Temporal assessment of malicious behaviors: application to turnout field data monitoring
Abdellaoui, Sara, Dumitrescu, Emil, Escudero, Cédric, Zamaï, Eric
–arXiv.org Artificial Intelligence
This information was projected on the life cycle of the Their distributed communicating nature makes them vulnerable turnout according to time aging and operation aging to cyberattacks [2]. The security of CPS has criteria in order to compute a cyberthreat likelihood for emerged as a complex problem, after discovering the each current curve observed. Maintenance operators use Stuxnet malware [3] that targeted the Iranian industrial the estimated likelihood to assess the authenticity of each control system.
arXiv.org Artificial Intelligence
May-2-2024
- Country:
- Europe
- North America
- Canada > Alberta (0.04)
- Trinidad and Tobago > Trinidad
- United States
- Massachusetts > Middlesex County
- Woburn (0.04)
- New York > New York County
- New York City (0.04)
- Ohio > Montgomery County
- Dayton (0.04)
- Tennessee (0.04)
- Massachusetts > Middlesex County
- Genre:
- Research Report (1.00)
- Industry:
- Government > Military
- Cyberwarfare (0.55)
- Information Technology > Security & Privacy (1.00)
- Transportation > Ground
- Rail (0.51)
- Government > Military
- Technology: