[HTML][HTML] A review of cyber security risk assessment methods for SCADA systems

Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones… - Computers & …, 2016 - Elsevier
This paper reviews the state of the art in cyber security risk assessment of Supervisory
Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four …

Architecture and security of SCADA systems: A review

G Yadav, K Paul - International Journal of Critical Infrastructure Protection, 2021 - Elsevier
Pipeline bursting, production lines shut down, frenzy traffic, trains confrontation, the nuclear
reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU–these …

A survey of cyber security management in industrial control systems

W Knowles, D Prince, D Hutchison, JFP Disso… - International journal of …, 2015 - Elsevier
Contemporary industrial control systems no longer operate in isolation, but use other
networks (eg, corporate networks and the Internet) to facilitate and improve business …

A systematic review of the state of cyber-security in water systems

N Tuptuk, P Hazell, J Watson, S Hailes - Water, 2021 - mdpi.com
Critical infrastructure systems are evolving from isolated bespoke systems to those that use
general-purpose computing hosts, IoT sensors, edge computing, wireless networks and …

A resilient and sustainable water sector: barriers to the operationalisation of resilience

E Lawson, R Farmani, E Woodley, D Butler - Sustainability, 2020 - mdpi.com
Global threats such as climate change, increasing urbanisation, and rapid population growth
will continue to pose major challenges for the water sector over the coming decades …

Identifying critical infrastructure sectors and their dependencies: An Indian scenario

AN Singh, MP Gupta, A Ojha - International Journal of Critical Infrastructure …, 2014 - Elsevier
Across the globe, critical infrastructures constantly face the risk of cyber and/or other attacks
from hostile and malicious entities as well as damage inflicted by natural disasters. This …

A new cyber security risk evaluation method for oil and gas SCADA based on factor state space

L Yang, X Cao, J Li - Chaos, Solitons & Fractals, 2016 - Elsevier
Based on comprehensive analysis of the structure and the potential safety problem of oil and
gas SCADA (Supervisor control and data acquisition) network, aiming at the shortcomings of …

Anomaly detection in water management systems

M Raciti, J Cucurull, S Nadjm-Tehrani - Critical Infrastructure Protection …, 2012 - Springer
Quality of drinking water has always been a matter of concern. Traditionally, water supplied
by utilities is analysed by independent laboratories to guarantee its quality and suitability for …

Water critical infrastructure security and its dependencies

DM Birkett - Contemporary Voices: St Andrews Journal of …, 2017 - jtr.st-andrews.ac.uk
Water critical infrastructure is considered one of the most important CI on a global basis.
Water CI has been consistently targeted across history since 3000 BC, with a significant …

SCADA applications for electric power system

FM Enescu, N Bizon - Reactive Power Control in AC Power Systems …, 2017 - Springer
Main objective of this chapter is to present the Supervisory Control and Data Acquisition
(SCADA) technology applied in the energy sector which requires distributed control and …