![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Adoption and Assessment of Machine Learning Algorithms in Security Operations Centre for Critical Infrastructure
Perception of establishing a Security Operations Centre (SOC) depends on the criticality of information assurance and security operations in response to the ever-changing security threat landscape and adoption...
-
Chapter and Conference Paper
Critical Infrastructure Asset Discovery and Monitoring for Cyber Security
With ever growing cyber threats on critical infrastructures, need of deploying the security measures to protect these should be of utmost priority. However, without knowing about the assets in the network and ...
-
Chapter and Conference Paper
Impact Analysis of Attacks Using Agent-Based SCADA Testbed
Supervisory Control and Data Acquisition (SCADA) systems are used to control and monitor the critical infrastructure such as electricity, gas, water. SCADA system networks are originally started as local contr...
-
Chapter and Conference Paper
Analysis of Communication Channel Attacks on Control Systems—SCADA in Power Sector
Usage of open standard protocols such as IEC 60870-5-101/104 in supervisory control and data acquisition (SCADA) systems which are not provided with security features leaves vulnerabilities for the attacker. A...