Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges

AMY Koay, RKL Ko, H Hettema, K Radke - Journal of Intelligent …, 2023 - Springer
The advent of Industry 4.0 has led to a rapid increase in cyber attacks on industrial systems
and processes, particularly on Industrial Control Systems (ICS). These systems are …

[HTML][HTML] Just-in-time software vulnerability detection: Are we there yet?

F Lomio, E Iannone, A De Lucia, F Palomba… - Journal of Systems and …, 2022 - Elsevier
Background: Software vulnerabilities are weaknesses in source code that might be exploited
to cause harm or loss. Previous work has proposed a number of automated machine …

Automating the early detection of security design flaws

K Tuma, L Sion, R Scandariato, K Yskout - Proceedings of the 23rd ACM …, 2020 - dl.acm.org
Security by design is a key principle for realizing secure software systems and it is advised
to hunt for security flaws from the very early stages of development. At design-time, security …

Architectural tactics in software architecture: A systematic map** study

G Márquez, H Astudillo, R Kazman - Journal of Systems and Software, 2023 - Elsevier
Architectural tactics are a key abstraction of software architecture, and support the
systematic design and analysis of software architectures to satisfy quality attributes. Since …

Power System Stability Analysis from Cyber Attacks Perspective

I Semertzis, A Ştefanov, A Presekal, B Kruimer… - IEEE …, 2024 - ieeexplore.ieee.org
Power grid digitalization introduces new vulnerabilities and cyber security threats. The
impact of cyber attacks on power system stability is a topic of growing concern, which is yet …

[HTML][HTML] The anatomy of a vulnerability database: A systematic map** study

X Li, S Moreschini, Z Zhang, F Palomba… - Journal of Systems and …, 2023 - Elsevier
Software vulnerabilities play a major role, as there are multiple risks associated, including
loss and manipulation of private data. The software engineering research community has …

MTA Fuzzer: A low-repetition rate Modbus TCP fuzzing method based on Transformer and Mutation Target Adaptation

W Wang, Z Chen, Z Zheng, H Wang, J Luo - Computers & Security, 2024 - Elsevier
The widespread application of industrial control systems has driven the development of
industrial control protocols. However, traditional industrial control protocols suffer from …

Learning from vulnerabilities-categorising, understanding and detecting weaknesses in industrial control systems

RJ Thomas, T Chothia - … , CyberICPS, SECPRE, and ADIoT, Guildford, UK …, 2020 - Springer
Compared to many other areas of cyber security, vulnerabilities in industrial control systems
(ICS) can be poorly understood. These systems form part of critical national infrastructure …

Examining the factors that impact the severity of cyberattacks on critical infrastructures

Y Roumani, M Alraee - Computers & Security, 2025 - Elsevier
In light of the rising threats of cyberattacks on critical infrastructures, cybersecurity has
become a high priority for government agencies worldwide. In particular, the severity of …

The global state of security in industrial control systems: An empirical analysis of vulnerabilities around the world

SDD Anton, D Fraunholz, D Krohmer… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Operational Technology (OT) networks and devices, ie, all components used in industrial
environments, were not designed with security in mind. Efficiency and ease of use were the …