Journal articles on the topic 'Industrial cybersecurity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Industrial cybersecurity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shikhaliyev, Ramiz. "CYBERSECURITY ANALYSIS OF INDUSTRIAL CONTROL SYSTEMS." Problems of Information Society 14, no. 2 (2023): 47–54. http://dx.doi.org/10.25045/jpis.v14.i2.06.
Full textKind, Andreas. "The Power of Industrial Cybersecurity." Digitale Welt 5, no. 1 (2020): 18–21. http://dx.doi.org/10.1007/s42354-020-0316-2.
Full textPOCHMARA, Janusz. "Industrial cybersecurity and machine learning." PRZEGLĄD ELEKTROTECHNICZNY 1, no. 4 (2025): 86–90. https://doi.org/10.15199/48.2025.04.16.
Full textMerzlikin, Eugene, and Ievgen Babeshko. "CYBERSECURITY ANALYSIS OF WEB-ORIENTED INDUSTRIAL IOT-SYSTEMS." Innovative Technologies and Scientific Solutions for Industries, no. 2 (24) (August 5, 2023): 131–44. http://dx.doi.org/10.30837/itssi.2023.24.131.
Full textShikhaliyev, Ramiz H. "CYBERSECURITY RISKS MANAGEMENT OF INDUSTRIAL CONTROL SYSTEMS: A REVIEW." Problems of Information Technology 15, no. 1 (2024): 37–43. http://dx.doi.org/10.25045/jpit.v15.i1.05.
Full textTimmers, Paul. "The European Union’s cybersecurity industrial policy." Journal of Cyber Policy 3, no. 3 (2018): 363–84. http://dx.doi.org/10.1080/23738871.2018.1562560.
Full textGoebel, Kai, and Shantanu Rane. "AI in Industrial IoT Cybersecurity [Industrial and Governmental Activities]." IEEE Computational Intelligence Magazine 19, no. 1 (2024): 14–15. http://dx.doi.org/10.1109/mci.2023.3332547.
Full textDorage, Sachin Vasant. "Cybersecurity in Industrial Management within the Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–16. http://dx.doi.org/10.55041/ijsrem37081.
Full textCarpenter, Chris. "Industrial Cybersecurity, Process Safety, and Human Factors: A 360° Approach." Journal of Petroleum Technology 76, no. 08 (2024): 79–82. http://dx.doi.org/10.2118/0824-0079-jpt.
Full textMorozova, Olga, Andrii Nicheporuk, Artem Tetskyi, and Vitalii Tkachov. "Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 4 (November 29, 2021): 145–56. http://dx.doi.org/10.32620/reks.2021.4.12.
Full textAUFFRET, JEAN-PIERRE, JANE L. SNOWDON, ANGELOS STAVROU, et al. "Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems." Journal of Interconnection Networks 17, no. 01 (2017): 1740001. http://dx.doi.org/10.1142/s0219265917400011.
Full textShen, Guowei, Wanling Wang, Qilin Mu, Yanhong Pu, Ya Qin, and Miao Yu. "Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security." Wireless Communications and Mobile Computing 2020 (December 26, 2020): 1–13. http://dx.doi.org/10.1155/2020/8883696.
Full textPochmara, Janusz, and Aleksandra Świetlicka. "Cybersecurity of Industrial Systems—A 2023 Report." Electronics 13, no. 7 (2024): 1191. http://dx.doi.org/10.3390/electronics13071191.
Full textStouffer, Keith, and Rick Candell. "Measuring Impact of Cybersecurity on the Performance of Industrial Control Systems." Mechanical Engineering 136, no. 12 (2014): S4—S7. http://dx.doi.org/10.1115/1.2014-dec-5.
Full textJOVE PEREZ, ESTEBAN, JOSE LUIS CALVO ROLLE, DANIEL URDA MUÑOZ, ALVARO HERRERO COSIO, URKO ZURUTUZA, and VALENTINA CASOLA. "RECENT ADVANCES IN THE APPLICATION OF DATA SCIENCE TO INDUSTRIAL CYBERSECURITY." DYNA 96, no. 3 (2021): 231–32. http://dx.doi.org/10.6036/10178.
Full textByung Woon Kim. "Cybersecurity Policy for Hyper-connected Industrial Society." 과학기술법연구 22, no. 3 (2016): 85–122. http://dx.doi.org/10.32430/ilst.2016.22.3.85.
Full textKasprzyczak, Leszek, Anna Manowska, and Marek Dźwiarek. "Cybersecurity Requirements for Industrial Machine Control Systems." Applied Sciences 15, no. 3 (2025): 1267. https://doi.org/10.3390/app15031267.
Full textMcLaughlin, Stephen, Charalambos Konstantinou, Xueyang Wang, et al. "The Cybersecurity Landscape in Industrial Control Systems." Proceedings of the IEEE 104, no. 5 (2016): 1039–57. http://dx.doi.org/10.1109/jproc.2015.2512235.
