Bibliographical review on cyber attacks from a control oriented perspective
نویسندگان
چکیده
منابع مشابه
Industrial Control System Cyber Attacks
This paper presents a set of attacks against SCADA control systems. The attacks are grouped into 4 classes; reconnaissance, response and measurement injection, command injection and denial of service. The 4 classes are defined and each attack is described in detail. The response and measurement injection and command injection classes are subdivided into sub-classes based on attack complexity. E...
متن کاملSCADA Cyber Attacks and Security Vulnerabilities: Review
SCADA plays a vital role in critical infrastructures. As the modern IT technology become very advanced, the threat on industrial control system (ICS) and SCADA security become a big concern of every critical infrastructures operator. With the recent cyber-attacks, the urge to secure the critical infrastructure is a big issue especially for those countries that uses critical infrastructures. In ...
متن کاملBibliographical review on reconfigurable fault-tolerant control systems
In this paper, a bibliographical review on reconfigurable (active) fault-tolerant control systems (FTCS) is presented. The existing approaches to fault detection and diagnosis (FDD) and fault-tolerant control (FTC) in a general framework of active fault-tolerant control systems (AFTCS) are considered and classified according to different criteria such as design methodologies and applications. A...
متن کاملMesotherapy: a bibliographical review.
Intradermotherapy is a medical procedure introduced by Pistor in 1958 that consists in the application of intradermal injections of diluted pharmacological substances that are given directly into the region to be treated. There are reports of the use of intradermotherapy to treat painful diseases, skin diseases and unaesthetic conditions. Medical clinics have been recently offering the treatmen...
متن کاملAttribution Of Cyber Attacks On Process Control Systems
The attribution of cyber attacks is an important problem. Attribution gives critical infrastructure asset owners and operators legal recourse in the event of attacks and deters potential attacks. This paper discusses attribution techniques along with the associated legal and technical challenges. It presents a proposal for a voluntary network of attributable activity, an important first step to...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Annual Reviews in Control
سال: 2019
ISSN: 1367-5788
DOI: 10.1016/j.arcontrol.2019.08.002