A review of critical infrastructure protection approaches: Improving security through responsiveness to the dynamic modelling landscape

UD Ani, JD McK Watson, JRC Nurse, A Cook… - Living in the Internet of …, 2019 - IET
As new technologies such as the Internet of Things (IoT) are integrated into Critical National
Infrastructures (CNI), new cybersecurity threats emerge that require specific security …

Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective

M Asiri, N Saxena, R Gjomemo, P Burnap - ACM transactions on cyber …, 2023 - dl.acm.org
Numerous sophisticated and nation-state attacks on Industrial Control Systems (ICSs) have
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …

Cyber security for fog-based smart grid SCADA systems: Solutions and challenges

MA Ferrag, M Babaghayou, MA Yazici - Journal of Information Security and …, 2020 - Elsevier
This paper presents a comprehensive survey of existing cyber security solutions for fog-
based smart grid SCADA systems. We start by providing an overview of the architecture and …

[PDF][PDF] Cybersecurity in smart grids, challenges and solutions

D Faquir, N Chouliaras, V Sofia, K Olga… - AIMS Electronics and …, 2021 - aimspress.com
Smart Grid technology will revolutionize modern industries providing powerful solutions to
increase the efficiency of traditional Electric Grids. Smart Grid is an energy supply network …

A conceptual model for cybersecurity governance

S Yusif, A Hafeez-Baig - Journal of applied security research, 2021 - Taylor & Francis
Cybersecurity is a growing problem associated with everything an individual or an
organization does that is facilitated by the Internet. It is a multi-facetted program that can be …

Vulnerability analysis of network scanning on SCADA systems

K Coffey, R Smith, L Maglaras… - Security and …, 2018 - Wiley Online Library
Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control Systems
(ICSs) have controlled the regulation and management of Critical National Infrastructure …

A threat hunting framework for industrial control systems

Z Jadidi, Y Lu - IEEE Access, 2021 - ieeexplore.ieee.org
An Industrial Control System (ICS) adversary often takes different actions to exploit
vulnerabilities, pass the border between Information Technology (IT) and Operational …

A cyber incident response and recovery framework to support operators of industrial control systems

A Staves, T Anderson, H Balderstone, B Green… - International Journal of …, 2022 - Elsevier
Over the last decade, we have seen a shift in the focus of cyber attacks, moving from
traditional IT systems to include more specialised Industrial Control Systems (ICS), often …

Blockchain-based decentralized replay attack detection for large-scale power systems

P Ramanan, D Li, N Gebraeel - IEEE Transactions on Systems …, 2021 - ieeexplore.ieee.org
Large-scale power systems are composed of regional utilities with assets that stream sensor
readings in real time. In order to detect cyberattacks, the globally acquired, real-time sensor …

Cyber threats for operational technologies

G Assenza, L Faramondi, G Oliva… - International Journal of …, 2020 - inderscienceonline.com
Most critical sectors worldwide rely on operational technology (OT) whose cybersecurity,
due to the primary need of availability, results to be obsolete and inadequate. Episodes like …