73
Views
2
CrossRef citations to date
0
Altmetric
Articles

A review of model on malware detection and protection for the distributed control systems (Industrial control systems) in oil & gas sectors

&

References

  • Byres, E., & Lowe, J. The myths and facts behind cyber security risks for industrial control systems. In Proceedings of the VDE Kongress (Vol. 116, pp. 213-218) (2004, October).
  • Mäkitie, T., Normann, H. E., Thune, T. M., & Gonzalez, J. S. The green flings: Norwegian oil and gas industry’s engagement in offshore wind power. Energy Policy, 127, 269-279 (2018). doi: 10.1016/j.enpol.2018.12.015
  • Ray, P. D., Harnoor, R., & Hentea, M. Smart power grid security: A unified risk management approach. In 44th Annual 2010 IEEE International Carnahan Conference on Security Technology (pp. 276-285). IEEE (2010, October).
  • Naedele, M. Standardizing industrial IT security-a first look at the IEC approach. In Emerging Technologies and Factory Automation, 2005. ETFA 2005. 10th IEEE Conference on (Vol. 2, pp. 7-pp). IEEE (2005, September).
  • Chow, M. Y., & Tipsuwan, Y. Network-based control systems: A tutorial .In Industrial Electronics Society, 2001. IECON’01. The 27th Annual Conference of the IEEE (Vol. 3, pp. 1593-1602). IEEE (2001, November).
  • Cárdenas, A. A., Amin, S., Lin, Z. S., Huang, Y. L., Huang, C. Y., & Sastry, S. Attacks against process control systems: risk assessment, detection, and response. In Proceedings of the 6th ACM symposium on information, computer and communications security (pp. 355–366). ACM (2011, March).
  • Hadžiosmanović, D., Sommer, R., Zambon, E., & Hartel, P. H. Through the eye of the PLC: semantic security monitoring for industrial processes. In Proceedings of the 30th Annual Computer Security Applications Conference (pp. 126-135). ACM (2014, December).
  • Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., & Sastry, S. Challenges for securing cyber physical systems. In Workshop on future directions in cyber-physical systems security (Vol. 5). (2009, July)
  • Stouffer, K., Falco, J., & Scarfone, K. Guide to industrial control systems (ICS) security. NIST special publication, 800(82), 16-16. (2011)
  • McLaughlin, S., Konstantinou, C., Wang, X., Davi, L., Sadeghi, A. R., Maniatakos, M., & Karri, R. The cybersecurity landscape in industrial control systems. Proceedings of the IEEE, 104(5), 1039-1057 (2016). doi: 10.1109/JPROC.2015.2512235
  • Kaur, G., Dhir, R., & Singh, M. A stress testing web-based framework for automated malware analysis. Journal of Information and Optimization Sciences, 38(6), 937-944 (2017). doi: 10.1080/02522667.2017.1372139
  • Jain, V., Chaudhary, G., Luthra, N., Rao, A., & Walia, S. Dynamic handwritten signature and machine learning based identity verification for keyless cryptocurrency transactions. Journal of Discrete Mathematical Sciences and Cryptography, 22(2), 191-202 (2019). doi: 10.1080/09720529.2019.1582867
  • Diwaker, C., Tomar, P., Poonia, R. C., & Singh, V. Prediction of Software Reliability using Bio Inspired Soft Computing Techniques. Journal of medical systems, 42(5), 93 (2018). doi: 10.1007/s10916-018-0952-3
  • Poonia, R. C., & Raja, L. On-Demand Routing Protocols for Vehicular Cloud Computing. In Vehicular Cloud Computing for Traffic Management and Systems (pp. 151-177). IGI Global (2018).
  • Eswaraprasad, R., & Raja, L. Improved intelligent transport system for reliable traffic control management by adapting internet of things. In 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions)(ICTUS)(pp. 597-601). IEEE (2017, December).
  • Saini, A., & Singh, V. Implementation and Performance Analysis of Improved DSR Routing Protocol to Detect an Inimical Node in MANETs Using NS-2. International Journal for Research and Development in Engineering (IJRDE), 2, 33-44 (2013).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.