Journal articles on the topic 'IEC-62443'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'IEC-62443.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Niemann, Karl-Heinz, and Pierre Kobes. "ISO 27000 oder IEC 62443?" atp magazin 66, no. 3 (2024): 60–67. http://dx.doi.org/10.17560/atp.v66i3.2706.
Full textCindrić, Ivan, Marko Jurčević, and Tamara Hadjina. "Mapping of Industrial IoT to IEC 62443 Standards." Sensors 25, no. 3 (2025): 728. https://doi.org/10.3390/s25030728.
Full textHeluany, Jessica B., and Ricardo Galvão. "IEC 62443 Standard for Hydro Power Plants." Energies 16, no. 3 (2023): 1452. http://dx.doi.org/10.3390/en16031452.
Full textПетрашко, Вадим, та Олександр Улічев. "ДОСЛІДЖЕННЯ ІСНУЮЧИХ ПІДХОДІВ ДЛЯ СТВОРЕННЯ БЕЗПЕЧНОЇ МЕРЕЖІ". Молодий вчений, № 12 (124) (29 грудня 2023): 6–11. http://dx.doi.org/10.32839/2304-5809/2023-12-124-3.
Full textTworek, Bartłomiej. "Cyber security requirements for railway control systems according to standard IEC 62443." WUT Journal of Transportation Engineering 131 (December 1, 2020): 79–86. http://dx.doi.org/10.5604/01.3001.0014.8197.
Full textWaldeck, Boris. "Umfassende Unterstützung von Maschinenbetreibern in puncto Zugriffssicherheit." VDI-Z 161, no. 04 (2019): 36–38. http://dx.doi.org/10.37544/0042-1766-2019-04-36.
Full textEhrlich, Marco, Andre Bröring, Christian Diedrich, and Jürgen Jasperneite. "Towards automated risk assessments for modular manufacturing systems." at - Automatisierungstechnik 71, no. 6 (2023): 453–66. http://dx.doi.org/10.1515/auto-2022-0098.
Full textBrombach, Felix, and Artjom Schmidt. "Cybersecurity in Chemieanlagen." CITplus 27, no. 4 (2024): 18–19. http://dx.doi.org/10.1002/citp.202400405.
Full textLiderman, Krzysztof. "Ochrona informacji sterującej w sieciach i systemach przemysłowych – propozycja podstaw edukacyjnych." Przegląd Teleinformatyczny 8(26), no. 1-4 (2021): 3–30. http://dx.doi.org/10.5604/01.3001.0015.0604.
Full textА.И., Грюнталь, та Базаева С.Е. "Вопросы обеспечения кибербезопасности при разработке и использовании АСУ ТП". Труды НИИСИ РАН 11, № 4 (2022): 56–67. http://dx.doi.org/10.25682/niisi.2021.4.0006.
Full textFritzsche, Denise, and Nora Crocoll. "OT‐Security beginnt mit der Anlagenplanung." CITplus 27, no. 3 (2024): 32–33. http://dx.doi.org/10.1002/citp.202400309.
Full textMadsen, Marwin, Anna Palmin, Andreas Stutz, Mathias Maurmaier, and Mike Barth. "Security Analyse des MTP Konzepts." atp magazin 65, no. 8 (2023): 71–79. http://dx.doi.org/10.17560/atp.v65i8.2673.
Full textPochmara, Janusz, and Aleksandra Świetlicka. "Cybersecurity of Industrial Systems—A 2023 Report." Electronics 13, no. 7 (2024): 1191. http://dx.doi.org/10.3390/electronics13071191.
Full textWei, Yu-Chi, Yu-Chun Chang, and Wei-Chen Wu. "Multi-language IoT information security standard item matching based on deep learning." Computer Science and Information Systems 21, no. 2 (2024): 663–83. http://dx.doi.org/10.2298/csis230822012w.
Full textHassani, Hicham Lalaoui, Ayoub Bahnasse, Eric Martin, Christian Roland, Omar Bouattane, and Mohammed El Mehdi Diouri. "Vulnerability and security risk assessment in a IIoT environment in compliance with standard IEC 62443." Procedia Computer Science 191 (2021): 33–40. http://dx.doi.org/10.1016/j.procs.2021.07.008.
Full textGyebnár, Gergő. "Building an OT Security Microgrid Testbed." Academic and Applied Research in Military and Public Management Science 23, no. 3 (2024): 5–19. https://doi.org/10.32565/aarms.2024.3.1.
Full textOkunlola, Folasade. "A Cyber-Physical Framework for Data Assurance and Emergency Response Readiness in Critical Energy Infrastructure." Journal of Engineering and Applied Sciences 4, no. 1 (2025): 1–10. https://doi.org/10.70560/6ag3wg21.
