Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures.
Jacob GatlinSofia BelikovetskySamuel Bennett MooreYosef A. SolewiczYuval EloviciMark YampolskiyPublished in: IEEE Access (2019)
Keyphrases
- control system
- countermeasures
- network intrusion detection systems
- manufacturing systems
- manufacturing processes
- malicious attacks
- power consumption
- closed loop
- control method
- quality control
- detecting malicious
- signature verification
- malicious activities
- detect malicious
- terrorist attacks
- traffic analysis
- ddos attacks
- security mechanisms
- watermarking scheme
- manufacturing process
- product quality