2022
DOI: 10.3390/app12136520
|View full text |Cite
|
Sign up to set email alerts
|

Design of Platforms for Experimentation in Industrial Cybersecurity

Abstract: The connectivity advances in industrial control systems have also increased the possibility of cyberattacks in industry. Thus, security becomes crucial in critical infrastructures, whose services are considered essential in fields such as manufacturing, energy or public health. Although theoretical and formal approaches are often proposed to advance in the field of industrial cybersecurity, more experimental efforts in realistic scenarios are needed to understand the impact of incidents, assess security techno… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…Likewise, ethics and privacy must be considered in implementing AI in cybersecurity. The generation of synthetic data raises questions about the ethics of using fictitious or generated information, and it is essential to address these issues responsibly [51].…”
Section: Discussionmentioning
confidence: 99%
“…Likewise, ethics and privacy must be considered in implementing AI in cybersecurity. The generation of synthetic data raises questions about the ethics of using fictitious or generated information, and it is essential to address these issues responsibly [51].…”
Section: Discussionmentioning
confidence: 99%
“…In the face of complex threats, studies [3][4][5] have been conducted on the application of cyber defense methods for critical infrastructure based on knowledge of physical processes in the infrastructure. This approach enables the detection of traditional computer attacks that alter the behavior of the primary physical process in the infrastructure, based on the knowledge of the physical process in the cycle of infrastructure management.…”
Section: Methods Of Cyber Protection Of Critical Infrastructure Objectsmentioning
confidence: 99%
“…Elements such as pumps and relays serve as actuators. The HMI also demonstrates the data obtained from the sensors [6,7].…”
Section: Scada Systemmentioning
confidence: 99%