Full textGrant Quansah, Samuel. "Securing Oil & Gas Digital Supply Chains: A Vendor Risk Management Framework for IoT and Cyber-Physical Systems." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 8, no. 1 (2025): 264–80. https://doi.org/10.60087/jaigs.v8i1.389.
Full textShaaban, Abdelkader Magdy, Sebastian Chlup, Nahla El-Araby, and Christoph Schmittner. "Towards Optimized Security Attributes for IoT Devices in Smart Agriculture Based on the IEC 62443 Security Standard." Applied Sciences 12, no. 11 (2022): 5653. http://dx.doi.org/10.3390/app12115653.
Full textMarjanovic, Jelena, Nikola Dalcekovic, and Goran Sladic. "Blockchain-based model for tracking compliance with security requirements." Computer Science and Information Systems, no. 00 (2022): 60. http://dx.doi.org/10.2298/csis210923060m.
Full textMateo Sanguino, Tomás de J. "Enhancing Security in Industrial Application Development: Case Study on Self-Generating Artificial Intelligence Tools." Applied Sciences 14, no. 9 (2024): 3780. http://dx.doi.org/10.3390/app14093780.
Full textMugarza, Imanol, Jose Luis Flores, and Jose Luis Montero. "Security Issues and Software Updates Management in the Industrial Internet of Things (IIoT) Era." Sensors 20, no. 24 (2020): 7160. http://dx.doi.org/10.3390/s20247160.
Full textKristen, Erwin, Reinhard Kloibhofer, Vicente Hernández Díaz, and Pedro Castillejo. "Security Assessment of Agriculture IoT (AIoT) Applications." Applied Sciences 11, no. 13 (2021): 5841. http://dx.doi.org/10.3390/app11135841.
Full textEgho-Promise, Ehigiator, Emmanuel Lyada, and Folayo Aina. "Towards Improved Vulnerability Management in Digital Environments: A Comprehensive Framework for Cyber Security Enhancement." International Research Journal of Computer Science 11, no. 05 (2024): 441–49. http://dx.doi.org/10.26562/irjcs.2024.v1105.01.
Full textAbergos, Van Joshua, and Faiza Medjek. "A Risk Assessment Analysis to Enhance the Security of OT WAN with SD-WAN." Journal of Cybersecurity and Privacy 4, no. 4 (2024): 910–37. http://dx.doi.org/10.3390/jcp4040042.
Full textChen, Ying-Chin, Chia-Hao Cheng, Tzu-Wei Lin, and Jung-San Lee. "Diverse Machine Learning-Based Malicious Detection for Industrial Control System." Electronics 14, no. 10 (2025): 1947. https://doi.org/10.3390/electronics14101947.
Full textOlaitan, Ololade Funke, Ogheneruemu Nathaniel Akatakpo, Chukwujama Osinachi Victor, et al. "Secure and Resilient Industrial IoT Architectures for Smart Manufacturing: A Comprehensive Review." Journal of Engineering Research and Reports 27, no. 6 (2025): 331–44. https://doi.org/10.9734/jerr/2025/v27i61548.
Full textGrant Quansah, Samuel. "Autonomous Cybersecurity for Edge Devices in Remote Oil & Gas Operations: A Resilience Framework for Low-Connectivity Environments." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 8, no. 02 (2025): 65–80. https://doi.org/10.60087/jaigs.v8i02.390.
Full textHalenar, Igor, Lenka Halenarova, and Pavol Tanuska. "Communication Safety of Cybernetic Systems in a Smart Factory Environment." Machines 11, no. 3 (2023): 379. http://dx.doi.org/10.3390/machines11030379.
Full textMalatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Full textMalatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Full textHaridy, Ahmed Abuelfadl Ahmed. "Integrated Policing in Critical Infrastructure Protection: Bridging Intelligence and Field Operations." American Journal of Political Science Law and Criminology 07, no. 05 (2025): 206–15. https://doi.org/10.37547/tajpslc/volume07issue05-22.
Full textKovalenko, O. Ye. "Security models of the Internet of Things." Mathematical machines and systems 4 (2023): 43–50. http://dx.doi.org/10.34121/1028-9763-2023-4-43-50.
Full textStojkov, Milan, Nikola Dalčeković, Branko Markoski, Branko Milosavljević, and Goran Sladić. "Towards Cross-Standard Compliance Readiness: Security Requirements Model for Smart Grid." Energies 14, no. 21 (2021): 6862. http://dx.doi.org/10.3390/en14216862.
