Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems
Abstract
References
Index Terms
- Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems
Recommendations
How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data
EICC '21: Proceedings of the 2021 European Interdisciplinary Cybersecurity ConferenceThe protection of industrial control systems (ICS) is crucial for a robust provision of essential services for the modern society. Stealthy and steganographic attacks are a considerable threat against the reliability and security of such ICS. Several ...
Utilizing Machine Learning Approaches for Anomaly Detection in Industrial Control Systems
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine IntelligenceIndustrial Control Systems (ICS) are of utmost importance in the functioning of infrastructure and manufacturing operations. The identification of anomalies within these systems holds significant importance in maintaining operational efficiency and ...
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 67Total Downloads
- Downloads (Last 12 months)9
- Downloads (Last 6 weeks)1
Other Metrics
Citations
Cited By
View allView Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format