.php?id=85504 [citation][year=2015]Suksomboon, Kalika, Masaki Fukushima, and Michiaki Hayashi. "Optimal virtualization of functionality for customer premise equipment." Communications (ICC), 2015 IEEE International Conference on. IEEE, 2015. [publication]Fonseca, H. and Tiago Cruz and Simões, P. and Edmundo Monteiro and Silva, J. and Gomes, P. and Centeio, N. , "Técnicas de classificação e detecção de tráfego para Voice over Internet Protocol (VoIP) (short paper)", in CRC'13, 13ª Conferência sobre Redes de Computadores, 2013 2012(1 publication) [publication]Tiago Cruz and Simões, P. and Rodrigues, J. and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "Using UPnP-CWMP Integration for Operator-assisted Management of Domestic LANs", in IEEE Consumer Communications and Networking Conference - CCNC 2012, 2012 [citation][year=2014]Tsung-Cheng Hou, "Design and Implementation of a Smart Power Meter Control System for Android-based Mobile Devices", Department of Computer Science and Information Engineering, Tamron University, M.Sc Thesis. available at: http://www.airitilibrary.com/Publication/alDetailedMesh?docid=U0002-3006201416173800 [citation][year=2013]Eun-Seo Lee, Hark-Jin Lee, Kwangil Lee, and Jun-Hee Park, “Automating Configuration System and Protocol for Next-Generation Home Appliances”, ETRI Journal, Volume 35, Number 6, December 2013, http://dx.doi.org/10.4218/etrij.13.0113.0216 2011(2 publications) [publication]Tiago Cruz and Simões, P. and Almeida, J. and Rodrigues, J. and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "How to Provision and Manage Off-the-Shelf SIP Phones in Domestic and SOHO Environments", in IEEE LCN 2011 (The 35th IEEE Conf. on Local Computer Networks), 2011 [citation][year=2016]OULAHAL, Nordine ; OTT, Jean-Didier , "METHOD FOR ADMINISTERING A PLURALITY OF LOCAL DEVICES", Application EP-3053305-A1. Publication date 2016/08/10. Pending patent request. Available at: https://patents.google.com/patent/EP3053305A1/en [citation][year=2016]OULAHAL, Nordine ; OTT, "METHOD FOR ADMINISTERING A PLURALITY OF LOCAL DEVICES", Patent Application US-20160248621-A1. Publication date 2016/08/25. Available at: https://patents.google.com/patent/US20160248621/ko [citation][year=2015]OULAHAL, Nordine ; OTT, Jean-Didier , "METHOD FOR ADMINISTERING A PLURALITY OF LOCAL DEVICES" , Patent No. WO2015044600, https://patentscope.wipo.int/search/docservicepdf_pct/id00000028663012/PAMPH/WO2015044600.pdf, April 2015. Available at: https://patents.google.com/patent/WO2015044600A1/en [citation][year=2015]OULAHAL, Nordine ; OTT, "METHOD FOR ADMINISTERING A PLURALITY OF LOCAL DEVICES", Patent application FR3011419A1. Publication date 2015/04/03. Pending patent request. Available at: https://patents.google.com/patent/FR3011419A1/en?oq=FR-3011419-A1 [citation][year=2013]Ram?nas Dzindzalieta, "Development of a system for monitoring of the moving objects by using the session initiation protocol", PhD Thesis, Vilnius University, 2013. Available at: https://epublications.vu.lt/object/elaba:2056654/ [publication]Tiago Cruz and Simões, P. and Rodrigues, J. and Edmundo Monteiro and Bastos, F. and Laranjeira, A. , "Outsourced management of home and SOHO desktops", in 7th International Conference on Network and Services Management (CNSM 2011), 2011 [citation][year=2014]44. VAN DE POEL, Dirk; DUMET, Sylvain, "SYSTEM COMPRISING AN END-USER DEVICE AND A SERVICE PROVIDER NETWORK COUPLED VIA A BROADBAND CONNECTION, AND RESPECTIVE END-USER DEVICE", Patent No. WO2014057040, April 2014. 