To see the other types of publications on this topic, follow the link: Industrial cybersecurity.

Journal articles on the topic 'Industrial cybersecurity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Industrial cybersecurity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shikhaliyev, Ramiz. "CYBERSECURITY ANALYSIS OF INDUSTRIAL CONTROL SYSTEMS." Problems of Information Society 14, no. 2 (2023): 47–54. http://dx.doi.org/10.25045/jpis.v14.i2.06.

Full text
Abstract:
The current frontiers in the description and simulation of advanced physical and biological Industrial control systems (ICS) used to control various critical industrial and social systems. ICS integrates modern computing, communication, and Internet technologies. The integration of these technologies makes ICS open to the outside world, which makes it vulnerable to various cyber-attacks. ICS’s cybersecurity is becoming one of the most important issues due to the significant damage caused by cyberattacks to organizations and society. This article analyzes the cybersecurity issues of ICS. In par
APA, Harvard, Vancouver, ISO, and other styles
2

Kind, Andreas. "The Power of Industrial Cybersecurity." Digitale Welt 5, no. 1 (2020): 18–21. http://dx.doi.org/10.1007/s42354-020-0316-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

POCHMARA, Janusz. "Industrial cybersecurity and machine learning." PRZEGLĄD ELEKTROTECHNICZNY 1, no. 4 (2025): 86–90. https://doi.org/10.15199/48.2025.04.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Merzlikin, Eugene, and Ievgen Babeshko. "CYBERSECURITY ANALYSIS OF WEB-ORIENTED INDUSTRIAL IOT-SYSTEMS." Innovative Technologies and Scientific Solutions for Industries, no. 2 (24) (August 5, 2023): 131–44. http://dx.doi.org/10.30837/itssi.2023.24.131.

Full text
Abstract:
In modern world cybersecurity ensuring is one of the most crucial issues, especially in the context of the dynamic development of web-oriented industrial Internet of Things (IoT) systems. The subject of research of the paper is cybersecurity ensuring of web-oriented industrial IoT systems. The purpose of the paper is to analyze existing methods of cybersecurity analysis, identify limitations, and formulate requirements for a new assessment concept, which includes ways to eliminate identified limitations. Tasks to be solved: analysis of existing methods, tools and technologies for the organizat
APA, Harvard, Vancouver, ISO, and other styles
5

Shikhaliyev, Ramiz H. "CYBERSECURITY RISKS MANAGEMENT OF INDUSTRIAL CONTROL SYSTEMS: A REVIEW." Problems of Information Technology 15, no. 1 (2024): 37–43. http://dx.doi.org/10.25045/jpit.v15.i1.05.

Full text
Abstract:
Industrial control systems (ICS) form the basis of critical infrastructures, managing complex processes in various sectors of industry, energy, etc. With the increasing frequency and complexity of cyber threats, effective management of ICS cybersecurity risks is critical. This paper is devoted to the analysis of approaches used in the field of cybersecurity risk management of automated process control systems. The study examines the cybersecurity risks of ICS and the role of international standards in managing cybersecurity risks. The results of the analysis carried out in this paper can serve
APA, Harvard, Vancouver, ISO, and other styles
6

Timmers, Paul. "The European Union’s cybersecurity industrial policy." Journal of Cyber Policy 3, no. 3 (2018): 363–84. http://dx.doi.org/10.1080/23738871.2018.1562560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Goebel, Kai, and Shantanu Rane. "AI in Industrial IoT Cybersecurity [Industrial and Governmental Activities]." IEEE Computational Intelligence Magazine 19, no. 1 (2024): 14–15. http://dx.doi.org/10.1109/mci.2023.3332547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dorage, Sachin Vasant. "Cybersecurity in Industrial Management within the Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–16. http://dx.doi.org/10.55041/ijsrem37081.

Full text
Abstract:
Recently, it has become important to integrate cybersecurity threat management policies in the management of any organization that uses information systems, whether large, medium or even small organizations. People live in the center of the field of smart homes, business opportunities of smart industrial cities and healthcare. Even as IoT security issues become increasingly ubiquitousin the industrial realm, they face the added challenge of evolving networks. Architecture towards the integration of information technology (IT) and operational technology (OT) networks. This article analyzes the
APA, Harvard, Vancouver, ISO, and other styles
9

Carpenter, Chris. "Industrial Cybersecurity, Process Safety, and Human Factors: A 360° Approach." Journal of Petroleum Technology 76, no. 08 (2024): 79–82. http://dx.doi.org/10.2118/0824-0079-jpt.

