2017
DOI: 10.1007/978-3-319-71368-7_29
|View full text |Cite
|
Sign up to set email alerts
|

Securing SCADA Critical Network Against Internal and External Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…In spite of advanced research on insider threats, challenges in validating and refining the detection models remain due to the absence of real-world data from organizations [13,139,196]. The lack of actual insider threat data is also a major challenge in assessing and developing insider threat…”
Section: Lack Of Real Datamentioning
confidence: 99%
See 1 more Smart Citation
“…In spite of advanced research on insider threats, challenges in validating and refining the detection models remain due to the absence of real-world data from organizations [13,139,196]. The lack of actual insider threat data is also a major challenge in assessing and developing insider threat…”
Section: Lack Of Real Datamentioning
confidence: 99%
“…Supervisory control and data acquisition systems (SCADA) constitute the critical infrastructures' sensitive parts. Each successful malicious incident could cause huge damages on materials economic and human [196]. Operators play an important role in SCADA systems, and their commands can have high impacts on the reliability of critical infrastructures.…”
Section: Insider Threats In Scadamentioning
confidence: 99%