2020 52nd North American Power Symposium (NAPS) 2021
DOI: 10.1109/naps50074.2021.9449777
|View full text |Cite
|
Sign up to set email alerts
|

Modelling of Smart Homes Affected by Cyberattacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Highly computerized and interconnected facilities open up digital access to equipment, and the benefits of information accessibility come at a price in terms of a higher risk of cyberattack, which poses an increasingly significant threat to industrial networks, e.g., in the energy, robotics, and automotive industries [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 ]. While there are obvious methods to protect against attacks, including the isolation of information technology (IT) and operational technology (OT) networks and the precise definition of network privileges [ 9 ], unauthorized access to critical elements of such networks constantly remains a real threat [ 10 ].…”
Section: Introductionmentioning
confidence: 99%
“…Highly computerized and interconnected facilities open up digital access to equipment, and the benefits of information accessibility come at a price in terms of a higher risk of cyberattack, which poses an increasingly significant threat to industrial networks, e.g., in the energy, robotics, and automotive industries [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 ]. While there are obvious methods to protect against attacks, including the isolation of information technology (IT) and operational technology (OT) networks and the precise definition of network privileges [ 9 ], unauthorized access to critical elements of such networks constantly remains a real threat [ 10 ].…”
Section: Introductionmentioning
confidence: 99%
“…Cyber-attacks pose an increasingly significant threat to industrial networks. This applies to industries such as energy, robotics, and automotive [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 ]. On the one hand, relatively obvious protection methods against such attacks exist, i.e., isolation of information technology (IT) and operational technology (OT) networks, as well as the precise definition of permissions for individual human and hardware elements of the network based on whitelisting [ 9 ].…”
Section: Introductionmentioning
confidence: 99%