An IIoT Based ICS to Improve Safety Through Fast and Accurate Hazard Detection and Differentiation
@article{Moradbeikie2020AnIB, title={An IIoT Based ICS to Improve Safety Through Fast and Accurate Hazard Detection and Differentiation}, author={Azin Moradbeikie and K. Jamshidi and A. Bohlooli and J. Garcia and X. Masip-Bruin}, journal={IEEE Access}, year={2020}, volume={8}, pages={206942-206957} }
Safety and security of Industrial Control Systems (ICS) applied in many critical infrastructures is essential. In these systems, hazards can be due either to system failure or cyber-attacks factors. Accurate hazard detection and reducing reconfiguration time after hazard is one of the most important objectives in these systems. One of the procedures that can reduce the reconfiguration time is determining the cause of hazards and, based on the aforementioned factors, adopting the best commands… Expand
Figures and Tables from this paper
References
SHOWING 1-10 OF 40 REFERENCES
A Fog Based Approach for Hazards Differentiation in an IIoT Scenario
- Computer Science
- 2020 5th International Conference on Computer and Communication Systems (ICCCS)
- 2020
- 1
HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems
- Engineering, Computer Science
- CPS-SPC '16
- 2016
- 42
A Framework for Attack-Resilient Industrial Control Systems: Attack Detection and Controller Reconfiguration
- Engineering, Computer Science
- Proceedings of the IEEE
- 2018
- 39
- Highly Influential
- PDF
On-line failure prediction in safety-critical systems
- Computer Science
- Future Gener. Comput. Syst.
- 2015
- 34
Assessing and augmenting SCADA cyber security: A survey of techniques
- Computer Science
- Comput. Secur.
- 2017
- 82
- PDF
Cyber physical systems security: Analysis, challenges and solutions
- Computer Science
- Comput. Secur.
- 2017
- 147
- PDF
Extending the cyber-attack landscape for SCADA-based critical infrastructure
- Computer Science
- Int. J. Crit. Infrastructure Prot.
- 2019
- 4
- PDF
A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis
- Computer Science
- Comput. Secur.
- 2018
- 69
- PDF
A review of cyber security risk assessment methods for SCADA systems
- Computer Science
- Comput. Secur.
- 2016
- 287
- PDF