Now showing items 1-4 of 4
Exploiting SCADA vulnerabilities using a Human Interface Device
(The Science and InformationOrganization, 2015)
SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infrastructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic ...
SSH Honeypot: Building, Deploying and Analysis
(SAI Organisation, 2016-05)
This article is set to discuss the various techniques that can be used while developing a honeypot, of any form, while considering the advantages and disadvantages of these very different methods. The foremost aims are to ...
A novel intrusion detection system against spoofing attacks in connected electric vehicles
The Electric Vehicles (EVs) market has seen rapid growth recently despite the anxiety about driving range. Recent proposals have explored charging EVs on the move, using dynamic wireless charging that enables power exchange ...
Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study
In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of intrusion detection systems based on ...