2010(3 publications) [publication]Tiago Cruz and Simões, P. and Batista, P. and Almeida, J. and Edmundo Monteiro and Bastos, F. , "Gestão de Redes Domésticas com Agentes CWMP Extensíveis", in 10ª Conferência sobre Redes de Computadores (CRC 2010), 2010 [publication]Tiago Cruz and Simões, P. and Batista, P. and Almeida, J. and Edmundo Monteiro and Bastos, F. , "CWMP Extensions for Enhanced Management of Domestic Network Services", in IEEE LCN 2010 (The 35th IEEE Conf. on Local Computer Networks), 2010 [citation][year=2018]Jian-Hong Wang, Chi-Chun Chen, Hsing-Wen Wang, Grouping and time-series notifying of periodic data in a real-time streaming system for smart toy claw machine, Journal of Systems Architecture, 2018, https://doi.org/10.1016/j.sysarc.2018.08.009. [citation][year=2016]Kuen-Min, L., "Toward Optimizing System Capabilities in a CWMP Network", PhD Thesis, Department of Engineering Science, Kung University, China, 2016, Available at: http://www.airitilibrary.com/searchdetail.aspx?DocIDs=U0026-2706201617101000 [citation][year=2015]Chien-Cheng Lai - ID 665452, "IP multimedia in home networks – DLNA and UPnP", Melbourne School of Engineering The University of Melbourne - Multimedia Content Delivery (ELEN90014) Project. Available at: https://www.slideshare.net/JamesLai10/upnp-and-dlna-in-the-home-network-v2 [citation][year=2014]Ivana Savic, Milan S. Savic, Gordana Velikic, “Implementation of TR-069 connection request mechanism”, X International Symposyum on Industrial Electronics INDEL 2014, Banja Luka, Nov. 2014. [citation][year=2014]Nie, Hua; Zhou, Xue; Ni, Yalu; Yang, Xiaojun; Long, Keping, "Design and Implementation of a Virtualized Storage Fabric for Cloud Server," Networking, Architecture, and Storage (NAS), 2014 9th IEEE International Conference on , vol., no., pp.103,107, 6-8 Aug. 2014, doi: 10.1109/NAS.2014.23 [citation][year=2014]K.M. Lee; H. Chu; J. Chu; Y. Lin; C. Hsiao; T.W. Hou, “ACS management capacity enhancement mechanism in CWMP”, Institution of Engineering and Technology, Electronics Letters, available online 08 January 2014, DOI: 10.1049/el.2013.1385 [citation][year=2014]Milan Z. Bjelica, Istvan Papp, Nikola Teslic, Diagnostic CWMP Client for Set-Top Box Devices, Proc. of 2014 IEEE Int. Conf. on Consumer Electronics (ICCE), pp. 464-465, DOI: 10.1109/ICCE.2014.6776088. [citation][year=2014]Matheus, Christopher & Boran, Aidan & Carr, Dominic & Collier, Rem & Kroon, Barnard & Murdoch, Olga & Lillis, David & O'Hare, Gregory & O’Grady, Michael. (2014). "Semantic Network Management for Next Generation Networks". Computational Intelligence. 10.1111/coin.12180. [citation][year=2013]Bjelica, Milan Z.; Papp, Istvan; Draskovic, Svetozar; Perisic, Stevan; Maksovic, Vladimir, "Digital TV device extensions for remote monitoring, configuration and diagnostics," Telecommunications Forum (TELFOR), 2013 21st , vol., no., pp.987,990, 26-28 Nov. 2013. doi: 10.1109/TELFOR.2013.6716397 [citation][year=2013]Savic, Milan; Papp, Istvan; Resetar, Ivan; Majstorovic, Dusan; Spasojevic, Danijel, "Implementation of server push mechanism based on TR-069 and TR-111 protocols for network device management," Telecommunications Forum (TELFOR), 2013 21st , vol., no., pp.361,364, 26-28 Nov. 2013. doi: 10.1109/TELFOR.2013.6716244 [citation][year=2012]Christopher J. Matheus, Aidan Boran, Dominic Carr, Rem Collier, Barnard Kroon, Olga Murdoch, Gregory M. P. O’Hare, Michael O’Grady,” Semantic Network Monitoring and Control over Heterogeneous Network Models and Protocols”, Active Media Technology (Proceedings of the 8th International Conference, AMT 2012, Macau, China, December 4-7, 2012), Springer LNCS 2012, pp.433-444, December 2012, DOI: 10.1007/978-3-642-35236-2_43 [publication]Tiago Cruz and Simões, P. and Bastos, F. and Edmundo Monteiro , "Integration of PXE-based Desktop Solutions into Broadband Access Networks", in 6th International Conference on Network and Services Management (CNSM), 2010 [citation][year=2018]Wu, D., Wang, L., Chen, G."A linux