Full textBhamare, Deval, Maede Zolanvari, Aiman Erbad, Raj Jain, Khaled Khan, and Nader Meskin. "Cybersecurity for industrial control systems: A survey." Computers & Security 89 (February 2020): 101677. http://dx.doi.org/10.1016/j.cose.2019.101677.
Full textLees, Michael J., Melissa Crawford, and Christoph Jansen. "Towards Industrial Cybersecurity Resilience of Multinational Corporations." IFAC-PapersOnLine 51, no. 30 (2018): 756–61. http://dx.doi.org/10.1016/j.ifacol.2018.11.201.
Full textHaas, Christian, Georg Bretthauer, and Jürgen Beyerer. "Cybersecurity for industrial automation and control systems." at - Automatisierungstechnik 71, no. 9 (2023): 723–25. http://dx.doi.org/10.1515/auto-2023-0141.
Full textMcBride, Sean, Corey Schou, and Jill Slay. "Vertically Integrated Pathway for Infusing Engineering Technicians with Industrial Cybersecurity Competencies." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (2022): 8. http://dx.doi.org/10.53735/cisse.v9i1.135.
Full textAlashi, Shahad A., and Dhuha H. Badi. "The Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations." Journal of Information Security and Cybercrimes Research 3, no. 1 (2020): 97–112. http://dx.doi.org/10.26735/eint7997.
Full textShikhaliyev, Ramiz. "USING MACHINE LEARNING METHODS FOR INDUSTRIAL CONTROL SYSTEMS INTRUSION DETECTION." Problems of Information Technology 14, no. 2 (2023): 37–48. http://dx.doi.org/10.25045/jpit.v14.i2.05.
Full textLi, Angze. "Research on Cyberspace Protection Strategy of Industrial Enterprises under the Background of Digital Transformation—China National Petroleum Corporation Case Study." SHS Web of Conferences 208 (2024): 04007. https://doi.org/10.1051/shsconf/202420804007.
Full textClim, Antonio, Andrei Toma, Răzvan Daniel Zota, and Radu Constantinescu. "The Need for Cybersecurity in Industrial Revolution and Smart Cities." Sensors 23, no. 1 (2022): 120. http://dx.doi.org/10.3390/s23010120.
Full textMikkelsplass, Stine Aurora, John Eidar Simensen, and Ricardo Colomo-Palacios. "Software and Systems Engineers in ICS Security." International Journal of Human Capital and Information Technology Professionals 14, no. 1 (2023): 1–17. http://dx.doi.org/10.4018/ijhcitp.333857.
Full textRaimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (2022): 1598. http://dx.doi.org/10.3390/app12031598.
Full textIbitamuno, Pamela Victor. "Legal Frameworks for Cybersecurity in Nigeria - Adapting The Fourth Industrial Revolution." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 1 (2023): 97–104. http://dx.doi.org/10.22624/aims/csean-smart2023p12.
Full textKristen, Erwin, Reinhard Kloibhofer, Vicente Hernández Díaz, and Pedro Castillejo. "Security Assessment of Agriculture IoT (AIoT) Applications." Applied Sciences 11, no. 13 (2021): 5841. http://dx.doi.org/10.3390/app11135841.
Full textDomínguez, Manuel, Juan J. Fuertes, Miguel A. Prada, Serafín Alonso, Antonio Morán, and Daniel Pérez. "Design of Platforms for Experimentation in Industrial Cybersecurity." Applied Sciences 12, no. 13 (2022): 6520. http://dx.doi.org/10.3390/app12136520.
Full textDomínguez, Manuel, Daniel Pérez, Antonio Morán, Serafín Alonso, Miguel A. Prada, and Juan J. Fuertes. "Remote training in cybersecurity for industrial control systems." IFAC-PapersOnLine 55, no. 17 (2022): 320–25. http://dx.doi.org/10.1016/j.ifacol.2022.09.299.
Full textLiu, I.-Hsien, Li-Yin Chang, Jung-Shian Li, and Chuan-Gang Liu. "Industrial Control System Cybersecurity Testbed with TSN Feature." Proceedings of International Conference on Artificial Life and Robotics 27 (January 20, 2022): 291–94. http://dx.doi.org/10.5954/icarob.2022.os25-2.
Full textAggarwal, Vinod K., and Andrew W. Reddie. "Comparative industrial policy and cybersecurity: the US case." Journal of Cyber Policy 3, no. 3 (2018): 445–66. http://dx.doi.org/10.1080/23738871.2018.1551910.
Full textHa, Do Thu, Nguyen Xuan Hoang, Nguyen Viet Hoang, Nguyen Huu Du, Truong Thu Huong, and Kim Phuc Tran. "Explainable Anomaly Detection for Industrial Control System Cybersecurity." IFAC-PapersOnLine 55, no. 10 (2022): 1183–88. http://dx.doi.org/10.1016/j.ifacol.2022.09.550.
Full textCanto, Carlos J. Del, Miguel A. Prada, Juan J. Fuertes, Serafín Alonso, and Manuel Domínguez. "Remote Laboratory for Cybersecurity of Industrial Control Systems." IFAC-PapersOnLine 48, no. 29 (2015): 13–18. http://dx.doi.org/10.1016/j.ifacol.2015.11.206.
Full textBAURINA, Svetlana Borisovna, and Olga Alexandrovna ELINA. "CYBERSECURITY REALITIES AND RESOURCES OF THE INDUSTRIAL MARKET." Azimuth of Scientific Research: Economics and Administration 12, no. 1 (2023): 12–17. http://dx.doi.org/10.57145/27128482_2023_12_01_02.
Full textKouari, Oumaima El, Saiida Lazaar, and Tarik Achoughi. "Fortifying industrial cybersecurity: a novel industrial internet of things architecture enhanced by honeypot integration." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 1089. http://dx.doi.org/10.11591/ijece.v15i1.pp1089-1098.
Full textSimola, Jussi, Arttu Takala, Riku Lehkonen, Tapio Frantti, and Reijo Savola. "The Importance of Cybersecurity Governance Model in Operational Technology Environments." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 506–15. http://dx.doi.org/10.34190/eccws.23.1.2272.
Full textJyothsna, Devi Dontha. "Cybersecurity Best Practices For Industrial Automation in Smart Data Centers." International Journal on Science and Technology 12, no. 4 (2021): 1–10. https://doi.org/10.5281/zenodo.14752361.
Full textArifin, Syamsul, Agus H. Sulistiyono Reksoprodjo, and Fauzia Gustarina Cempaka Timur. "Cybersecurity Strategy in Financial Application Systems in the Era of Industrial Revolution 4.0." International Journal of Integrative Research 2, no. 1 (2024): 57–72. http://dx.doi.org/10.59890/ijir.v2i1.1172.
Full textKouari, Oumaima El, Saiida Lazaar, and Tarik Achoughi. "Fortifying industrial cybersecurity: a novel industrial internet of things architecture enhanced by honeypot integration." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 1089–98. https://doi.org/10.11591/ijece.v15i1.pp1089-1098.
Full textAnwar, Raja W., Yasmine Souissi, and Saqib Ali. "Cyber Threats and Vulnerabilities in Industry 5.0: A Review." Arab Journal of Administrative Sciences 32, no. 2 (2025): 435–54. https://doi.org/10.34120/ajas.v32i2.1289.
Full textTari Yvonne Elete. "Impact of ransomware on industrial control systems in the oil and gas sector: Security challenges and strategic mitigations." Computer Science & IT Research Journal 5, no. 12 (2024): 2664–81. https://doi.org/10.51594/csitrj.v5i12.1759.
Full textNasir, Abdul, Naeem Jan, Abdu Gumaei, Sami Ullah Khan, and Fahad R. Albogamy. "Cybersecurity against the Loopholes in Industrial Control Systems Using Interval-Valued Complex Intuitionistic Fuzzy Relations." Applied Sciences 11, no. 16 (2021): 7668. http://dx.doi.org/10.3390/app11167668.
Full textRaveling, Alan, and Yanzhen Qu. "Quantifying the Effects of Operational Technology or Industrial Control System based Cybersecurity Controls via CVSS Scoring." European Journal of Electrical Engineering and Computer Science 7, no. 4 (2023): 1–6. http://dx.doi.org/10.24018/ejece.2023.7.4.546.
Full textBoeding, Matthew, Kelly Boswell, Michael Hempel, Hamid Sharif, Juan Lopez, and Kalyan Perumalla. "Survey of Cybersecurity Governance, Threats, and Countermeasures for the Power Grid." Energies 15, no. 22 (2022): 8692. http://dx.doi.org/10.3390/en15228692.
Full textJia, Chengbo. "Research on Industrial Internet Intrusion Detection Based on Deep Learning Algorithms." Applied and Computational Engineering 133, no. 1 (2025): 33–37. https://doi.org/10.54254/2755-2721/2025.20597.
Full textHaleem, Abid, Mohd Javaid, Ravi Pratap Singh, Shanay Rab, and Rajiv Suman. "Perspectives of cybersecurity for ameliorative Industry 4.0 era: a review-based framework." Industrial Robot: the international journal of robotics research and application 49, no. 3 (2022): 582–97. http://dx.doi.org/10.1108/ir-10-2021-0243.
Full textZhu, Qianxiang, Yuanqing Qin, Chunjie Zhou, and Weiwei Gao. "Extended multilevel flow model-based dynamic risk assessment for cybersecurity protection in industrial production systems." International Journal of Distributed Sensor Networks 14, no. 6 (2018): 155014771877956. http://dx.doi.org/10.1177/1550147718779564.
Full text