Cyber-physical systems security—A survey

A Humayed, J Lin, F Li, B Luo - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
With the exponential growth of cyber-physical systems (CPSs), new security challenges
have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced …

Industrial control systems security: What is happening?

M Krotofil, D Gollmann - 2013 11th IEEE International …, 2013 - ieeexplore.ieee.org
Increasing awareness of ICS security issues has brought about a growing body of work in
this area, including pioneering contributions based on realistic control system logs and …

Twenty security considerations for cloud-supported Internet of Things

J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …

Cyber war will not take place

T Rid - Journal of strategic studies, 2012 - Taylor & Francis
For almost two decades, experts and defense establishments the world over have been
predicting that cyber war is coming. But is it? This article argues in three steps that cyber war …

Easing the conscience with OPC UA: An internet-wide study on insecure deployments

M Dahlmanns, J Lohmöller, IB Fink… - Proceedings of the …, 2020 - dl.acm.org
Due to increasing digitalization, formerly isolated industrial networks, eg, for factory and
process automation, move closer and closer to the Internet, mandating secure …

SABOT: specification-based payload generation for programmable logic controllers

S McLaughlin, P McDaniel - Proceedings of the 2012 ACM conference …, 2012 - dl.acm.org
Programmable Logic Controllers (PLCs) drive the behavior of industrial control systems
according to uploaded programs. It is now known that PLCs are vulnerable to the uploading …

Missed opportunities: Measuring the untapped TLS support in the industrial Internet of Things

M Dahlmanns, J Lohmöller, J Pennekamp… - Proceedings of the …, 2022 - dl.acm.org
The ongoing trend to move industrial appliances from previously isolated networks to the
Internet requires fundamental changes in security to uphold secure and safe operation …

Stuxnet: What has changed?

DE Denning - Future Internet, 2012 - mdpi.com
This paper considers the impact of Stuxnet on cyber-attacks and cyber-defense. It first
reviews trends in cyber-weapons and how Stuxnet fits into these trends. Because Stuxnet …

[PDF][PDF] On SCADA PLC and fieldbus cyber-security

CC Davidson, T Andel, M Yampolskiy… - … Conference on Cyber …, 2018 - researchgate.net
Supervisory Control and Data Acquisition (SCADA) and other industrial control systems
(ICS) are used to monitor and control industrial systems such as refineries, trains, water and …

Control systems/SCADA forensics, what's the difference?

RM van der Knijff - Digital Investigation, 2014 - Elsevier
Immature IT security, increasing network connectivity and unwavering media attention is
causing an increase in the number of control system cyber security incidents. For forensic …