Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
The advent of Industry 4.0 has led to a rapid increase in cyber attacks on industrial systems
and processes, particularly on Industrial Control Systems (ICS). These systems are …
and processes, particularly on Industrial Control Systems (ICS). These systems are …
[HTML][HTML] Just-in-time software vulnerability detection: Are we there yet?
Background: Software vulnerabilities are weaknesses in source code that might be exploited
to cause harm or loss. Previous work has proposed a number of automated machine …
to cause harm or loss. Previous work has proposed a number of automated machine …
Automating the early detection of security design flaws
Security by design is a key principle for realizing secure software systems and it is advised
to hunt for security flaws from the very early stages of development. At design-time, security …
to hunt for security flaws from the very early stages of development. At design-time, security …
Architectural tactics in software architecture: A systematic map** study
Architectural tactics are a key abstraction of software architecture, and support the
systematic design and analysis of software architectures to satisfy quality attributes. Since …
systematic design and analysis of software architectures to satisfy quality attributes. Since …
Power System Stability Analysis from Cyber Attacks Perspective
Power grid digitalization introduces new vulnerabilities and cyber security threats. The
impact of cyber attacks on power system stability is a topic of growing concern, which is yet …
impact of cyber attacks on power system stability is a topic of growing concern, which is yet …
[HTML][HTML] The anatomy of a vulnerability database: A systematic map** study
Software vulnerabilities play a major role, as there are multiple risks associated, including
loss and manipulation of private data. The software engineering research community has …
loss and manipulation of private data. The software engineering research community has …
MTA Fuzzer: A low-repetition rate Modbus TCP fuzzing method based on Transformer and Mutation Target Adaptation
W Wang, Z Chen, Z Zheng, H Wang, J Luo - Computers & Security, 2024 - Elsevier
The widespread application of industrial control systems has driven the development of
industrial control protocols. However, traditional industrial control protocols suffer from …
industrial control protocols. However, traditional industrial control protocols suffer from …
Learning from vulnerabilities-categorising, understanding and detecting weaknesses in industrial control systems
Compared to many other areas of cyber security, vulnerabilities in industrial control systems
(ICS) can be poorly understood. These systems form part of critical national infrastructure …
(ICS) can be poorly understood. These systems form part of critical national infrastructure …
Examining the factors that impact the severity of cyberattacks on critical infrastructures
Y Roumani, M Alraee - Computers & Security, 2025 - Elsevier
In light of the rising threats of cyberattacks on critical infrastructures, cybersecurity has
become a high priority for government agencies worldwide. In particular, the severity of …
become a high priority for government agencies worldwide. In particular, the severity of …
The global state of security in industrial control systems: An empirical analysis of vulnerabilities around the world
Operational Technology (OT) networks and devices, ie, all components used in industrial
environments, were not designed with security in mind. Efficiency and ease of use were the …
environments, were not designed with security in mind. Efficiency and ease of use were the …