2013
DOI: 10.1007/978-3-642-30662-4_10
|View full text |Cite
|
Sign up to set email alerts
|

Gap-and-IMECA-Based Assessment of I&C Systems Cyber Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…In our previous works, we presented different modifications of FMECA that could be applied to different domains. In particular, IMECA is intended for security assessment by analyzing intrusions and their effects [27][28][29].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In our previous works, we presented different modifications of FMECA that could be applied to different domains. In particular, IMECA is intended for security assessment by analyzing intrusions and their effects [27][28][29].…”
Section: Discussionmentioning
confidence: 99%
“…One of the modifications of FMECA is IMECA, which follows a similar procedure but aims to assess information security or cybersecurity. IMECA is based on chains "threatvulnerability-attack/intrusion, effects, assessment of criticality in terms of violation of the cybersecurity properties (confidentiality, integrity, accessibility), and, under certain conditions, functional security as well [27][28][29]. A unified approach combining FMECA, IMECA, and other assessment methods was referred to in our previous publications as XMECA [30,31].…”
Section: State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation
“…The algorithm, which is based on IMECA technique, intended for a comprehensive analysis and assessment of complex products/systems, comprises the following consequent steps 8 :…”
Section: Algorithm Of Imeca Analysismentioning
confidence: 99%
“…IMECA-based analysis of Internet of Drones vulnerabilities and choice of countermeasures to minimize risks of successful cyberattacks [45];…”
mentioning
confidence: 99%