2016
DOI: 10.1007/978-3-319-45378-1_31
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security of the Application Layer of Mission Critical Industrial Systems

Abstract: Part 5: Scheduling in Manufacturing and Other ApplicationsInternational audienceIn this paper we focus on proposing the effective methods of cyber protection of the application layer. We also discuss how this challenge is related to mission critical industrial and manufacturing systems. In this paper we propose two step HTTP request analysis method that engages request segmentation, statistical analysis of the extracted content and machine learning on the imbalanced data. In this work, we particularly addresse… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

1
0
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 23 publications
1
0
0
Order By: Relevance
“…In addition, low quality of code significantly impacts the overall cost of the software development, deployment, and further maintenance (Jones and Bonsignour 2011). Software flaws and bugs can impact not only its usability, functional value, and user experience, but also security of users, due to the fact that bugs in the design or implementation phase can be exploited by cyber criminals (Kozik et al 2016). According to study (Telegraph 2015), consequences of cyber attacks cost about £18 billion per year to British companies in terms of lost revenues.…”
Section: Context and Related Worksupporting
confidence: 37%
“…In addition, low quality of code significantly impacts the overall cost of the software development, deployment, and further maintenance (Jones and Bonsignour 2011). Software flaws and bugs can impact not only its usability, functional value, and user experience, but also security of users, due to the fact that bugs in the design or implementation phase can be exploited by cyber criminals (Kozik et al 2016). According to study (Telegraph 2015), consequences of cyber attacks cost about £18 billion per year to British companies in terms of lost revenues.…”
Section: Context and Related Worksupporting
confidence: 37%