Downloads provided by UsageCounts
ICS were designed with automation reliability in mind and most communication technologies were proprietary with no compatibility with TCP/IP Stack. Nowadays most devices have connectivity features inheriting attacks that do not require physical access to plant or systems and organizations are dedicating resources to protect their assets converging physical, logical and IT resources. Task 5.5 objective is to detect known and unknown threats to ICS systems affecting integrated sensors or actuators and SCADA systems by monitoring and learning from its normal behaviour and giving the ICS operators the ability to detect advanced attacks and anomalies before they can cause damage or spread inside the network. Machine Learning techniques and custom attacks were developed for those purposes in order to identify attack patterns and unwanted behaviour before they can interact with sensors/actuators or spoof SCADA reporting messages for removing visibility of the threat to the operator.
RTAD, STOPIT
RTAD, STOPIT
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 2 | |
| downloads | 1 |

Views provided by UsageCounts
Downloads provided by UsageCounts