Full text
Abstract:
_ This article, written by JPT Technology Editor Chris Carpenter, contains highlights of paper OTC 35396, “Industrial Cybersecurity, Process Safety, and Human Factors: A Comprehensive 360° Approach,” by Pedro F. Vieira, Lenissa P. Hilgert, and Ilton Majerowicz, Petrobras. The paper has not been peer reviewed. Copyright 2024 Offshore Technology Conference. _ The complete paper presents an integrated view of three key areas of knowledge that are typically addressed individually—cybersecurity, process safety, and human factors—from the perspective of cybersecurity. It discusses information techno
APA, Harvard, Vancouver, ISO, and other styles
10

Morozova, Olga, Andrii Nicheporuk, Artem Tetskyi, and Vitalii Tkachov. "Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 4 (November 29, 2021): 145–56. http://dx.doi.org/10.32620/reks.2021.4.12.

Full text
Abstract:
The subject matter of the article is methods and technologies of ensuring the cybersecurity of industrial and web-oriented systems and networks, training of cybersecurity specialists during the acquisition of professional knowledge. The purpose of the article is to ensure the cybersecurity of industrial and web-oriented systems and networks by developing and implementing appropriate methodologies (concepts, principles, set of models, methods) and technologies in the industry, as well as in training the cybersecurity specialists during the acquisition of professional knowledge. The problem of d
APA, Harvard, Vancouver, ISO, and other styles
11

AUFFRET, JEAN-PIERRE, JANE L. SNOWDON, ANGELOS STAVROU, et al. "Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems." Journal of Interconnection Networks 17, no. 01 (2017): 1740001. http://dx.doi.org/10.1142/s0219265917400011.

Full text
Abstract:
The extensive integration of interconnected devices and the inadvertent information obtained from untrusted sources has exposed the Industrial Control Systems (ICS) ecosystem to remote attacks by the exploitation of new and old vulnerabilities. Unfortunately, although recognized as an emerging risk based on the recent rise of cyber attacks, cybersecurity for ICS has not been addressed adequately both in terms of technology but, most importantly, in terms of organizational leadership and policy. In this paper, we will present our findings regarding the cybersecurity challenges for Smart Grid an
APA, Harvard, Vancouver, ISO, and other styles
12

Shen, Guowei, Wanling Wang, Qilin Mu, Yanhong Pu, Ya Qin, and Miao Yu. "Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security." Wireless Communications and Mobile Computing 2020 (December 26, 2020): 1–13. http://dx.doi.org/10.1155/2020/8883696.

Full text
Abstract:
Industrial control systems (ICS) involve many key industries, which once attacked will cause heavy losses. However, traditional passive defense methods of cybersecurity have difficulty effectively dealing with increasingly complex threats; a knowledge graph is a new idea to analyze and process data in cybersecurity analysis. We propose a novel overall framework of data-driven industrial control network security defense, which integrated fragmented multisource threat data with an industrial network layout by a cybersecurity knowledge graph. In order to better correlate data to construct a knowl
APA, Harvard, Vancouver, ISO, and other styles
13

Pochmara, Janusz, and Aleksandra Świetlicka. "Cybersecurity of Industrial Systems—A 2023 Report." Electronics 13, no. 7 (2024): 1191. http://dx.doi.org/10.3390/electronics13071191.

Full text
Abstract:
The article explores the importance of cybersecurity in Industry 4.0, specifically focusing on safeguarding industrial automation systems from cyberattacks. It discusses essential security measures, network monitoring, and employee training, emphasizing the significance of risk management for ensuring industry stability. Adherence to industrial security standards, such as ISA/IEC 62443, is crucial (ISA—International Society of Automation, IEC—International Electrotechnical Commission). The article outlines cyberthreat challenges and their impact on various sectors, including healthcare and fin
APA, Harvard, Vancouver, ISO, and other styles
14

Stouffer, Keith, and Rick Candell. "Measuring Impact of Cybersecurity on the Performance of Industrial Control Systems." Mechanical Engineering 136, no. 12 (2014): S4—S7. http://dx.doi.org/10.1115/1.2014-dec-5.

