In recent years, several schemes have been proposed to detect anomalies and attacks on Cyber-Physical Systems (CPSs) such as Industrial Control Systems (ICSs). Based on the analysis of sensor data, unexpected or malicious behavior is detected. Those schemes often rely on (implicit) assumptions on temporally stable sensor data distributions and invariants between process values. Unfortunately, the proposed schemes often perform not optimally with Recall scores lower than 70% (e.g., missing 3 alarms every 10 anomalies) for some ICS datasets, with unclear root issues. In this work, we propose a general framework to check whether a given ICS dataset has specific properties (stable sensor distributions in normal operations, potentially state-dep...
Industrial Control Systems (ICSs) were initially designed to be operated in an isolated network. How...
Cyberattacks on cyber-physical systems (CPS) can lead to severe consequences, and therefore it is ex...
This is an accepted manuscript of an article published by IEEE in IEEE Internet of Things Journal on...
Industrial control systems (ICS) are moving from dedicated communications to switched and routed cor...
This paper presents a novel methodology based on first principles of statistics and statistical lear...
With the rise of advanced persistent threats to cyber-physical facilities, new methods for anomaly d...
Anomaly detection has been known as an effective technique to detect faults or cyber-attacks in indu...
Over the past few decades, Industrial Control Systems (ICS) have been targeted by cyberattacks and a...
A variety of Intrusion Detection Systems (IDSs) for Industrial Control Systems have been proposed to...
Industrial control systems (ICSs) are integral parts of smart cities and critical to modern societie...
We seek to detect statistically significant temporal or spatial changes in either the underlying pro...
In the old generation of industrial control systems (ICSs), their sub-components communicated within...
As critical infrastructure increasingly relies on Industrial Control Systems (ICS), these systems ha...
The cyber-physical security of Industrial Control Systems (ICSs) represents an actual and worthwhile...
This study evaluates Behavioral Anomaly Detection Tools used in an Industrial Control System environ...
Industrial Control Systems (ICSs) were initially designed to be operated in an isolated network. How...
Cyberattacks on cyber-physical systems (CPS) can lead to severe consequences, and therefore it is ex...
This is an accepted manuscript of an article published by IEEE in IEEE Internet of Things Journal on...
Industrial control systems (ICS) are moving from dedicated communications to switched and routed cor...
This paper presents a novel methodology based on first principles of statistics and statistical lear...
With the rise of advanced persistent threats to cyber-physical facilities, new methods for anomaly d...
Anomaly detection has been known as an effective technique to detect faults or cyber-attacks in indu...
Over the past few decades, Industrial Control Systems (ICS) have been targeted by cyberattacks and a...
A variety of Intrusion Detection Systems (IDSs) for Industrial Control Systems have been proposed to...
Industrial control systems (ICSs) are integral parts of smart cities and critical to modern societie...
We seek to detect statistically significant temporal or spatial changes in either the underlying pro...
In the old generation of industrial control systems (ICSs), their sub-components communicated within...
As critical infrastructure increasingly relies on Industrial Control Systems (ICS), these systems ha...
The cyber-physical security of Industrial Control Systems (ICSs) represents an actual and worthwhile...
This study evaluates Behavioral Anomaly Detection Tools used in an Industrial Control System environ...
Industrial Control Systems (ICSs) were initially designed to be operated in an isolated network. How...
Cyberattacks on cyber-physical systems (CPS) can lead to severe consequences, and therefore it is ex...
This is an accepted manuscript of an article published by IEEE in IEEE Internet of Things Journal on...