Security threats, countermeasures, and challenges of digital supply chains

B Hammi, S Zeadally, J Nebhen - ACM Computing Surveys, 2023 - dl.acm.org
The rapid growth of Information Communication Technologies (ICT) has impacted many
fields. In this context, the supply chain has also quickly evolved toward the digital supply …

A survey on security and privacy issues of UAVs

Y Mekdad, A Aris, L Babun, A El Fergougui, M Conti… - Computer Networks, 2023 - Elsevier
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs),
has witnessed a rapid increase with its large number of airspace users. The tremendous …

A threat hunting framework for industrial control systems

Z Jadidi, Y Lu - IEEE Access, 2021 - ieeexplore.ieee.org
An Industrial Control System (ICS) adversary often takes different actions to exploit
vulnerabilities, pass the border between Information Technology (IT) and Operational …

[HTML][HTML] GENICS: A Framework for Generating Attack Scenarios for Cybersecurity Exercises on Industrial Control Systems

IS Song, S Jeon, D Kim, MG Lee, JT Seo - Applied Sciences, 2024 - mdpi.com
Due to the nature of the industrial control systems (ICS) environment, where process
continuity is essential, intentionally initiating a cyberattack to check security controls can …

Securing Over-the-Air Firmware Updates (FOTA) for Industrial Internet of Things (IIOT) Devices

KG Crowther, R Upadrashta… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Industrial Internet of Things (IIOT) is increasingly relying on over-the-air firmware updates
(FOTA) to deliver tailored analytics to control systems for critical infrastructure. Connected …

Analysis, prevention and detection of ransomware attacks on Industrial Control Systems

GV Santangelo, VG Colacino… - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
With the advent of Industry 4.0, Industrial Control Systems (ICS) are becoming a prime target
for many cyber criminals. We are witnessing a steady increase in the number of ransomware …

Cyber Threat Hunting to Detect Unknown Threats in the Enterprise Network

AH Nursidiq, C Lim - 2023 IEEE International Conference on …, 2023 - ieeexplore.ieee.org
As the threat landscape continues to evolve, companies have increasingly turned to a
diverse array of tools and techniques to detect and combat potential risks. Cyber Threat …

Cyber-attack TTP analysis for EPES systems

A Lekidis - arXiv preprint arXiv:2302.09164, 2023 - arxiv.org
The electrical grid constitutes of legacy systems that were built with no security in mind. As
we move towards the Industry 4.0 area though a high-degree of automation and connectivity …

The rise of ICS malware: A comparative analysis

Y Mekdad, G Bernieri, M Conti… - European Symposium on …, 2021 - Springer
Abstract Cyber attacks against Industrial Control Systems are one of the major concerns for
worldwide manufacturing companies. With the growth of emerging technologies, protecting …

Safeguarding the future: A comprehensive analysis of security measures for smart grids

SA Wasumwa - World Journal of Advanced Research and Reviews, 2023 - wjarr.com
With the rapid advancement of technology and the growing reliance on renewable energy
sources, smart grids have emerged as a transformative solution for enhancing the efficiency …