2014
DOI: 10.1016/j.cie.2014.08.008
|View full text |Cite
|
Sign up to set email alerts
|

Software measure in cyber-attacks on production control system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Unnecessary patches are usually avoided on these nodes to prevent any unnecessary interruption in a production line. ICS nodes are also built using heterogeneous technologies and with a variety of operating systems; hence, the fixes are not released in time [30]. These nodes usually do not have direct network connectivity and are secured in demilitarised zones (DMZ).…”
Section: Managementioning
confidence: 99%
“…Unnecessary patches are usually avoided on these nodes to prevent any unnecessary interruption in a production line. ICS nodes are also built using heterogeneous technologies and with a variety of operating systems; hence, the fixes are not released in time [30]. These nodes usually do not have direct network connectivity and are secured in demilitarised zones (DMZ).…”
Section: Managementioning
confidence: 99%
“…Cyber activities have been recognised as a destructive phenomenon in private and public enterprises (de Werra and Studer, 2017;Van Niekerk, 2016;Hills and Batchelor, 2015;Kawanaka et al, 2014;Ventre, 2013;Kim et al, 2011;Luo and Liao, 2009). Moreover, the major threat of cyberattacks, which have occurred in the last decade, has showed the vulnerabilities in cyber defence of the North Atlantic Treaty Organization (NATO), the European Union (EU), and the United Nations (UN).…”
Section: Introductionmentioning
confidence: 99%
“…Software vulnerability is one of the main causes of the information security. It is an important purpose of cyberattack and defense [2]. It is very important to discover and utilize the software vulnerabilities in the information security [3].…”
Section: Introductionmentioning
confidence: 99%