[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review

SM Khalil, H Bahsi, T Korõtko - Computers & Security, 2024 - Elsevier
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams

NZ Aitzhan, D Svetinovic - IEEE transactions on dependable …, 2016 - ieeexplore.ieee.org
Smart grids equipped with bi-directional communication flow are expected to provide more
sophisticated consumption monitoring and energy trading. However, the issues related to …

AI and blockchain synergy in aerospace engineering: an impact survey on operational efficiency and technological challenges

Y Abdulrahman, E Arnautović, V Parezanović… - IEEE …, 2023 - ieeexplore.ieee.org
This paper presents an exhaustive investigation into the potential of integrating blockchain
and Artificial Intelligence (AI) technologies within aerospace engineering, explicitly …

Exploring software security approaches in software development lifecycle: A systematic mapping study

NM Mohammed, M Niazi, M Alshayeb… - Computer Standards & …, 2017 - Elsevier
There is an increase use of security driven approaches to support software development
activities, such as requirements, design and implementation. The objective of this paper is to …

Risk-management framework and information-security systems for small and medium enterprises (SMES): A meta-analysis approach

K AL-Dosari, N Fetais - Electronics, 2023 - mdpi.com
Information-technology (IT) security standards are regularly updated in a rapidly changing
technological world to maintain pace with advanced technologies. This study was motivated …

Model-based security engineering for cyber-physical systems: A systematic mapping study

PH Nguyen, S Ali, T Yue - Information and Software Technology, 2017 - Elsevier
Abstract Context Cyber-physical systems (CPSs) have emerged to be the next generation of
engineered systems driving the so-called fourth industrial revolution. CPSs are becoming …

An effective security requirements engineering framework for cyber-physical systems

SU Rehman, V Gruhn - Technologies, 2018 - mdpi.com
Context and motivation: Cyber-Physical Systems (CPSs) are gaining priority over other
systems. The heterogeneity of these systems increases the importance of security. Both the …

Integration of information systems and cybersecurity countermeasures: an exposure to risk perspective

R Baskerville, F Rowe, FC Wolff - ACM SIGMIS Database: the …, 2018 - dl.acm.org
This paper investigates the relationship between Information Systems (IS) integration and
the use of cybersecurity countermeasures using an adapted exposure to risk perspective …

Integrated smart grid systems security threat model

H Suleiman, I Alqassem, A Diabat, E Arnautovic… - Information Systems, 2015 - Elsevier
The smart grid (SG) integrates the power grid and the Information and Communication
Technology (ICT) with the aim of achieving more reliable and safe power transmission and …