2020
DOI: 10.3390/s20247210
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use

Abstract: The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk analysis method that integrates Kaplan’s and Garrick’s approach and fuzzy theory. The proposed approach takes into account the level of automation of the operating mining processes. Moreover, it follows five main steps, including identifying the automation level in a selected mine, definition of cyber-attack targets, identificati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 46 publications
0
12
0
Order By: Relevance
“…According to [45], the researcher should use this method in a situation where vague phenomenon (vague relations in modelling the issues), information vagueness and heuristic algorithms. Then, one may use linguistic variables when assessing qualitatively or give intervals instead of exact crisp values in evaluating the data quantitatively [46].…”
Section: Fuzzy Theory In Risk Assessmentmentioning
confidence: 99%
See 1 more Smart Citation
“…According to [45], the researcher should use this method in a situation where vague phenomenon (vague relations in modelling the issues), information vagueness and heuristic algorithms. Then, one may use linguistic variables when assessing qualitatively or give intervals instead of exact crisp values in evaluating the data quantitatively [46].…”
Section: Fuzzy Theory In Risk Assessmentmentioning
confidence: 99%
“…Fuzzy set theory is also prevalent in risk assessment models. Its implementations concerning the estimation of the size of the occurring risks appear, among other things, in the area of cybersecurity [46]; gas and dust explosion risk [56], but also supply chain risk assessment [37,42].…”
mentioning
confidence: 99%
“…A cyber-attack risk analysis that integrates Kaplan's and Garrick's approach and fuzzy theory is proposed, focusing on some of the main targets (database, internal networks, machinery) to prevent cyber attacks. This approach can be used for any type of mining and the obtained result will reveal the current cybersecurity status [24].…”
Section: Literature Surveymentioning
confidence: 99%
“…In this paper, we did not include the internal intelligence transport system, which may be carried out later on [23]. Additionally, the cyber security in our system should be implemented, such that there would not be any possibility for cyber-attacks, which may lead to many problems [24].…”
Section: Descentmentioning
confidence: 99%
“…One popular hybrid method used in various research and decision support models is fuzzy logic set theory [54,59,60,[62][63][64]. In our proposed approach, we also decided to use this concept when estimating risk parameters.…”
mentioning
confidence: 99%