Full text
Abstract:
This article examines the impact of cybersecurity on the performance of industrial control systems (ICS). Control systems are embedded in essentially all engineered systems, such as our cars, homes, offices, industrial plants, and in critical infrastructures such as power plants, water treatment plants, and transportation systems. To ensure the security of ICS, particularly for critical infrastructures, standards are being developed to ensure ICS cybersecurity. The NIST ICS cybersecurity testbed will be constructed to facilitate the measurement of industrial process performance for systems ins
APA, Harvard, Vancouver, ISO, and other styles
15

JOVE PEREZ, ESTEBAN, JOSE LUIS CALVO ROLLE, DANIEL URDA MUÑOZ, ALVARO HERRERO COSIO, URKO ZURUTUZA, and VALENTINA CASOLA. "RECENT ADVANCES IN THE APPLICATION OF DATA SCIENCE TO INDUSTRIAL CYBERSECURITY." DYNA 96, no. 3 (2021): 231–32. http://dx.doi.org/10.6036/10178.

Full text
Abstract:
Over the last decades, the concept of cybersecurity has been gaining weight in many fields, such as industry or telecommunications, among others. Cybersecurity is defined as a set of processes and technologies designed to protect programs, computers, communication networks and data against attacks and/or unauthorized access, thus ensuring the confidentiality, integrity and availability of systems.
APA, Harvard, Vancouver, ISO, and other styles
16

Byung Woon Kim. "Cybersecurity Policy for Hyper-connected Industrial Society." 과학기술법연구 22, no. 3 (2016): 85–122. http://dx.doi.org/10.32430/ilst.2016.22.3.85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Kasprzyczak, Leszek, Anna Manowska, and Marek Dźwiarek. "Cybersecurity Requirements for Industrial Machine Control Systems." Applied Sciences 15, no. 3 (2025): 1267. https://doi.org/10.3390/app15031267.

Full text
Abstract:
The first part of this paper discusses the research context, taking a closer look at the development of Industry 4.0 and the growing importance of the IIoT, which entails new cybersecurity challenges. The issue of cyber threats and the need to increase the level of protection in machine control systems, which are particularly vulnerable to attacks due to their connection to the network, is also presented. The Introduction concludes with a presentation of the article’s objective, which is to analyze the requirements of security levels (SLs) and the implementation of relevant international stand
APA, Harvard, Vancouver, ISO, and other styles
18

McLaughlin, Stephen, Charalambos Konstantinou, Xueyang Wang, et al. "The Cybersecurity Landscape in Industrial Control Systems." Proceedings of the IEEE 104, no. 5 (2016): 1039–57. http://dx.doi.org/10.1109/jproc.2015.2512235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bhamare, Deval, Maede Zolanvari, Aiman Erbad, Raj Jain, Khaled Khan, and Nader Meskin. "Cybersecurity for industrial control systems: A survey." Computers & Security 89 (February 2020): 101677. http://dx.doi.org/10.1016/j.cose.2019.101677.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Lees, Michael J., Melissa Crawford, and Christoph Jansen. "Towards Industrial Cybersecurity Resilience of Multinational Corporations." IFAC-PapersOnLine 51, no. 30 (2018): 756–61. http://dx.doi.org/10.1016/j.ifacol.2018.11.201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Haas, Christian, Georg Bretthauer, and Jürgen Beyerer. "Cybersecurity for industrial automation and control systems." at - Automatisierungstechnik 71, no. 9 (2023): 723–25. http://dx.doi.org/10.1515/auto-2023-0141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

McBride, Sean, Corey Schou, and Jill Slay. "Vertically Integrated Pathway for Infusing Engineering Technicians with Industrial Cybersecurity Competencies." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (2022): 8. http://dx.doi.org/10.53735/cisse.v9i1.135.

Full text
Abstract:
This paper describes an effort to establish a vertically integrated pathway to identify and develop industrial control systems cybersecurity talent that extends from middle school to graduate degrees, leveraging the unique strengths of career and technical education. Educators and administrators seeking to ignite student interest in cybersecurity at a young age, and to provide a clear curriculum pathway to meet employer needs in the field of industrial cybersecurity may find this effort of use.
APA, Harvard, Vancouver, ISO, and other styles
23

Alashi, Shahad A., and Dhuha H. Badi. "The Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations." Journal of Information Security and Cybercrimes Research 3, no. 1 (2020): 97–112. http://dx.doi.org/10.26735/eint7997.

