A review of critical infrastructure protection approaches: improving security through responsiveness to the dynamic modelling landscape
As new technologies such as the Internet of Things (IoT) are integrated into Critical National
Infrastructures (CNI), new cybersecurity threats emerge that require specific security …
Infrastructures (CNI), new cybersecurity threats emerge that require specific security …
[PDF][PDF] Cybersecurity in smart grids, challenges and solutions
D Faquir, N Chouliaras, V Sofia, K Olga… - AIMS Electronics and …, 2021 - aimspress.com
Smart Grid technology will revolutionize modern industries providing powerful solutions to
increase the efficiency of traditional Electric Grids. Smart Grid is an energy supply network …
increase the efficiency of traditional Electric Grids. Smart Grid is an energy supply network …
Cyber security for fog-based smart grid SCADA systems: Solutions and challenges
This paper presents a comprehensive survey of existing cyber security solutions for fog-
based smart grid SCADA systems. We start by providing an overview of the architecture and …
based smart grid SCADA systems. We start by providing an overview of the architecture and …
A conceptual model for cybersecurity governance
S Yusif, A Hafeez-Baig - Journal of applied security research, 2021 - Taylor & Francis
Cybersecurity is a growing problem associated with everything an individual or an
organization does that is facilitated by the Internet. It is a multi-facetted program that can be …
organization does that is facilitated by the Internet. It is a multi-facetted program that can be …
Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective
Numerous sophisticated and nation-state attacks on Industrial Control Systems (ICSs) have
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …
A threat hunting framework for industrial control systems
Z Jadidi, Y Lu - IEEE Access, 2021 - ieeexplore.ieee.org
An Industrial Control System (ICS) adversary often takes different actions to exploit
vulnerabilities, pass the border between Information Technology (IT) and Operational …
vulnerabilities, pass the border between Information Technology (IT) and Operational …
Vulnerability analysis of network scanning on SCADA systems
K Coffey, R Smith, L Maglaras… - Security and …, 2018 - Wiley Online Library
Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control Systems
(ICSs) have controlled the regulation and management of Critical National Infrastructure …
(ICSs) have controlled the regulation and management of Critical National Infrastructure …
Blockchain-based decentralized replay attack detection for large-scale power systems
Large-scale power systems are composed of regional utilities with assets that stream sensor
readings in real time. In order to detect cyberattacks, the globally acquired, real-time sensor …
readings in real time. In order to detect cyberattacks, the globally acquired, real-time sensor …
A Study on Networked Industrial Robots in Smart Manufacturing: Vulnerabilities, Data Integrity Attacks and Countermeasures
X Shao, L Xie, C Li, Z Wang - Journal of Intelligent & Robotic Systems, 2023 - Springer
The recent integration and collaboration of robots with networks expose new challenges and
problems in terms of security. However, to the best of our knowledge, there has not been any …
problems in terms of security. However, to the best of our knowledge, there has not been any …
A cyber incident response and recovery framework to support operators of industrial control systems
A Staves, T Anderson, H Balderstone, B Green… - International Journal of …, 2022 - Elsevier
Over the last decade, we have seen a shift in the focus of cyber attacks, moving from
traditional IT systems to include more specialised Industrial Control Systems (ICS), often …
traditional IT systems to include more specialised Industrial Control Systems (ICS), often …