cluster automatic deployment method under x86 architecture" (2018), in Proc. of 2nd International Conference on Computer Science and Application Engineering (CSAE 2018), Hohhot, China, 22 -24 October 2018, art. no. 126, ACM International Conference Proceeding Series. DOI: 10.1145/3207677.3278096 [citation][year=2017]Wang Xuefei, Yu Haiying, Wu Hongbing, "Research on Data Erasing System Based on PXE and Its Application in Military Field", "Microcomputer and Application" 2017, No. 2 1-4, Available at: http://www.cqvip.com/QK/95939X/201702/671103819.html. [citation][year=2017]Xiong, Yonghua and She, Jinhua and Jiang, Keyuan, "A Lightweight Approach to Access to Wireless Network without Operating System Support", in Intelligent Automation & Soft Computing, pp 1-9, Taylor & Francis, February 2017. ISBN:1079-8587; DOI: 10.1080/10798587.2017.1280262 [citation][year=2016]Demis Gomes, Nichene Verçosa, Victor Medeiros e Glauco Gonçalves, "Plataforma de áreas de trabalho virtuais escalável para nuvens privadas", Anais do XIV Workshop de Computação em Clouds e Aplicações (WCCA’2016, co-located with SBRC’2016); Porto Alegre, Brazil, SBC, 2016 [citation][year=2016]Jiang; Jiaping, "Protection method and system for computer security ", Celestica Technology Consultancy, US Patent 9,230,093, available at: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/netahtml/PTO/srchnum.htm&r=1&f=G&l=50&s1=9230093.PN.&OS=PN/9230093 [citation][year=2014]24. VAN DE POEL, Dirk; DUMET, Sylvain, "SYSTEM COMPRISING AN END-USER DEVICE AND A SERVICE PROVIDER NETWORK COUPLED VIA A BROADBAND CONNECTION, AND RESPECTIVE END-USER DEVICE" , Patent No. WO2014057040, April 2014. [citation][year=2014]Nie, Hua; Zhou, Xue; Ni, Yalu; Yang, Xiaojun; Long, Keping "Design and Implementation of a Virtualized Storage Fabric for Cloud Server", Networking, Architecture, and Storage (NAS), 2014 9th IEEE International Conference on, On page(s): 103 - 107 [citation][year=2012]A. Ravi, R. Venkatakrishnan, and B. Kannan, Cloud Based Remote Infrastructure Management, International Journal of Computer Theory and Engineering, Vol. 4, No. 6, December 2012, [citation][year=2012]Peng Ren-ming, Li Min, “Remote Data Sanitization System Based on PXE Network”, Journal of Chongqing Normal University, Vol. 29, Issue: 6, pp. 59-63, ISSN 16726693, 2012. [citation][year=2012]A. Ravi, R. Venkatakrishnam, “Multi-level Kick Start Server”, International Journal of Computer Theory and Engineering, Vol.5 N.2, pp. 197-200, April 2013, DOI: 10.7763/IJCTE.2013.V5.677. [citation][year=2011]Schmelzer, Sebastian; von Suchodoletz, Dirk; Schneider, Gerhard; Weingaertner, Daniel; de Bona, Luis Carlos E.; Carvalho, Carlos, "Universal remote boot and administration service," Network Operations and Management Symposium (LANOMS), 2011 7th Latin American, vol., no., pp.1-6, 10-11 Oct. 2011. [citation][year=2011]Chun-Wei Chen, Remote Computer Automatic Installation Management System?Take Computer Classrooms Management as an Example, MSc Thesis. Information Management Institute, Shih Hsin University, Taiwan, 2011. 2009(5 publications) [publication]Tiago Cruz and Leite, T. and Batista, P. and Vilão, R. and Simões, P. and Bastos, F. and Edmundo Monteiro , "How to Cooperatively Improve Broadband Security", in In Proc. of European Conference on Information Warfare and Security (ECIW 2009). ISBN: 978-1-906638-35-1, 2009 [publication]Tiago Cruz and Leite, T. and Batista, P. and Vilão, R. and Simões, P. and Bastos, F. and Edmundo Monteiro , "Um IDS Cooperativo para Redes de Acesso de Banda Larga", in in Proc. of CIBSI 2009 (Congreso Iberoamericano de Seguridad Informática), Montevideo, Uruguai. ISBN: 978-9974-0-0593-8., 2009 [publication]Vilão, R. and Simões, P. and Tiago Cruz and Bastos, F. and Edmundo