Forensic readiness of industrial control systems under stealthy attacks.
Mazen AzzamLiliana PasqualeGregory M. ProvanBashar NuseibehPublished in: Comput. Secur. (2023)
Keyphrases
- control system
- industrial automation
- industrial applications
- countermeasures
- forensic analysis
- industrial processes
- fault detection and isolation
- malicious attacks
- closed loop
- watermarking scheme
- document analysis
- malicious users
- terrorist attacks
- traffic analysis
- forensic science
- data mining
- ddos attacks
- watermarking algorithm
- security risks
- digital forensics
- image watermarking
- industrial environment
- digital watermarking
- security mechanisms