CISUC

A Cyber Security Detection Framework for Supervisory Control and Data Acquisition Systems

Authors



Related Project

FP7 CockpitCI: Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures

Journal

IEEE Transactions on Industrial Informatics, ISSN (print): 1551-3203, ISSN (electronic): 1941-0050, Vol. 12, #6, pp. 1-11, Prof. Ren Luo, December 2016

DOI


Cited by

Year 2020 : 8 citations

 M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks Against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1035-1044, Feb. 2020. DOI: 10.1109/TII.2019.2926557

 Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1024-1034, Feb. 2020.
doi: 10.1109/TII.2019.2925422

 LUO, Junzhou & HE, Yuan & ZHANG, Lan & LIU, Liang & SUN, Maojie & XIONG, Runqun & DONG, Fang. (2020). The architecture and key technologies for an industrial Internet with synergy between the cloud and clients. SCIENTIA SINICA Informationis. 50. 195-220. DOI: 10.1360/N112019-00005.

 Soumya Ray*, Kamta Nath Mishra and Sandip Dutta, “Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review”, Recent Advances in Computer Science and Communications (2020) 13: 1. https://doi.org/10.2174/2666255813666200224092717

 Abdullah Al-Noman Patwary, Anmin Fu, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Md Anwarul Kaium Patwary, Erfan Aghasian, "Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review", arXiv:2003.00395v1, March 2020

 Claudio Zunino, Adriano Valenzano, Roman Obermaisser, Stig Petersen, Factory Communications at the Dawn of the Fourth Industrial Revolution, Computer Standards & Interfaces, Volume 71, 2020, ISSN 0920-5489, DOI: 10.1016/j.csi.2020.103433.

 L. Ding, Q. Han, B. Ning and D. Yue, "Distributed Resilient Finite-Time Secondary Control for Heterogeneous Battery Energy Storage Systems Under Denial-of-Service Attacks," in IEEE Transactions on Industrial Informatics, vol. 16, no. 7, pp. 4909-4919, July 2020.

 Jakapan Suaboot, Adil Fahad, Zahir Tari, John Grundy, Abdun Naser Mahmood, Abdulmohsen Almalawi, Albert Y. Zomaya, and Khalil Drira. 2020. A Taxonomy of Supervised Learning for IDSs in SCADA Environments. ACM Comput. Surv. 53, 2, Article 40 (April 2020), 37 pages. https://doi.org/10.1145/3379499

Year 2019 : 19 citations

 Lin, L.; Wang, B.; Qi, J.; Wang, D.; Huang, N. Bearing Fault Diagnosis Considering the Effect of Imbalance Training Sample. Entropy 2019, 21, 386. DOI: 10.3390/e21040386

 Will Serrano, Erol Gelenbe, "Deep Learning Clusters in the Cognitive Packet Network", Neurocomputing, 2019, ISSN 0925-2312. DOI: 10.1016/j.neucom.2018.07.101.

 Jiwoong Kang, Taein Kim, Jaehyun Park, "FPGA-based Real-time Abnormal Packet Detector for Critical Industrial Network", in Proc. of 2019 Workshop on Communications in Critical Embedded Systems (as part of IEEE ISCC 2019), june 30, 2019, Barcelona, Spain. DOI: 10.1109/ISCC47284.2019.8969630

 Venkataramanan, Venkatesh & Srivastava, Anurag & Hahn, Adam. (2019). CyPhyR: A Cyber-Physical Analysis Tool for Measuring and Enabling Resiliency in Microgrids. IET Cyber-Physical Systems: Theory & Applications. DOI: 10.1049/iet-cps.2018.5069.

 Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, 2019. doi: 10.1109/TII.2019.2925422

 J. Yang, C. Zhou, Y. Tian and S. Yang, "A Software-defined Security Approach for Securing Field Zones in Industrial Control Systems," in IEEE Access, 2019. doi: 10.1109/ACCESS.2019.2924800

 Qi Min, "Research on the Importance of Maintaining Network Ideology Security in the
Context of Globalization", in Proc. of 2019 4th International Social Sciences and Education Conference (ISSEC 2019) , Xiamen, China, 27-28 june 2019. Available at: https://www.webofproceedings.org/proceedings_series/ESSP/ISSEC 2019/ISSEC19040.pdf

 M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2019.2926557

 D. Sun, G. Zhang and S. Gao, "Data Management across Geographically-Distributed Autonomous Systems: Architecture, Implementation, and Performance Evaluation," in IEEE Transactions on Industrial Informatics ,2019. DOI: 10.1109/TII.2019.2936298

 Y. Liu, A. Liu, X. Liu and M. Ma, "A Trust-based Active Detection for Cyber-physical Security in Industrial Environments," in IEEE Transactions on Industrial Informatics, 2019. doi: 10.1109/TII.2019.2931394

 D. A. Noby and A. Khattab, "A Survey of Blockchain Applications in IoT Systems," 2019 14th International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt, 2019, pp. 83-87. DOI: 10.1109/ICCES48960.2019.9068170

 H. F. M. de Figueiredo, M. K. Ferst and G. W. Denardin, "An Overview About Detection of Cyber-Attacks on Power SCADA Systems," 2019 IEEE 15th Brazilian Power Electronics Conference and 5th IEEE Southern Power Electronics Conference (COBEP/SPEC), Santos, Brazil, 2019, pp. 1-6. DOI: 10.1109/COBEP/SPEC44138.2019.9065353

 D. Sun, G. Zhang and S. Gao, "Data Management across Geographically Distributed Autonomous Systems: Architecture, Implementation, and Performance Evaluation," 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Zhangjiajie, China, 2019, pp. 2284-2292. DOI: 10.1109/HPCC/SmartCity/DSS.2019.00317

 Henry Hui , Peter Maynard , Kieran McLaughlin, "ICS Interaction Testbed: A Platform for Cyber-Physical Security Research", in proc of 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR), September 2019. DOI: 10.14236/ewic/icscsr19.12

 A. Li et al., "BCRAM: A Social-Network-Inspired Breast Cancer Risk Assessment Model," in IEEE Transactions on Industrial Informatics, vol. 15, no. 1, pp. 366-376, Jan. 2019. doi: 10.1109/TII.2018.2825345

 L. Lu, H. J. Liu, H. Zhu and C. Chu, "Intrusion Detection in Distributed Frequency Control of Isolated Microgrids," in IEEE Transactions on Smart Grid, vol. 10, no. 6, pp. 6502-6515, Nov. 2019. doi: 10.1109/TSG.2019.2906573

 Yin, Xiaochun & Liu, Zeng & Nkenyereye, Lewis & Ndibanje, Bruce. (2019). Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach. Sensors. 19. 4952. 10.3390/s19224952.

 Hongwen Hui, Xingshuo An, Haoyu Wang, Weijia Ju, Huixuan Yang, Hongjie Gao, and Fuhong Lin, “Survey on Blockchain for Internet of Things”, Journal of Internet Services and Information Security (JISIS), 9(2): 1-30, May 2019, DOI: 10.22667/JISIS.2019.05.31.001

 Yong Chen, A Survey on Industrial Information Integration 2016-2019, in Journal of Industrial Integration and Management, DOI: 10.1142/S2424862219500167

Year 2018 : 14 citations

 P. M. Nasr and A. Yazdian-Varjani, "Toward Operator Access Management in SCADA System: Deontological Threat Mitigation," in IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3314-3324, Aug. 2018.
doi: 10.1109/TII.2017.2781285

 X. Li, C. Zhou, Y. Tian and Y. Qin, "A Dynamic Decision-Making Approach for Intrusion Response in Industrial Control Systems," in IEEE Transactions on Industrial Informatics, August 2018. doi: 10.1109/TII.2018.2866445

 Zeng P., Zhou P. (2018) Intrusion Detection in SCADA System: A Survey. In: Li K., Fei M., Du D., Yang Z., Yang D. (eds) Intelligent Computing and Internet of Things. ICSEE 2018, IMIOT 2018. Communications in Computer and Information Science, vol 924. Springer, Singapore. DOI: 10.1007/978-981-13-2384-3_32

 Ming Wan, Yan Song, Yuan Jing, and Junlu Wang, “Function-Aware Anomaly Detection Based on Wavelet Neural Network for Industrial Control Communication,” Security and Communication Networks, vol. 2018, Article ID 5103270, 11 pages, 2018. https://doi.org/10.1155/2018/5103270.

