UP - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3
hits: 27
1.
  • Anomaly detection for indus... Anomaly detection for industrial control systems using process mining
    Myers, David; Suriadi, Suriadi; Radke, Kenneth ... Computers & security, 09/2018, Volume: 78
    Journal Article
    Peer reviewed
    Open access

    Industrial control systems (ICS) are moving from dedicated communications to switched and routed corporate networks, exposing them to the Internet and placing them at risk of cyber-attacks. Existing ...
Full text

PDF
2.
  • A Survey and Analysis of th... A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures
    Schmidt, Desmond; Radke, Kenneth; Camtepe, Seyit ... ACM computing surveys, 05/2016, Volume: 48, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Detection and prevention of global navigation satellite system (GNSS) "spoofing" attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research ...
Full text

PDF
3.
  • Extending the cyber-attack ... Extending the cyber-attack landscape for SCADA-based critical infrastructure
    Rodofile, Nicholas R.; Radke, Kenneth; Foo, Ernest International journal of critical infrastructure protection, June 2019, 2019-06-00, Volume: 25
    Journal Article
    Peer reviewed

    The move from point-to-point serial communication to traditional information technology (IT) networks has created new challenges in providing cyber-security for supervisory control and data ...
Full text

PDF
4.
Full text
5.
  • Applying domain-specific kn... Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols
    Lahza, Hassan; Radke, Kenneth; Foo, Ernest International journal of critical infrastructure protection, March 2018, 2018-03-00, Volume: 20
    Journal Article
    Peer reviewed
    Open access

    Electric substation automation systems based on the IEC 61850 standard predominantly employ the GOOSE and MMS protocols. Because GOOSE and MMS messages are not encrypted, an attacker can observe ...
Full text

PDF
6.
  • Machine learning in industr... Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
    Koay, Abigail M. Y.; Ko, Ryan K. L; Hettema, Hinne ... Journal of intelligent information systems, 04/2023, Volume: 60, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    The advent of Industry 4.0 has led to a rapid increase in cyber attacks on industrial systems and processes, particularly on Industrial Control Systems (ICS). These systems are increasingly becoming ...
Full text
7.
  • CHURNs: Freshness Assurance... CHURNs: Freshness Assurance for Humans
    Radke, Kenneth; Boyd, Colin; Nieto, Juan Gonzalez ... Computer journal, 10/2015, Volume: 58, Issue: 10
    Journal Article
    Peer reviewed

    We present CHURNs, a method for providing freshness and authentication assurances to human users. In computer-to-computer protocols, it has long been accepted that assurances of freshness such as ...
Full text

PDF
8.
Full text

PDF
9.
Full text

PDF
10.
Full text

PDF
1 2 3
hits: 27

Load filters