PDF] Power Consumption-based Detection of Sabotage Attacks in

Por um escritor misterioso

Descrição

This work proposes a novel approach for detecting sabotage attacks in additive Manufacturing, based on continuous monitoring of the current delivered to all actuators during the manufacturing process and detection of deviations from a provable benign process. Additive Manufacturing (AM), a.k.a. 3D Printing, is increasingly used to manufacture functional parts of safety-critical systems. AM's dependence on computerization raises the concern that the AM process can be tampered with, and a part's mechanical properties sabotaged. This can lead to the destruction of a system employing the sabotaged part, causing loss of life, financial damage, and reputation loss. To address this threat, we propose a novel approach for detecting sabotage attacks. Our approach is based on continuous monitoring of the current delivered to all actuators during the manufacturing process and detection of deviations from a provable benign process. The proposed approach has numerous advantages: (i) it is non-invasive in a time-critical process, (ii) it can be retrofitted in legacy systems, and (iii) it is airgapped from the computerized components of the AM process, preventing simultaneous compromise. Evaluation on a desktop 3D Printer detects all attacks involving a modification of X or Y motor movement, with false positives at 0%.
PDF] Power Consumption-based Detection of Sabotage Attacks in
U) OSS Simple Sabotage Field Manual
PDF] Power Consumption-based Detection of Sabotage Attacks in
Enterprise data breach: causes, challenges, prevention, and future directions - Cheng - 2017 - WIREs Data Mining and Knowledge Discovery - Wiley Online Library
PDF] Power Consumption-based Detection of Sabotage Attacks in
A novel cyber‐attack modelling and detection in overcurrent protection relays based on wavelet signature analysis - Yousefi kia - 2023 - IET Generation, Transmission & Distribution - Wiley Online Library
PDF] Power Consumption-based Detection of Sabotage Attacks in
Reassessing cyberwarfare. Lessons learned in 2022
PDF] Power Consumption-based Detection of Sabotage Attacks in
Incentive edge-based federated learning for false data injection attack detection on power grid state estimation: A novel mechanism design approach - ScienceDirect
PDF] Power Consumption-based Detection of Sabotage Attacks in
Physics-based detection of cyber-attacks in manufacturing systems: A machining case study - ScienceDirect
PDF] Power Consumption-based Detection of Sabotage Attacks in
JCP, Free Full-Text
PDF] Power Consumption-based Detection of Sabotage Attacks in
Frontiers Hardware Security in Sensor and its Networks
PDF] Power Consumption-based Detection of Sabotage Attacks in
Nanotechnology Tools Enabling Biological Discovery
PDF] Power Consumption-based Detection of Sabotage Attacks in
A new stable scheme against false data injection attacks in distributed control microgrid - Tahani - IET Cyber-Physical Systems: Theory & Applications - Wiley Online Library
PDF] Power Consumption-based Detection of Sabotage Attacks in
A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)
PDF] Power Consumption-based Detection of Sabotage Attacks in
Cyber Operations during the Russo-Ukrainian War
PDF] Power Consumption-based Detection of Sabotage Attacks in
PDF) Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing
PDF] Power Consumption-based Detection of Sabotage Attacks in
PDF] Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing
PDF] Power Consumption-based Detection of Sabotage Attacks in
PDF] Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing
de por adulto (o preço varia de acordo com o tamanho do grupo)