This paper presents an anomaly-based methodology for reliable detection of integrity attacks in cyber-physical critical infrastructures. Such malicious events compromise the smooth operation of the infrastructure while the attacker is able to exploit the respective resources according to his/her purposes. Even though the operator may not understand the attack, since the overall system appears to remain in a steady state, the consequences may be of catastrophic nature with a huge negative impact. Here, we apply a computational intelligent technique which incorporates the merits of two of the heterogeneous modeling approaches (linear time-invariant and neural networks), while considering both temporal and functional dependencies existing amon...
The increase in the use of ICT in critical infrastructures has meant that dependence on automation a...
Abstract This paper addresses a set-theoretic method for the detection of data corruption cyber-atta...
The dramatic increase in the use of Information and Communication Technologies (ICT) within Networke...
This paper presents an anomaly-based methodology for reliable detection of integrity attacks in cybe...
The thematics focusing on inserting intelligence in cyber-physical critical infrastructures (CI) hav...
The explosive growth of the Internet has introduced advanced services facilitating our every day lif...
The thematics focusing on inserting intelligence in cyber-physical critical infrastructures (CI) hav...
Future power networks will be characterized by safe and reliable functionality against physical malf...
In this paper we study the case of Critical Infrastructures (CIs), and especially power grid systems...
Modern society depends on the smooth functioning of critical infrastructures which provide services ...
The digital transformation of power systems has introduced a new challenge for robustness: cyber sec...
Abstract — Future power networks will be characterized by safe and reliable functionality against ph...
europa.eu Abstract. The explosive growth of the Internet has introduced ad-vanced services facilitat...
a b s t r a c t Modern society depends on the smooth functioning of critical infrastructures which p...
The increase in the use of ICT in critical infrastructures has meant that dependence on automation a...
Abstract This paper addresses a set-theoretic method for the detection of data corruption cyber-atta...
The dramatic increase in the use of Information and Communication Technologies (ICT) within Networke...
This paper presents an anomaly-based methodology for reliable detection of integrity attacks in cybe...
The thematics focusing on inserting intelligence in cyber-physical critical infrastructures (CI) hav...
The explosive growth of the Internet has introduced advanced services facilitating our every day lif...
The thematics focusing on inserting intelligence in cyber-physical critical infrastructures (CI) hav...
Future power networks will be characterized by safe and reliable functionality against physical malf...
In this paper we study the case of Critical Infrastructures (CIs), and especially power grid systems...
Modern society depends on the smooth functioning of critical infrastructures which provide services ...
The digital transformation of power systems has introduced a new challenge for robustness: cyber sec...
Abstract — Future power networks will be characterized by safe and reliable functionality against ph...
europa.eu Abstract. The explosive growth of the Internet has introduced ad-vanced services facilitat...
a b s t r a c t Modern society depends on the smooth functioning of critical infrastructures which p...
The increase in the use of ICT in critical infrastructures has meant that dependence on automation a...
Abstract This paper addresses a set-theoretic method for the detection of data corruption cyber-atta...
The dramatic increase in the use of Information and Communication Technologies (ICT) within Networke...