Monteiro , "Avaliação Empírica de um IDS Distribuído para Redes de Acesso de Banda Larga", in Actas da 9ª ConfeRência sobre Redes de Computadores (CRC-2009) - AR:60%, 2009 [publication]Leite, T. and Tiago Cruz and Simões, P. and Bastos, F. and Edmundo Monteiro , "Uma Plataforma para Gestão de Configurações em Redes de Banda Larga", in Actas da 9ª Conferência sobre Redes de Computadores (CRC-2009) - AR:60%, 2009 [publication]Tiago Cruz and Leite, T. and Batista, P. and Vilão, R. and Simões, P. and Bastos, F. and Edmundo Monteiro , "Scalable Approach to Data Collection in Broadband Access Networks", in in Proc. of 8th International Conference on Decision Support for Telecommunications and Information Society (DSTIS), ISBN: 9781622760046, 2009 2008(1 publication) [publication]Tiago Cruz and Leite, T. and Batista, P. and Vilão, R. and Bastos, F. and Simões, P. and Edmundo Monteiro , "Segurança em Redes de Acesso Triple-Play", in 4ª Conferência Nacional sobre Segurança Informática nas Organizações (SINO 2008), 2008 2003(2 publications) [publication]Tiago Cruz and Simões, P. , "Enabling PreOS Desktop Management", in IM'2003 (IFIP/IEEE International Symposium on Integrated Network Management), 2003 [citation][year=2017]Patent Assignee: Hewlett-Packard Development Company, L.P. "System and method for booting a computer system using preboot data" - SS Azam, Z Beyabani - US Patent 9,665,379, 2017 [citation][year=2015]Kohn, Rodolfo ; Kinzhalin, Arzhan ; Lombard David ; Morin Ricardo , "Platform discovery in a pre-boot environment using web services" , Patent No. EP2172840, Dec. 2015., https://worldwide.espacenet.com/publicationDetails/originalDocument?FT=D&date=20151202&DB=&locale=en_EP&CC=EP&NR=2172840B1&KC=B1&ND=1 [citation][year=2013]Kuen-Min Lee, Wei-Guang Teng, Jin-Neng Wu, Kuo-Ming Huang, Yao-Hsing Ko, Ting-Wei Hou, Multicast and customized deployment of large-scale operating systems, Automated Software Engineering, Springer, December 2013. Doi: 10.1007/s10515-013-0139-6 [citation][year=2012]Kinzhalin, Arzhan, Rodolfo Kohn, David Lombard, and Ricardo Morin. "Platform discovery, asset inventory, configuration, and provisioning in a pre-boot environment using web services." U.S. Patent 8,312,116, issued November 13, 2012. [citation][year=2011]Kohn, Rodolfo, Arzhan Kinzhalin, David Lombard, and Ricardo Morin. "Platform discovery, asset inventory, configuration, and provisioning in a pre-boot environment using web services." U.S. Patent 8,041,794, issued October 18, 2011. [publication]Tiago Cruz and Simões, P. , "Gestão de PCs com Recurso a Mecanismos PreOS", in CRC'2003 (6ª Conf. sobre Redes de Computadores), 2003 [citation][year=2006]Ricardo, Vilton Wronski. "Elementos de custo para o cálculo do custo total de propriedade em tecnologia de informação." (2006). 2002(1 publication) [publication]Tiago Cruz and Simões, P. , "Rethinking Desktop Management", in Asia-Pacific Network Operations and Management Symposium (APNOMS 2002) , 2002 [citation][year=2016]Dunbar, Daniel Robert, "IMPLEMENTING A MANAGED DESKTOP IN HIGHER EDUCATION", MSc Thesis, The College of St. Scholastica, Duluth, Minnesota. Available at: https://search.proquest.com/docview/1807952731 Edited Books 2019(1 publication) [publication]Tiago Cruz and Simões, P. ,Proceedings of the 18th European Conference on Cyber Warfare and Security (ECCWS 2019) , "Proceedings of the 18th European Conference on Cyber Warfare and Security (ECCWS 2019)", vol. 1, 2019 Book Chapters 2020(1 publication) [publication]Rosa, L. and Freitas, M.B.d. and João Henriques and Quitério, P. and Caldeira, F. and Tiago Cruz and Simões, P. , "Evolving the Security Paradigm for Industrial IoT Environments", in Cyber Security of Industrial Control Systems in the Future Internet Environment (upcoming), ISBN13: 9781799829102, ISBN10: 1799829103, EISBN13: 9781799829126, DOI: 10.4018/978-1-7998-2910-2, vol. N/A, 2020 2018(1 publication) [publication]Lima, A. and Borges, P. and Sousa, B. and Simões, P. and Tiago Cruz , "An Introduction to Mobile Device Security", in Mobile Apps Engineering - ISBN 9781138054356, vol. 1, pp. 1-34, 2018 2017(1 publication) [publication]Konstantia Barbatsalou, Konstantia Barmpatsalou and Tiago Cruz and Edmundo Monteiro and Simões, P. , "From fuzziness to criminal investigation: An inference system for Mobile Forensics.", in Intrusion Detection and Prevention for Mobile Ecosystems, vol. 1, pp. 117-133, 2017 2015(3 publications) [publication]Simões, P. and Tiago Cruz and J. Proenca and Edmundo Monteiro , "Specialized Honeypots for SCADA Systems, in Cyber Security Analytics", in Cyber Security Analytics, Technology and Automation, vol. 1, pp. 251-269, 2015 [citation][year=2020]Cifranic, Nicholas & Romero-Mariona, Jose & Souza, Brian & Hallman, Roger. (2020). Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures, in Proc of 5th International Conference on Internet of Things, Big Data and Security (IoTBDS 2020)At: Prague, Czech Republic. May 2020 [citation][year=2020]You J., Lv S., Hao Y., Feng X., Zhou M., Sun L. (2020) Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data. In: Zhou J., Luo X., Shen Q., Xu Z. (eds) Information and Communications Security. ICICS 2019. Lecture Notes in Computer Science, vol 11999. Springer, Cham. DOI: 10.1007/978-3-030-41579-2_5 [citation][year=2019]C. Dalamagkas, P. Sarigiannidis, D. Ioannidis, E. Iturbe, O. Nikolis, F. Ramos, E. Rios, A. Sarigiannidis and D. Tzovaras, "A Survey On Honeypots, Honeynets And Their Applications On Smart Grid", 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures, Paris, France, 2019. [citation][year=2019]D. Pliatsios, P. Sarigiannidis, T. Liatifis, K. Rompolos and I. Siniosoglou, "A Novel and Interactive Industrial Control System Honeypot for Critical Smart Grid Infrastructure," 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, 2019, pp. 1-6. doi: 10.1109/CAMAD.2019.8858431 [citation][year=2017]Dewar, Robert Scott (2017) Cyber security in the European Union: an historical institutionalist analysis of a 21st century security concern. PhD thesis, University of Glasgow. URL: http://theses.gla.ac.uk/8188/ [citation][year=2016]Jose Romero-Mariona, Roger Hallman, Megan Kline, John San Miguel, Maxine Majorand Lawrence Kerr, Security in the Industrial Internet of ThingsTheC-SECApproach, Proc. of the Int. Conf. on Internet of Things and Big Data (IoTBD 2016), pp. 413-420, ISBN: 978-989-758-183-0, 2016, SCITEPRESS [citation][year=2016]Jaehee Lee, Jinhyeok Jeon, Changyeob Lee, Junbeom Lee, Jaebin Cho, An implementation of log visualization system combined SCADA Honeypot, Proc. of the Int. Conf. on Advanced Communications Technology (ICACT2016), pp. 441-444, Phoenix Park, South Korea, Jan 31 – Feb 03, 2016 [publication]Tiago Cruz and Simões, P. and Edmundo Monteiro , "Optimizing the Delivery of Services Supported by Residential Gateways: Virtualized Residential Gateways", in Redesigning the Future of Internet Architectures, vol. 1, pp. 431-473, 2015 [publication]Caldeira, F. and Tiago Cruz and Simões, P. and Edmundo Monteiro , "Towards protecting critical infrastructures ", in Cybersecurity Policies and Strategies for Cyberwarfare Prevention, vol. 1, pp. 123-169, 2015 [citation][year=2019]van Niekerk, Brett. "Economic Information Warfare: Classifying Cyber-Attacks Against Commodity Value Chains." International Conference on Cyber Warfare and Security. Academic Conferences International Limited, 2019. [citation][year=2019]Sö?