2022
DOI: 10.1109/jiot.2022.3144127
|View full text |Cite
|
Sign up to set email alerts
|

Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems

Abstract: How to cite:Please refer to published version for the most recent bibliographic citation information.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 71 publications
0
2
0
Order By: Relevance
“…The motivation for this study is anchored in the escalating threats in the realm of ICSs, where the increasing sophistication of cyber-attacks and the unique vulnerabilities of these systems necessitate a more focused and specialised approach to security validation. The MITRE ATT&CK Framework, adapted to address the specific challenges faced by ICS, has offered a structured approach to ICS security, yet its practical application in real-world settings remains underexplored and holds significant potential for advancing ICS security practices [5]. A key driver for this work is the gap in the current literature regarding the practical application of security validation methodologies in ICSs.…”
Section: Motivationmentioning
confidence: 99%
“…The motivation for this study is anchored in the escalating threats in the realm of ICSs, where the increasing sophistication of cyber-attacks and the unique vulnerabilities of these systems necessitate a more focused and specialised approach to security validation. The MITRE ATT&CK Framework, adapted to address the specific challenges faced by ICS, has offered a structured approach to ICS security, yet its practical application in real-world settings remains underexplored and holds significant potential for advancing ICS security practices [5]. A key driver for this work is the gap in the current literature regarding the practical application of security validation methodologies in ICSs.…”
Section: Motivationmentioning
confidence: 99%
“…The Fourth Industrial Revolution allowed the expansion of the widespread introduction of robots and automation [1][2][3] . The efficiency of agricultural and industrial production has significantly increased [4][5][6], educational technologies and means of access to information resources have changed dramatically [7][8][9]. However, unfortunately, in recent years the problem of the socalled "human factor" [10][11][12] has become increasingly apparent.…”
Section: Introductionmentioning
confidence: 99%