2023
DOI: 10.1016/j.compchemeng.2023.108169
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity in process control, operations, and supply chain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(4 citation statements)
references
References 92 publications
0
4
0
Order By: Relevance
“…Multiplicative FDI attacks alter the stability properties of a closed-loop process by modifying the eigenvalues of the matrix A ξ a (K, L) in Equation (9). As a result, the detectability of such attacks may be influenced by the stability of the closed-loop process under an attack.…”
Section: Control Mode Switching For Cyberattack Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Multiplicative FDI attacks alter the stability properties of a closed-loop process by modifying the eigenvalues of the matrix A ξ a (K, L) in Equation (9). As a result, the detectability of such attacks may be influenced by the stability of the closed-loop process under an attack.…”
Section: Control Mode Switching For Cyberattack Detectionmentioning
confidence: 99%
“…Due to the interconnected nature of a cyber-physical system like a PCS, a comprehensive solution to enhancing the cybersecurity of PCSs may involve adopting a multi-faceted approach that involves both information technology-based and operational technologybased approaches. The approaches proposed in the literature broadly include those that reinforce information technology-based infrastructure (e.g., firewalls [3] and network design-based approaches [4,5]), approaches that involve cybersecure architecture design (e.g., [6]), approaches for process equipment design to mitigate adverse impacts of a cyberattack (e.g., [7,8]), and the design of operational technology (OT)-based approaches for detecting, identifying, and successfully recovering from an ongoing cyberattack [6,[9][10][11][12][13][14][15][16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%
“…2) Using reliable model supply channels: By choosing reputable and trustworthy MLaaS providers, organizations can significantly reduce the likelihood of acquiring malware-infected models [30].…”
Section: Countermeasuresmentioning
confidence: 99%
“…The results of the study are of value for the protection and construction of cybersecurity at the present time of digital transformation [14]. Parker S. et al briefly analyzed the forms of intelligent cyberattacks in industrial control systems and proposed machine learning-based detection methods and related strategies aimed at achieving secure communications for process control, process operations, and supply chain management [15]. O'Brien, P. studied and analyzed cybersecurity on the factory floor and pointed out that automated cybersecurity is also an important part of cybersecurity.…”
Section: Introductionmentioning
confidence: 99%