STRIDE-based Methodologies for Threat Modeling of Industrial Control Systems: A Review

O Saßnick, T Rosenstatter, C Schäfer… - 2024 IEEE 7th …, 2024 - ieeexplore.ieee.org
Industrial Control Systems (ICS) and Operational Technology (OT) in general are facing
significantly increasing numbers of cyber attacks. Hence, threat identification is of utmost …

[HTML][HTML] Interlocking IT/OT security for edge cloud-enabled manufacturing

T Kampa, CK Müller, D Großmann - Ad Hoc Networks, 2024 - Elsevier
After an initial push to outsource every single computation to remote data centers, the edge
compute paradigm can now provide the necessary balance of scalability and timeliness for …

Mapping of Industrial IoT to IEC 62443 Standards

I Cindrić, M Jurčević, T Hadjina - Sensors, 2025 - mdpi.com
The increasing adoption of the Industrial Internet of Things (IIoT) has led to significant
improvements in operational efficiency but has also brought new challenges for …

The Need for Threat Modelling in Unmanned Aerial Systems

AM Shaaban, O Jung, C Schmittner - International Conference on …, 2023 - Springer
Detecting cybersecurity vulnerabilities in Unmanned Aerial Systems (UAS) is essential to
ensure the safe operation of drones. This supports the determination of cybersecurity …

Modeling of Security Fault-Tolerant Requirements for Secure Systems

D Pathirage, M Shin, D Jang - International Journal of Software …, 2023 - World Scientific
Security services can keep a system from security breaches for a while, but they are
ultimately compromised as the system is deployed and used. This paper describes the …

9 AIT Austrian Institute of Technology GmbH-Center for Digital Safety & Security, Giefinggasse 4, 1210 Vienna, Austria {abdelkader. shaaban, oliver. jung, christoph …

AM Shaaban - … Safety, Reliability, and Security. SAFECOMP 2023 …, 2023 - books.google.com
Detecting cybersecurity vulnerabilities in Unmanned Aerial Systems (UAS) is essential to
ensure the safe operation of drones. This supports the determination of cybersecurity …

[PDF][PDF] A comprehensive Security Testing Framework for PLC-based Industrial Automation and

GS Manubolu - 2024 - utupub.fi
Throughout the development process, adherence to the IEC 62443 standard is maintained,
ensuring alignment with established industrial best practices and regulatory requirements …

Optimising a defence-aware threat modelling diagram incorporating a defence-in-depth approach for the internet-of-things

ML Godakanda - 2023 - ro.ecu.edu.au
Modern technology has proliferated into just about every aspect of life while improving the
quality of life. For instance, IoT technology has significantly improved over traditional …

Simulation-Based Evaluation of Perimeter-Based and Zero Trust Security Implementation on Internet of Things

M Capili - 2024 - search.proquest.com
The shift from Perimeter-based security to Zero Trust security has been a long time in the
making. Nevertheless, the President's insistence on an accelerated transition with an …

IEC 62443-4-2 standardin hyödyt ja haasteet yritykselle: systemaattinen kirjallisuuskatsaus

J Alkiomaa - 2023 - jyx.jyu.fi
Teollisuus digitalisoituu siinä missä muukin maailma, mutta digitalisaation myötä myös riskit
lisääntyvät. Yhä suurempi osa laitteista on jollain tavalla yhteydessä toisiinsa ja internettiin …