Proceedings of the Third Central European Cybersecurity Conference 2019
DOI: 10.1145/3360664.3360669
|View full text |Cite
|
Sign up to set email alerts
|

Security in Process

Abstract: Due to the fourth industrial revolution, industrial applications make use of the progress in communication and embedded devices. This allows industrial users to increase efficiency and manageability while reducing cost and effort. Furthermore, the fourth industrial revolution, creating the so-called Industry 4.0, opens a variety of novel use and business cases in the industrial environment. However, this progress comes at the cost of an enlarged attack surface of industrial companies. Operational networks that… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…Matrix profiles are pattern discovery and anomaly detection algorithms. They do not require training before being used on a dataset and have few parameters to tune (Anton et al, 2019). Matrix profile algorithms create time windows for each time step of the dataset.…”
Section: Matrix Profilesmentioning
confidence: 99%
“…Matrix profiles are pattern discovery and anomaly detection algorithms. They do not require training before being used on a dataset and have few parameters to tune (Anton et al, 2019). Matrix profile algorithms create time windows for each time step of the dataset.…”
Section: Matrix Profilesmentioning
confidence: 99%