2011
DOI: 10.5643/9781606503027
|View full text |Cite
|
Sign up to set email alerts
|

Robust Control System Networks: How to Achieve Reliable Control After Stuxnet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0
2

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 0 publications
0
9
0
2
Order By: Relevance
“…The overall safety jointly relies on data monitoring (30%) and control availability (70%) . We make this particular configuration to reflect the common requirement of ICS that system availability generally outweighs the other aspects [12]. In the Fig.2(a), we use dashed lines to indicate the impact of deploying c 1 against w 1 at the target T 1 and T 2 .…”
Section: Case Study Settingsmentioning
confidence: 99%
“…The overall safety jointly relies on data monitoring (30%) and control availability (70%) . We make this particular configuration to reflect the common requirement of ICS that system availability generally outweighs the other aspects [12]. In the Fig.2(a), we use dashed lines to indicate the impact of deploying c 1 against w 1 at the target T 1 and T 2 .…”
Section: Case Study Settingsmentioning
confidence: 99%
“…Por sua vez, parte significativa dessas infraestruturas é baseada no funcionamento de sistemas de controle industriais [8,9], que tendem a convergir cada vez mais para uma estrutura de controle e integração com a Internet.…”
Section: Vulnerabilidadesunclassified
“…Uma equipe multifuncional de engenheiros de controle, operadores de sistemas de controle e os profissionais de segurança de TI precisam trabalhar em estreita colaboração para entender as possíveis implicações da instalação, operação e manutenção de soluções de segurança em conjunto com a operação do sistema de controle [8]. Por sua vez, os profissionais de TI que trabalham com SCIs precisam entender a dimensão dos impactos de confiabilidade das tecnologias de segurança da informação antes da implantação, sob pena de funcionamento inadequado dos sistemas operacionais e aplicativos submetidos ao SCI [8,9].…”
Section: Vulnerabilidadesunclassified
“…Rather than addressing broader types of consequences of cyber attacks, we focus on the ones which can sabotage the operational aspects of ICS. This motivation exactly aligns with the need of integrating security and safety analysis for ICS, because in terms of the traditional goals of security, the integrity and confidentiality are less important than availability in this case (Langer 2012).…”
Section: Introductionmentioning
confidence: 99%