A survey of cyber security management in industrial control systems

W Knowles, D Prince, D Hutchison, JFP Disso… - International journal of …, 2015 - Elsevier
Contemporary industrial control systems no longer operate in isolation, but use other
networks (eg, corporate networks and the Internet) to facilitate and improve business …

Model-based security engineering for cyber-physical systems: A systematic mapping study

PH Nguyen, S Ali, T Yue - Information and Software Technology, 2017 - Elsevier
Abstract Context Cyber-physical systems (CPSs) have emerged to be the next generation of
engineered systems driving the so-called fourth industrial revolution. CPSs are becoming …

An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems

A Almalawi, X Yu, Z Tari, A Fahad, I Khalil - Computers & Security, 2014 - Elsevier
Abstract Supervisory Control and Data Acquisition (SCADA) systems are a core part of
industrial systems, such as smart grid power and water distribution systems. In recent years …

An extensible pattern-based library and taxonomy of security threats for distributed systems

AV Uzunov, EB Fernandez - Computer Standards & Interfaces, 2014 - Elsevier
Security is one of the most essential quality attributes of distributed systems, which often
operate over untrusted networks such as the Internet. To incorporate security features during …

Integrated smart grid systems security threat model

H Suleiman, I Alqassem, A Diabat, E Arnautovic… - Information Systems, 2015 - Elsevier
The smart grid (SG) integrates the power grid and the Information and Communication
Technology (ICT) with the aim of achieving more reliable and safe power transmission and …

Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: a case study using smart grid advanced metering infrastructure

H Suleiman, D Svetinovic - Requirements Engineering, 2013 - Springer
This paper presents an evaluation of the security quality requirements engineering
(SQUARE) method. The evaluation of SQUARE was conducted by its application on the …

Advancing cyber–physical sustainability through integrated analysis of smart power systems: A case study on electric vehicles

B Mohandes, R Al Hammadi, W Sanusi… - International Journal of …, 2018 - Elsevier
Satisfying the growing energy demand, power systems are required to increase their
capacity and be able to distribute energy over wider geographical area. To maintain the …

Systematic literature review of security pattern research

H Washizaki, T Xia, N Kamata, Y Fukazawa, H Kanuka… - Information, 2021 - mdpi.com
Security patterns encompass security-related issues in secure software system development
and operations that often appear in certain contexts. Since the late 1990s, about 500 …

A security architectural pattern for risk management of industry control systems within critical national infrastructure

A Wood, Y He, LA Maglaras… - International Journal of …, 2017 - inderscienceonline.com
SCADA and ICS security have been focusing on addressing issues such as vulnerability
discovery and intrusion detection within critical national infrastructure. Less attention has …

A pattern for a sensor node

A Sahu, EB Fernandez, M Cardei… - Proceedings of the 17th …, 2010 - dl.acm.org
Sensors are widely used in everyday life in household appliances, fire alarms, traffic control
systems, battlefields, banks, and museums. Sensors are used either as standalone devices …