üt, Esra & Erdem, Ayhan. (2019). A Review of Research Studies on Cyber Terror. In book: Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism. DOI: 10.4018/978-1-5225-8976-1.ch008 [citation][year=2018]Piero Siroli, Gian. (2018). Considerations on the Cyber Domain as the New Worldwide Battlefield. The International Spectator. 53. 111-123. DOI:10.1080/03932729.2018.1453583. [citation][year=2018]Yu-Min Joo & Teck-Boon Tan (2018) Smart Cities: A New Age of Digital Insecurity, Survival, 60:2, 91-106, DOI: 10.1080/00396338.2018.1448577. URL (full paper): http://scholarbank.nus.sg/bitstream/10635/141601/1/10.108000396338.2018.1448577.pdf [citation][year=2017]Roger A. Hallman, Jose Romero-Mariona, et al., "Standardized and Repeatable Technology Evaluation for Cybersecurity Acquisition", SPAWAR Systems Pacific Technical Document 3316, February 2017. Available at: https://www.researchgate.net/profile/Roger_Hallman2/publication/316976845_Standardized_and_Repeatable_Technology_Evaluation_for_Cybersecurity_Acquisition/links/591b3e214585153b614fa208/Standardized-and-Repeatable-Technology-Evaluation-for-Cybersecurity-Acquisition.pdf [citation][year=2017]Kasemsap, K. "Robotics: Theory and Applications." In Cybersecurity Breaches and Issues Surrounding Online Threat Protection, pp. 311-345. IGI Global, 2017. DOI: 10.4018/978-1-5225-1941-6.ch013 2014(1 publication) [publication]Tiago Cruz and Simões, P. and Edmundo Monteiro , "Cloud-based Content Delivery to Home Ecosystems", in Advanced Content Delivery and Streaming in the Cloud, vol. 1, pp. 119-149, 2014 PhD Theses 2012(1 publication) [publication]Tiago Cruz , "A Management Framework for Residential Broadband Environments", 2012 MSc Theses 2017(1 publication) [publication]João T. Fernandes and Paiva, R.P. and Tiago Cruz , "Using Low Cost Embedded Systems for Lung Sounds Auscultation and Analysis", 2017 2006(1 publication) [publication]Tiago Cruz , "Projecto IC3: Uma Plataforma Integrada de Computação e Comunicações", 2006 2003(1 publication) [publication]Tiago Cruz , "Open Desktop Management Infrastructures", 2003 Tech Report 2017(1 publication) [publication]Maglaras, L. and Shu, L. and Maglaras, A. and Jiang, J. and Janicke, H. and Katsaros, D. and Tiago Cruz , "Editorial: Industrial Internet of Things (I2oT) - Springer MONET SI", 2017 [citation][year=2020]J. Khan et al., "SMSH: Secure Surveillance Mechanism on Smart Healthcare IoT System With Probabilistic Image Encryption," in IEEE Access, vol. 8, pp. 15747-15767, 2020. DOI: 10.1109/ACCESS.2020.2966656 [citation][year=2020]Abdul Rehman, Anand Paul, Muhammad Azfar Yaqub, and Muhammad Mazhar Ullah Rathore. 2020. Trustworthy intelligent industrial monitoring architecture for early event detection by exploiting social IoT. In Proceedings of the 35th Annual ACM Symposium on Applied Computing (SAC ’20). Association for Computing Machinery, New York, NY, USA, 2163–2169. DOI:https://doi.org/10.1145/3341105.3373996 [citation][year=2019]Ke Wang, Migration strategy of cloud collaborative computing for delay-sensitive industrial IoT applications in the context of intelligent manufacturing, Computer Communications, Volume 150, 2020, Pages 413-420, ISSN 0140-3664, DOI: 10.1016/j.comcom.2019.12.014. [citation][year=2018]Shama N. Islam, M.A. Mahmud, A.M.T. Oo, Impact of optimal false data injection attacks on local energy trading in a residential microgrid, ICT Express, Available online 21 February 2018, ISSN 2405-9595, https://doi.org/10.1016/j.icte.2018.01.015. [citation][year=2018]Pilloni, V. How Data Will Transform Industrial Processes: Crowdsensing, Crowdsourcing and Big Data as Pillars of Industry 4.0. Future Internet 2018, 10, 24. doi: 10.3390/fi10030024. 2015(1 publication) [publication]Maglaras, L. and Jiang, J. and Tiago Cruz , "Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems", 2015