2009 Fourth International Conference on Critical Infrastructures 2009
DOI: 10.1109/cris.2009.5071499
|View full text |Cite
|
Sign up to set email alerts
|

Collaboration in security assessments for critical infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…In the ICS domain, some papers already address the ICS security knowledge. However many of them do not cover the full scope of ICS security assessments (Oates et al, 2013;Schneider, Obermeier and Schlegl, 2015;Lemaire et al, 2015;Lemaire et al, 2014), and others focus on special applications of ICS like smart grids and critical infrastructures (Choraś et al, 2010a; Jarmakiewicz, Maslanka and Parobczak, 2015; Barnett and Crapo, 2011;Koster et al, 2009). Additionally some general papers, dealing with ICS, do not embrace (all) ICS requirements (Bouet and Israel, 2011;Choraś et al, 2010b).…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In the ICS domain, some papers already address the ICS security knowledge. However many of them do not cover the full scope of ICS security assessments (Oates et al, 2013;Schneider, Obermeier and Schlegl, 2015;Lemaire et al, 2015;Lemaire et al, 2014), and others focus on special applications of ICS like smart grids and critical infrastructures (Choraś et al, 2010a; Jarmakiewicz, Maslanka and Parobczak, 2015; Barnett and Crapo, 2011;Koster et al, 2009). Additionally some general papers, dealing with ICS, do not embrace (all) ICS requirements (Bouet and Israel, 2011;Choraś et al, 2010b).…”
Section: Related Workmentioning
confidence: 99%
“…For complexity reduction reasons, not all elements are shown. An asset is the concept which represents all goods to be protected (Fenz and Ekelhart, 2009;Koster et al, 2009;ISA, 2015a). Assets are owned by an enterprise and represent its resources (Fenz and Ekelhart, 2009;Singhal and Wijesekera, 2010;ISA, 2015a).…”
Section: Middle Ontology Layermentioning
confidence: 99%
See 2 more Smart Citations
“…Security risk assessment for industrial automation systems currently focuses on software parts of the system, with little research that also considers the impact on the physical systems being controlled [12]. One approach integrating the automation system and electric power networks is presented by Ten et al [13], but impact assessment is limited to quantifying lost load from disconnected substations.…”
Section: Security Impact Assessment Of Industrial Automation Systemsmentioning
confidence: 99%