Näytä suppeat kuvailutiedot

dc.contributor.authorVähäkainu, Petri
dc.contributor.authorLehto, Martti
dc.contributor.authorKariluoto, Antti
dc.contributor.editorLehto, Martti
dc.contributor.editorNeittaanmäki, Pekka
dc.date.accessioned2023-02-02T12:35:53Z
dc.date.available2023-02-02T12:35:53Z
dc.date.issued2022
dc.identifier.citationVähäkainu, P., Lehto, M., & Kariluoto, A. (2022). Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Critical Infrastructure Protection</i> (pp. 255-292). Springer. Computational Methods in Applied Sciences, 56. <a href="https://doi.org/10.1007/978-3-030-91293-2_11" target="_blank">https://doi.org/10.1007/978-3-030-91293-2_11</a>
dc.identifier.otherCONVID_117606286
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/85319
dc.description.abstractCritical infrastructure (CI) is a vital asset for the economy and society’s functioning, covering sectors such as energy, finance, healthcare, transport, and water supply. Governments around the world invest a lot of effort in continuous operation, maintenance, performance, protection, reliability, and safety of CI. However, the vulnerability of CI to cyberattacks and technical failures has become a major concern nowadays. Sophisticated and novel cyberattacks, such as adversarial attacks, may deceive physical security controls providing a perpetrator an illicit entry to the smart critical facility. Adversarial attacks can be used to deceive a classifier based on predictive machine learning (ML) that automatically adjusts the heating, ventilation, and air conditioning (HVAC) of a smart building. False data injection attacks have also been used against smart grids. Traditional and widespread cyberattacks using malicious code can cause remarkable physical damage, such as blackouts and disruptions in power production, as attack vectors to manipulate critical infrastructure. To detect incoming attacks and mitigate the performance of those attacks, we introduce defensive mechanisms to provide additional detection and defense capabilities to enhance the inadequate protection of a smart critical facility from external.en
dc.format.extent484
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofCyber Security : Critical Infrastructure Protection
dc.relation.ispartofseriesComputational Methods in Applied Sciences
dc.rightsIn Copyright
dc.subject.otheradversarial attacks
dc.subject.othercritical infrastructure
dc.subject.othercyberattacks
dc.subject.othercyber-physical system
dc.subject.otherdefensive mechanisms
dc.titleCyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures
dc.typebook part
dc.identifier.urnURN:NBN:fi:jyu-202302021601
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingfi
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringfi
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingen
dc.contributor.oppiaineEngineeringen
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringen
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/BookItem
dc.relation.isbn978-3-030-91292-5
dc.type.coarhttp://purl.org/coar/resource_type/c_3248
dc.description.reviewstatuspeerReviewed
dc.format.pagerange255-292
dc.relation.issn1871-3033
dc.type.versionacceptedVersion
dc.rights.copyright© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
dc.rights.accesslevelopenAccessfi
dc.type.publicationbookPart
dc.subject.ysokyberturvallisuus
dc.subject.ysoinfrastruktuurit
dc.subject.ysoverkkohyökkäykset
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p17539
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-030-91293-2_11
dc.type.okmA3


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright