Temporal assessment of malicious behaviors: application to turnout field data monitoring

Abdellaoui, Sara, Dumitrescu, Emil, Escudero, Cédric, Zamaï, Eric

arXiv.org Artificial Intelligence 

This information was projected on the life cycle of the Their distributed communicating nature makes them vulnerable turnout according to time aging and operation aging to cyberattacks [2]. The security of CPS has criteria in order to compute a cyberthreat likelihood for emerged as a complex problem, after discovering the each current curve observed. Maintenance operators use Stuxnet malware [3] that targeted the Iranian industrial the estimated likelihood to assess the authenticity of each control system.

Duplicate Docs Excel Report

Title
None found

Similar Docs  Excel Report  more

TitleSimilaritySource
None found