Utility networks are becoming more and more interconnected. Besides the natural physical interdependencies (e.g., water networks heavily depend on power grids, etc.), utility networks are nowadays often monitored and operated by industrial control systems (ICS). While these systems enhance the level of control over utility networks, they also enable new forms of attacks, such as cyberattacks. During the last years, cyberattacks have occurred more frequently with sometimes a significant impact on the company as well as the society. The first step toward preventing such incidents is to understand how an infection of one component influences the rest of the network. This malware spreading can be modeled as a stochastic process on a graph where...
Despite a significant increase in security of modern information systems, cyber attacks have become ...
Abstract. One of the popular models to describe computer worm propagation is the Susceptible-Infecte...
A key emerging and popular communication paradigm, primarily employed for information dissem-ination...
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solut...
The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communica...
In this paper we present analytical techniques that can be used to better understand the behavior of...
Abstract: The current generation of network vulnerability detection software uses databases of known...
Malware is pervasive in networks, and poses a critical threat to network security. However, we have ...
Malicious softwares or malwares for short have become a major security threat. While origi-nating in...
The purpose of this article is to extend related research on the spread of malware in networks and t...
Malware is inescapable in systems, and represents a basic risk to network security. Be that as it ma...
Cyber-Physical Systems (CPS), such as Water Distribution Networks (WDNs), deploy digital devices to ...
Abstract—Malware is pervasive in networks, and poses a critical threat to network security. However,...
This paper proposes a simulation model of cyber threats for energy meters in a secondary distributio...
Our research is an exploratory study on how various parameters in the attack, ranging from that of t...
Despite a significant increase in security of modern information systems, cyber attacks have become ...
Abstract. One of the popular models to describe computer worm propagation is the Susceptible-Infecte...
A key emerging and popular communication paradigm, primarily employed for information dissem-ination...
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solut...
The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communica...
In this paper we present analytical techniques that can be used to better understand the behavior of...
Abstract: The current generation of network vulnerability detection software uses databases of known...
Malware is pervasive in networks, and poses a critical threat to network security. However, we have ...
Malicious softwares or malwares for short have become a major security threat. While origi-nating in...
The purpose of this article is to extend related research on the spread of malware in networks and t...
Malware is inescapable in systems, and represents a basic risk to network security. Be that as it ma...
Cyber-Physical Systems (CPS), such as Water Distribution Networks (WDNs), deploy digital devices to ...
Abstract—Malware is pervasive in networks, and poses a critical threat to network security. However,...
This paper proposes a simulation model of cyber threats for energy meters in a secondary distributio...
Our research is an exploratory study on how various parameters in the attack, ranging from that of t...
Despite a significant increase in security of modern information systems, cyber attacks have become ...
Abstract. One of the popular models to describe computer worm propagation is the Susceptible-Infecte...
A key emerging and popular communication paradigm, primarily employed for information dissem-ination...