Buscar
Mostrando ítems 1-10 de 11
Implementation of a Reference Architecture for Cyber Physical Systems to support Condition Based Maintenance
(2018)
This paper presents the implementation of a refer-ence architecture for Cyber Physical Systems (CPS) to supportCondition Based Maintenance (CBM) of industrial assets. The article focuses on describing how the MANTIS ...
Software Defined Networking Opportunities for Intelligent Security Enhancement of Industrial Control Systems
(Springer International Publishing, 2017)
In the last years, cyber security of Industrial Control Systems (ICSs) has become an important issue due to the discovery of sophisticated malware that by attacking Critical Infrastructures, could cause catastrophic safety ...
A Mood Analysis on Youtube Comments and a Method for Improved Social Spam Detection
(Springer, 2018)
In the same manner that Online Social Networks (OSN) usage increases, non-legitimate campaigns over these types of web services are growing. This is the reason why signi cant number of users are affected by social spam ...
Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments
(IEEE, 2018)
Industrial environments have vastly changed sincethe conception of initial primitive and isolated networks. Thecurrent full interconnection paradigm, where connectivity be-tween different devices and the Internet has become ...
On the Feasibility of Distinguishing Between Process Disturbances and Intrusions in Process Control Systems using Multivariate Statistical Process Control
(IEEE, 2016)
Process Control Systems (PCSs) are the operat-ing core of Critical Infrastructures (CIs). As such, anomalydetection has been an active research field to ensure CInormal operation. Previous ...
Aleatorización de direcciones IP para mitigar ataques de reconocimiento de forma proactiva en sistemas de control industrial
(Tecnalia. Incibe, 2022)
Los sistemas de control industrial se utilizan en una gran variedad de procesos físicos, incluidas las infraestructuras críticas, convirtiéndose en el principal objetivo de múltiples ataques de seguridad. Un ataque ...
Estudio de modelado de perifericos para habilitar emulaciones de firmware embebido
(Tecnalia. Incibe, 2022)
Los sistemas embebidos aumentan cada vez más en número y con ello también lo hacen los ataques dirigidos a estos. Uno de los factores clave para reducir la superficie de ataque es descubrir y corregir vulnerabilidades en ...
Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting
(SCITEPRESS, 2016)
Industrial Control Systems are the set of specialized elements that monitor and control physical processes. Those systems are normally interconnected forming environments known as industrial networks. The particularities ...
How to Quantify the Security Level of Embedded Systems? A Taxonomy of Security Metrics
(IEEE, 2020)
Embedded Systems (ES) development has been historically focused on functionality rather than security, and today it still applies in many sectors and applications. However, there is an increasing number of security threats ...
Latentziarik gabeko sareko identifikatzaileen aleatorizazioa kontrol industrialerako sistemetan proaktiboki errekonozimendu erasoak mitigatzeko
(UEU, 2023)
Kontrol industrialerako sistemak askotariko instalazio industrialetan erabiltzen dira, azpiegitura kritikoetan barne, segurtasun-eraso anitzen helburu nagusi bihurtuz. Sare industrialen konfigurazio eta topologia estatikoek, ...