2008
DOI: 10.1109/msp.2008.160
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Assessment for Critical Infrastructure Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…Another research area which is receiving a lot of attention is the identification of vulnerabilities of existing protocols and equipment [56], [57], as well as on methodologies by which to analyse existing networks in order to detect and mitigate vulnerabilities. These methodologies generally focus on detecting chains of vulnerabilities [58] or developing attack trees [59], as overcoming even low levels of security on a network often involves exploiting a series of several vulnerabilities before effecting a meaningful compromise.…”
Section: B Securitymentioning
confidence: 99%
“…Another research area which is receiving a lot of attention is the identification of vulnerabilities of existing protocols and equipment [56], [57], as well as on methodologies by which to analyse existing networks in order to detect and mitigate vulnerabilities. These methodologies generally focus on detecting chains of vulnerabilities [58] or developing attack trees [59], as overcoming even low levels of security on a network often involves exploiting a series of several vulnerabilities before effecting a meaningful compromise.…”
Section: B Securitymentioning
confidence: 99%
“…The main barrier to the current IIoT technological availability is the lack of widespread standards [ 75 , 76 ] and the difficulties in guaranteeing the same level of reliability and security of currently operating wired infrastructures [ 77 ].…”
Section: Main Limitation Towards Refinery 40mentioning
confidence: 99%
“…It should be noted that the order of premises evaluation, although irrelevant in the abstract definition (11), is crucial to avoid a head recursion and a consequent overflow of the local stack during backtrack, when no further paths to the goal can be found in (12).…”
Section: B Class-superclass Relationshipmentioning
confidence: 99%
“…This increasing concern is reflected in the activities of international standardization bodies and affects both general [2]- [6] and specialpurpose [7]- [9] systems. Typical examples of the latter include critical infrastructures such as energy [10], [11] and gas [12], [13] distribution, as well as industrial automation [14]- [18].…”
Section: Introduction and Related Workmentioning
confidence: 99%