Full text
Abstract:
The study discusses the role of governance in the sustainability of cybersecurity for business corporations. Its objectives focus on tracking technology developments and their impact on industrial espionage attacks and theft of industrial intellectual property. It also identifies the indicators and effects of such espionage and theft on business corporations. The study is based on the content analysis methodology for analyzing intellectual production pertinent to cybersecurity governance and industrial cyber espionage. The study concludes that relying on information and communication technolog
APA, Harvard, Vancouver, ISO, and other styles
24

Shikhaliyev, Ramiz. "USING MACHINE LEARNING METHODS FOR INDUSTRIAL CONTROL SYSTEMS INTRUSION DETECTION." Problems of Information Technology 14, no. 2 (2023): 37–48. http://dx.doi.org/10.25045/jpit.v14.i2.05.

Full text
Abstract:
In recent decades, information technology has been integrated into industrial control systems (ICS). At the same time, there was a connection of the ICS to the Internet and a transition to cloud computing. Consequently, new vulnerabilities and threats to sophisticated cyberattacks have emerged that create significant risks for the cybersecurity of ICS, and the old security model based on the isolation of ICS is no longer able to ensure their cybersecurity. This situation makes it very important to intellectualize the cybersecurity of ICS, for which machine learning (ML) methods are used. The u
APA, Harvard, Vancouver, ISO, and other styles
25

Li, Angze. "Research on Cyberspace Protection Strategy of Industrial Enterprises under the Background of Digital Transformation—China National Petroleum Corporation Case Study." SHS Web of Conferences 208 (2024): 04007. https://doi.org/10.1051/shsconf/202420804007.

Full text
Abstract:
This research uses the China National Petroleum Corporation (CNPC) as a case study to explore the cybersecurity measures of industrial businesses amid digital transformation. As the rapid adoption of digital technologies reshapes the oil and gas sector, the study underscores the critical importance of robust cybersecurity frameworks. The case description delves into CNPC’s current state of development, and the significant cybersecurity challenges it faces during its digital transition, such as internal threats, outdated infrastructure, and vulnerabilities in industrial control systems. The stu
APA, Harvard, Vancouver, ISO, and other styles
26

Clim, Antonio, Andrei Toma, Răzvan Daniel Zota, and Radu Constantinescu. "The Need for Cybersecurity in Industrial Revolution and Smart Cities." Sensors 23, no. 1 (2022): 120. http://dx.doi.org/10.3390/s23010120.

Full text
Abstract:
Cities have grown in development and sophistication throughout human history. Smart cities are the current incarnation of this process, with increased complexity and social importance. This complexity has come to involve significant digital components and has thus come to raise the associated cybersecurity concerns. Major security relevant events can cascade into the connected systems making up a smart city, causing significant disruption of function and economic damage. The present paper aims to survey the landscape of scientific publication related to cybersecurity-related issues in relation
APA, Harvard, Vancouver, ISO, and other styles
27

Mikkelsplass, Stine Aurora, John Eidar Simensen, and Ricardo Colomo-Palacios. "Software and Systems Engineers in ICS Security." International Journal of Human Capital and Information Technology Professionals 14, no. 1 (2023): 1–17. http://dx.doi.org/10.4018/ijhcitp.333857.

Full text
Abstract:
The introduction of Industry 4.0 and IIoT has enabled the interconnection of information technology (IT) and operational technology (OT) and exposed industrial control systems to cyber threats. Industrial cybersecurity requires knowledge, skill, and collaboration between IT and OT. A comparison of graduate curricula of software engineering and systems engineering identifies competencies related to industrial control systems cybersecurity. Industry experts are interviewed to identify needs for cybersecurity skills and competencies. Results from the mapping are discussed in the context of softwa
APA, Harvard, Vancouver, ISO, and other styles
28

Raimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (2022): 1598. http://dx.doi.org/10.3390/app12031598.

Full text
Abstract:
Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limi
APA, Harvard, Vancouver, ISO, and other styles
29

Ibitamuno, Pamela Victor. "Legal Frameworks for Cybersecurity in Nigeria - Adapting The Fourth Industrial Revolution." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 1 (2023): 97–104. http://dx.doi.org/10.22624/aims/csean-smart2023p12.

