2017
DOI: 10.1109/msp.2017.4251102
|View full text |Cite
|
Sign up to set email alerts
|

Programmable Logic Controller Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
26
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 69 publications
(27 citation statements)
references
References 10 publications
0
26
0
1
Order By: Relevance
“…Similarly, Wu et al [7] discussed a SCADA digital forensic process consisting of seven steps and Eden et al [8] discussed a SCADA forensic incident response model. A few other perspectives include works like Ahmed et al [9] discussing programmable logic controller (PLC) forensics. Many works [10][11][12][13][14] explain the different types of cyber-attacks, testbeds and potential vulnerability in a digital substation in smart grids, however, they seldom discuss anything related to digital forensic investigations.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, Wu et al [7] discussed a SCADA digital forensic process consisting of seven steps and Eden et al [8] discussed a SCADA forensic incident response model. A few other perspectives include works like Ahmed et al [9] discussing programmable logic controller (PLC) forensics. Many works [10][11][12][13][14] explain the different types of cyber-attacks, testbeds and potential vulnerability in a digital substation in smart grids, however, they seldom discuss anything related to digital forensic investigations.…”
Section: Related Workmentioning
confidence: 99%
“…PLCs are rapidly being connected to the internet, other corporate networks, and wireless Internet Protocol (IP) through Transmission Control Protocol/Internet Protocol (TCP/IP) in order to improve performance and efficiency [6]- [8]. Again, because of their distinctive architecture and proprietary operating systems, PLCs make it challenging to apply classic methodologies and modern technologies for detecting aberrant activities [9]. Given the foregoing, it is imperative to defend PLCs against various kind of attack or anomaly, including hardware malfunction, insiders' unintentional activities, and malicious intruders.…”
Section: Introductionmentioning
confidence: 99%
“…From the industry background, under the wave of big data, internet users' demand for information is guaranteed to a certain extent, but the increasing volume of data makes it difficult to filter information. Recommender systems can mine users' preferences and needs based on their interest classification tags, historical behavior records and other user registration information, and then provide users with personalized recommendation services, which can alleviate the information overload problem to a certain extent [1,2]. A recommender system is essentially an information filtering system, which consists of three main subjects: recommendation target, recommendation model and recommendation object, where the recommendation target and recommendation object refer to the user and the item, respectively, and the recommendation model is to realize the matching of the item characteristics with the user model.…”
Section: Introductionmentioning
confidence: 99%