 Will Serrano."Deep Learning Cluster Structures for Management Decisions: The Digital CEO". Sensors. 18. 3327. DOI: 10.3390/s18103327. 2018.

 Amin Mansouri, Babak Majidi & Abdolah Shamisa (2018) Metaheuristic neural networks for anomaly recognition in industrial sensor networks with packet latency and jitter for smart infrastructures, International Journal of Computers and Applications, DOI: 10.1080/1206212X.2018.1533613

 Serrano W. (2019) The Cognitive Packet Network with QoS and Cybersecurity Deep Learning Clusters. In: Arai K., Kapoor S., Bhatia R. (eds) Intelligent Systems and Applications. IntelliSys 2018. Advances in Intelligent Systems and Computing, vol 868. Springer, Cham. Volume 1. 62-85. DOI: 10.1007/978-3-030-01054-6_5.

 Mohamed Najeh Lakhoua, "Cyber Security of SCADA Network in Thermal Power Plants", in Proc of Conference: 2018 International Conference on Smart Communications and Networking (SmartNets), November 2018. DOI: 10.1109/SMARTNETS.2018.8707398

 Weize Li, Lun Xie, and Zhiliang Wang, “A Novel Covert Agent for Stealthy Attacks on Industrial Control Systems Using Least Squares Support Vector Regression,” Journal of Electrical and Computer Engineering, vol. 2018, Article ID 7204939, 14 pages, 2018. doi:10.1155/2018/7204939

 Kim, Junsik, and Jaehyun Park. "FPGA-based network intrusion detection for IEC 61850-based industrial network." ICT Express (2018). DOI: 10.1016/j.icte.2018.01.002

 Shama N. Islam, M.A. Mahmud, A.M.T. Oo, Impact of optimal false data injection attacks on local energy trading in a residential microgrid, ICT Express, Available online 21 February 2018, ISSN 2405-9595, https://doi.org/10.1016/j.icte.2018.01.015.

 Li X., Wang G., Ali S., He Q. (2018) Android Malware Detection Using Category-Based Permission Vectors. In: Vaidya J., Li J. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science, vol 11337. Springer, Cham. DOI: 10.1007/978-3-030-05063-4_31

 J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an and H. Ye, "Significant Permission Identification for Machine-Learning-Based Android Malware Detection," in IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 3216-3225, July 2018.
doi: 10.1109/TII.2017.2789219

 Varun Mohta, Zhipeng Zhao, Michael Sylvester Pukish, "Real-time anomaly detection in a network using state transitions", Patent Grant US-10050987-B1. Publication date: 2018/08/14. Available at: https://patents.google.com/patent/US10050987B1/en

Year 2017 : 5 citations

 Yufei Liu, De-Chang Pi, and Cui Lin, Mining Community-level Influence in Microblogging Network: A Case Study on Sina Weibo, Hindawi/Wiley Complexity, Received 7 June 2017; Accepted 12 November 2017. Availablle at: https://www.hindawi.com/journals/complexity/aip/4783159/

 Q. Niyaz, W. Sun, A. Javaid, "A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)", EAI Endorsed Transactions on Security and Safety 17(12): e2, published on the 28 dez 2017. DOI: 10.4108/eai.28-12-2017.153515

 Mohamed Najeh, Lakhoua, "Review on SCADA Cybersecurity for Critical Infrastructures". Journal of Computer Science & Control Systems. May2017, Vol. 10 Issue 1, p15-18. 4p.

 Lamba, Anil & Singh, Satinderjeet & Singh, Balvinder & Dutta, Natasha & Sai, Sivakumar & Muni, Rela. (2017). MITIGATING CYBER SECURITY THREATS OF INDUSTRIAL CONTROL SYSTEMS (SCADA & DCS), International Journal For Technological Research In Engineering, Proc. of 3rd International Conference on Emerging Technologies in Engineering, Biomedical, Medical and Science(ETEBMS), July 2017. Available at: https://www.ijtre.com/images/scripts/16214.pdf

 Lei Yang, Fengjun Li, Securing Smart Grid In-Network Aggregation through False Data Detection, EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 17(10): e5, EAI, 2017, DOI: 10.4108/eai.1-2-2017.152156.