Socio-technical risk management in the age of digital transformation-identification and analysis of existing approaches
JS Menzefricke, I Wiederkehr, C Koldewey… - Procedia CIRP, 2021 - Elsevier
The digital transformation opens up a wide range of potentials to design value creation
processes more efficiently. However, performing the digital transformation requires far …
processes more efficiently. However, performing the digital transformation requires far …
Security risks in cyber physical systems—a systematic mapping study
The increased need for constant connectivity and complete automation of existing systems
fuels the popularity of Cyber Physical Systems (CPS) worldwide. Increasingly more, these …
fuels the popularity of Cyber Physical Systems (CPS) worldwide. Increasingly more, these …
Power line monitoring through data integrity analysis with Q-learning based data analysis network
R Maskeliūnas, R Pomarnacki, V Khang Huynh… - Remote Sensing, 2022 - mdpi.com
To monitor and handle big data obtained from electrical, electronic, electro-mechanical, and
other equipment linked to the power grid effectively and efficiently, it is important to monitor …
other equipment linked to the power grid effectively and efficiently, it is important to monitor …
A new hybrid risk assessment process for cyber security design of smart grids using fuzzy analytic hierarchy processes
IT vulnerabilities, cyber threats, and resulting risks significantly impact the stability of current
and future power grids. The results of a Risk Assessment process contribute to a better …
and future power grids. The results of a Risk Assessment process contribute to a better …
An Ethereum-based wind power energy network contract management solution
L Zhang, J Bai - International Journal of Communication …, 2022 - inderscienceonline.com
Because the existing wind turbine safety is limited by the traditional centralised
management, it faces many security risks. Therefore, the future wind turbine management …
management, it faces many security risks. Therefore, the future wind turbine management …
An industrial trial of an approach to identification and modelling of cybersecurity risks in the context of digital secondary substations
A Omerovic, H Vefsnmo, O Gjerde, ST Ravndal… - Risks and Security of …, 2020 - Springer
We have in an earlier study proposed a set of requirements and an approach to
identification and modelling of cybersecurity risks and their impacts on safety, within the …
identification and modelling of cybersecurity risks and their impacts on safety, within the …
[PDF][PDF] The Relationship between Cyber Risk Management and Digital Transformation. A Bibliometric Analysis.
M CATRINA, AM GHIGIU - Review of International Comparative …, 2024 - rmci.ase.ro
Based on the manifold implications of the relationship between cyber risk management and
digital transformation, the present paper intends to perform a bibliometric analysis stressing …
digital transformation, the present paper intends to perform a bibliometric analysis stressing …
Hunting dependencies: Using bow-tie for combined analysis of power and cyber security
H Vefsnmo, F Johannessen, C Fr - 2020 2nd International …, 2021 - ieeexplore.ieee.org
Modern electric power systems are complex cyber-physical systems. The integration of
traditional power and digital technologies result in interdependencies that need to be …
traditional power and digital technologies result in interdependencies that need to be …
Needs and challenges concerning cyber-risk assessment in the cyber-physical smart grid
Cyber-risk assessment methods are used by energy companies to manage security risks in
smart grids. However, current standards, methods and tools do not adequately provide the …
smart grids. However, current standards, methods and tools do not adequately provide the …
Risk identification based on architectural patterns
M Heisel, A Omerovic - … , QUATIC 2021, Algarve, Portugal, September 8 …, 2021 - Springer
We present a novel approach for the identification of risks for IT-based systems, where we
base risk identification on the system architecture, in particular, the architectural principles a …
base risk identification on the system architecture, in particular, the architectural principles a …