Full textFigueroa-Lorenzo, Añorga, and Arrizabalaga. "A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach." Sensors 19, no. 20 (2019): 4455. http://dx.doi.org/10.3390/s19204455.
Full textNuruzzaman, Md, and Sohel Rana. "IOT-ENABLED CONDITION MONITORING IN POWER DISTRIBUTION SYSTEMS: A REVIEW OF SCADA-BASED AUTOMATION, REAL-TIME DATA ANALYTICS, AND CYBER-PHYSICAL SECURITY CHALLENGES." Journal of Sustainable Development and Policy 01, no. 01 (2025): 25–43. https://doi.org/10.63125/pyd1x841.
Full textCarpenter, Chris. "Industrial Cybersecurity, Process Safety, and Human Factors: A 360° Approach." Journal of Petroleum Technology 76, no. 08 (2024): 79–82. http://dx.doi.org/10.2118/0824-0079-jpt.
Full textJohansson, Erik. "Securing the industrial cyber space with IEC 62443." Engineering & Technology Reference, March 2, 2016. http://dx.doi.org/10.1049/etr.2015.0140.
Full textDa Silva, Mike, Stéphane Mocanu, Maxime Puys, and Pierre-Henri Thevenon. "Safety-security convergence: Automation of IEC 62443-3-2." Computers & Security, April 2025, 104477. https://doi.org/10.1016/j.cose.2025.104477.
Full textFeistle, Friedrich, Martin Kursawe, Daniel Luedicke, and Juergen Sept. "OT-Security – Harmonisierter Bedrohungskatalog am Beispiel Schienenfahrzeuge." ZEVrail Zeitschrift für das gesamte System Bahn, 2024. https://doi.org/10.62682/vftn3956.
Full textKemp, Robert, and Richard Smith. "Audit, Validation, Verification and Assessment for Safety and Security Standards." Journal of Cybersecurity and Information Management, 2021, 22–50. http://dx.doi.org/10.54216/jcim.070103.
Full textGaggero, Giovanni Battista, Alessandro Armellin, Paola Girdinio, and Mario Marchese. "An IEC 62443-Based Framework for Secure-by-Desing Energy Communities." IEEE Access, 2024, 1. http://dx.doi.org/10.1109/access.2024.3492316.
Full textPantoni, Rodrigo Palucci, Eduardo André Mossin, Victor Teixeira C. Halfeld, et al. "Design and implementation of O-PAS user-defined function blocks." Journal of Electrical Systems and Information Technology 11, no. 1 (2024). https://doi.org/10.1186/s43067-024-00183-9.
Full textMakrakis, Georgios Michail, Dakota Roberson, Constantinos Kolias, and Dallin Cook. "Evaluation of SDN security measures in the context of IEC 62443-3-3." International Journal of Critical Infrastructure Protection, August 2024, 100716. http://dx.doi.org/10.1016/j.ijcip.2024.100716.
Full textHazell, Peter M. C. "Integrating IEC 62443 cyber security with existing industrial process and functional safety management systems." Engineering & Technology Reference 1, no. 1 (2012). http://dx.doi.org/10.1049/etr.2016.0029.
Full textAbraham, Doney, Øyvind Toftegaard, Binu Ben Jose D. R., Alemayehu Gebremedhin, and Sule Yildirim Yayilgan. "Consequence simulation of cyber attacks on key smart grid business cases." Frontiers in Energy Research 12 (July 3, 2024). http://dx.doi.org/10.3389/fenrg.2024.1395954.
Full textHoff, Rainer, and Kathy Shell. "Environmental, social, governance: The future of process safety management or repeat of the past?" Process Safety Progress, September 16, 2023. http://dx.doi.org/10.1002/prs.12535.
Full textMirko, Caruso. "Progettazione di Sicurezza in Operational Technology: Applicazioni Militari dello Standard ISA-62443." November 8, 2023. https://doi.org/10.5281/zenodo.10085676.
Full textBrancati, Francesco, Diamantea Mongelli, Francesco Mariotti, and Paolo Lollini. "A cybersecurity risk assessment methodology for industrial automation control systems." International Journal of Information Security 24, no. 2 (2025). https://doi.org/10.1007/s10207-025-00990-9.
Full textFernández Píriz, Lourdes, Ramón García, and Juan Manuel Escaño González. "Protecci´on de sistemas dom´oticos frente a ciberataques mediante sistemas de inferencia neuroborrosos." Simposios del Comité Español de Automática (CEA) 1, no. 2 (2025). https://doi.org/10.64117/simposioscea.v1i2.99.
Full text