Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
Well done!
You have completed (UPI) Chapter 13: Detecting Vulnerabilities in Critical Infrastructures!
Instruction
13.3.1 Critical Infrastructure Dataset
For this proposal, we used ICS images provided by the Spanish National Cybersecurity Institute (INCIBE), which were retrieved using multiple metasearchers such as Shodan (https://www.shodan.io). We manually labeled 337 snapshots into two categories: 74 IT and 263 OT images, resulting in the Critical Infrastructure (CRINF-300) dataset. Although this dataset is small and ...