Academic literature on the topic 'ICS malware'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ICS malware.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "ICS malware"
Myung, Jin-woo, and Sunghyuck Hong. "ICS malware Triton attack and countermeasures." IJEMR 3, no. 2 (2019): 13–17. http://dx.doi.org/10.22662/ijemr.2019.3.2.013.
Full textCamargo, Otávio Augusto Maciel, Julio Cesar Duarte, Anderson Fernandes Pereira Dos Santos, and Cesar Augusto Borges. "A Review of Testbeds on SCADA Systems with Malware Analysis." Revista de Informática Teórica e Aplicada 29, no. 2 (2022): 84–94. http://dx.doi.org/10.22456/2175-2745.112813.
Full textMiraglia, Armando, and Matteo Casenove. "Fight fire with fire: the ultimate active defence." Information & Computer Security 24, no. 3 (2016): 288–96. http://dx.doi.org/10.1108/ics-01-2015-0004.
Full textHuang, Yuchen, Jingwen Liu, Xuanyi Xiang, et al. "Malware Identification Method in Industrial Control Systems Based on Opcode2vec and CVAE-GAN." Sensors 24, no. 17 (2024): 5518. http://dx.doi.org/10.3390/s24175518.
Full textTari Yvonne Elete. "Impact of ransomware on industrial control systems in the oil and gas sector: Security challenges and strategic mitigations." Computer Science & IT Research Journal 5, no. 12 (2024): 2664–81. https://doi.org/10.51594/csitrj.v5i12.1759.
Full textZhao, Jianming, Ziwen Jin, Peng Zeng, Chuan Sheng, and Tianyu Wang. "An Anomaly Detection Method for Oilfield Industrial Control Systems Fine-Tuned Using the Llama3 Model." Applied Sciences 14, no. 20 (2024): 9169. http://dx.doi.org/10.3390/app14209169.
Full textKirishikesan, Kannan, Gayakantha Jayakody, Ayesh Hallawaarachchi, and Chandana Gamage. "A High-interaction Physics-aware ICS Honeypot for Industrial Environments." International Journal on Advances in ICT for Emerging Regions (ICTer) 16, no. 2 (2023): 31–39. http://dx.doi.org/10.4038/icter.v16i2.7265.
Full textBajwa, Ammar, Aleem Al Razee Tonoy, Sohel Rana, and Ishtiaque Ahmed. "CYBERSECURITY IN INDUSTRIAL CONTROL SYSTEMS: A SYSTEMATIC LITERATURE REVIEW ON AI-BASED THREAT DETECTION FOR SCADA AND IOT NETWORKS." ASRC Procedia: Global Perspectives in Science and Scholarship 01, no. 01 (2025): 01–15. https://doi.org/10.63125/1cr1kj17.
Full textGokhale, Sheetal, Ashwini Dalvi, and Irfan Siddavatam. "Industrial Control Systems Honeypot: A Formal Analysis of Conpot." International Journal of Computer Network and Information Security 12, no. 6 (2020): 44–56. http://dx.doi.org/10.5815/ijcnis.2020.06.04.
Full textJain, Kratika. "Cybersecurity in Industrial Control Systems: Strategies for Protecting Critical Infrastructure." International Journal of Research in Modern Engineering & Emerging Technology 10, no. 11 (2022): 25–32. https://doi.org/10.63345/ijrmeet.org.v10.i11.4.
Full textDissertations / Theses on the topic "ICS malware"
Eriksson, Alma, and Oskar Lindh. "Modellering av en cyberattack på ett industriellt säkerhetssystem." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295620.
Full textElish, Karim Omar Mahmoud. "User-Intention Based Program Analysis for Android Security." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/54943.
Full textBook chapters on the topic "ICS malware"
Cardwell, Kevin. "Analyzing Encoding, Obfuscated, and ICS Malware Traffic." In Tactical Wireshark. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9291-4_9.
Full textMekdad, Yassine, Giuseppe Bernieri, Mauro Conti, and Abdeslam El Fergougui. "The Rise of ICS Malware: A Comparative Analysis." In Computer Security. ESORICS 2021 International Workshops. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_29.
Full textHole, Kjell Jørgen. "Robustness to Malware Spreading." In Anti-fragile ICT Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30070-2_8.
Full textHole, Kjell Jørgen. "Robustness to Malware Reinfections." In Anti-fragile ICT Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30070-2_9.
Full textHole, Kjell Jørgen. "Anti-fragility to Malware Spreading." In Anti-fragile ICT Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30070-2_10.
Full textRathore, Hemant, Praneeth B, Sundaraja Sitharama Iyengar, and Sanjay K. Sahay. "Breaking the Anti-malware: EvoAAttack Based on Genetic Algorithm Against Android Malware Detection Systems." In Computational Science – ICCS 2023. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-36030-5_43.
Full textSehrawat, Navdeep, Piyush Shandilya, Prajjwal Kumar, and Rahul Gupta. "Malware Family Classification Using Music Information Retrieval Techniques." In ICT with Intelligent Applications. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3571-8_23.
Full textNandanwar, Adarsh, Hemant Rathore, Sanjay K. Sahay, and Mohit Sewak. "RL-MAGE: Strengthening Malware Detectors Against Smart Adversaries." In Computational Science – ICCS 2023. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-36021-3_6.
Full textPeiser, Stefan Carl, Ludwig Friborg, and Riccardo Scandariato. "JavaScript Malware Detection Using Locality Sensitive Hashing." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2_10.
Full textHăjmăşan, Gheorghe, Alexandra Mondoc, Radu Portase, and Octavian Creţ. "Evasive Malware Detection Using Groups of Processes." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0_3.
Full textConference papers on the topic "ICS malware"
Al Balawi, Mohammad, Mohammad Alnabhan, and Mohammed S. Atoum. "Generative AI for Advanced Malware Detection." In 2024 4th Intelligent Cybersecurity Conference (ICSC). IEEE, 2024. https://doi.org/10.1109/icsc63108.2024.10895965.
Full textKumar, Sanjeev, Yudhishthira Sapru, Sugandha Sapru, and B. Janet. "Intelligent Malware Detection Using Sentence Transformer and Hybrid Deep Learning Architecture." In 2025 10th International Conference on Signal Processing and Communication (ICSC). IEEE, 2025. https://doi.org/10.1109/icsc64553.2025.10968099.
Full textEl ghabri, Nadia, Elmostafa Belmekki, and Mostafa Bellafkih. "Pre-Trained Deep Learning Models for Malware Image Based Classification and Detection." In 2024 Sixth International Conference on Intelligent Computing in Data Sciences (ICDS). IEEE, 2024. http://dx.doi.org/10.1109/icds62089.2024.10756501.
Full textMekdad, Yassine, Giuseppe Bernieri, Mauro Conti, and Abdeslam El Fergougui. "A threat model method for ICS malware." In CF '21: Computing Frontiers Conference. ACM, 2021. http://dx.doi.org/10.1145/3457388.3458868.
Full textHung, Shih-Hao, Chia-Heng Tu, and Chi Wei Yeh. "A Cloud-Assisted Malware Detection Framework for Mobile Devices." In 2016 International Computer Symposium (ICS). IEEE, 2016. http://dx.doi.org/10.1109/ics.2016.0112.
Full textSchoinianakis, Dimitrios, Norbert Goetze, and Gerald Lehmann. "MDiET: Malware Detection in Encrypted Traffic." In 6th International Symposium for ICS & SCADA Cyber Security Research 2019. BCS Learning & Development, 2019. http://dx.doi.org/10.14236/ewic/icscsr19.4.
Full textHalvorsen, James, and Julian L. Rrushi. "Target Discovery Differentials for 0-Knowledge Detection of ICS Malware." In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2017. http://dx.doi.org/10.1109/dasc-picom-datacom-cyberscitec.2017.99.
Full textSuciu, George, Cristiana-Ioana Istrate, Ruxandra Ioana Răducanu, Maria-Cristina Diţu, Octavian Fratu, and Alexandru Vulpe. "Mobile devices forensic platform for malware detection." In 6th International Symposium for ICS & SCADA Cyber Security Research 2019. BCS Learning & Development, 2019. http://dx.doi.org/10.14236/ewic/icscsr19.8.
Full textChen, Yi-Ming, An-Chi He, Guo-Chung Chen, and Yu-Chi Liu. "Android malware detection system integrating block feature extraction and multi-head attention mechanism." In 2020 International Computer Symposium (ICS). IEEE, 2020. http://dx.doi.org/10.1109/ics51289.2020.00087.
Full textKhan, Rafiullah, Peter Maynard, Kieran McLaughlin, David M. Laverty, and Sakir Sezer. "Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid." In 4th International Symposium for ICS & SCADA Cyber Security Research 2016. BCS Learning & Development, 2016. http://dx.doi.org/10.14236/ewic/ics2016.7.
Full text