Full text
Abstract:
In this article titled "The Legal Framework for Cybersecurity in Nigeria: Adapting the Fourth Industrial Revolution," the author explores the legal landscape governing cybersecurity in Nigeria in the context of the Fourth Industrial Revolution (Industry 4.0). The Fourth Industrial Revolution is characterized by the integration of digital technologies such as the Internet of Things, cyber-physical systems, and cloud computing, which has created a hyper-connected system. As this revolution progresses, cybersecurity becomes critical to ensuring the security of the digital space. The article empha
APA, Harvard, Vancouver, ISO, and other styles
30

Kristen, Erwin, Reinhard Kloibhofer, Vicente Hernández Díaz, and Pedro Castillejo. "Security Assessment of Agriculture IoT (AIoT) Applications." Applied Sciences 11, no. 13 (2021): 5841. http://dx.doi.org/10.3390/app11135841.

Full text
Abstract:
Cybersecurity is an important field in our digital world. It protects computer systems and communication networks against theft or sabotage of information to guarantee trouble-free operation in a trustworthy working environment. This article gives an overview of a cybersecurity assessment process and an appropriate Cybersecurity Management (CSM) implementation for future digital agriculture applications. The cybersecurity assessment follows the IEC 62443 cybersecurity standard for Industrial Automation Control Systems (IACS), adapted to Agriculture Automation Control Systems (AACS). However, t
APA, Harvard, Vancouver, ISO, and other styles
31

Domínguez, Manuel, Juan J. Fuertes, Miguel A. Prada, Serafín Alonso, Antonio Morán, and Daniel Pérez. "Design of Platforms for Experimentation in Industrial Cybersecurity." Applied Sciences 12, no. 13 (2022): 6520. http://dx.doi.org/10.3390/app12136520.

Full text
Abstract:
The connectivity advances in industrial control systems have also increased the possibility of cyberattacks in industry. Thus, security becomes crucial in critical infrastructures, whose services are considered essential in fields such as manufacturing, energy or public health. Although theoretical and formal approaches are often proposed to advance in the field of industrial cybersecurity, more experimental efforts in realistic scenarios are needed to understand the impact of incidents, assess security technologies or provide training. In this paper, an approach for cybersecurity experimentat
APA, Harvard, Vancouver, ISO, and other styles
32

Domínguez, Manuel, Daniel Pérez, Antonio Morán, Serafín Alonso, Miguel A. Prada, and Juan J. Fuertes. "Remote training in cybersecurity for industrial control systems." IFAC-PapersOnLine 55, no. 17 (2022): 320–25. http://dx.doi.org/10.1016/j.ifacol.2022.09.299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Liu, I.-Hsien, Li-Yin Chang, Jung-Shian Li, and Chuan-Gang Liu. "Industrial Control System Cybersecurity Testbed with TSN Feature." Proceedings of International Conference on Artificial Life and Robotics 27 (January 20, 2022): 291–94. http://dx.doi.org/10.5954/icarob.2022.os25-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Aggarwal, Vinod K., and Andrew W. Reddie. "Comparative industrial policy and cybersecurity: the US case." Journal of Cyber Policy 3, no. 3 (2018): 445–66. http://dx.doi.org/10.1080/23738871.2018.1551910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ha, Do Thu, Nguyen Xuan Hoang, Nguyen Viet Hoang, Nguyen Huu Du, Truong Thu Huong, and Kim Phuc Tran. "Explainable Anomaly Detection for Industrial Control System Cybersecurity." IFAC-PapersOnLine 55, no. 10 (2022): 1183–88. http://dx.doi.org/10.1016/j.ifacol.2022.09.550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Canto, Carlos J. Del, Miguel A. Prada, Juan J. Fuertes, Serafín Alonso, and Manuel Domínguez. "Remote Laboratory for Cybersecurity of Industrial Control Systems." IFAC-PapersOnLine 48, no. 29 (2015): 13–18. http://dx.doi.org/10.1016/j.ifacol.2015.11.206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

BAURINA, Svetlana Borisovna, and Olga Alexandrovna ELINA. "CYBERSECURITY REALITIES AND RESOURCES OF THE INDUSTRIAL MARKET." Azimuth of Scientific Research: Economics and Administration 12, no. 1 (2023): 12–17. http://dx.doi.org/10.57145/27128482_2023_12_01_02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kouari, Oumaima El, Saiida Lazaar, and Tarik Achoughi. "Fortifying industrial cybersecurity: a novel industrial internet of things architecture enhanced by honeypot integration." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 1089. http://dx.doi.org/10.11591/ijece.v15i1.pp1089-1098.

Full text
Abstract:
The industrial internet of things (IIoT) has significantly transformed the industrial sectors by connecting devices, machines, and systems to enhance automation, efficiency, and decision-making. However, the increased interconnectivity also poses significant security challenges because IIoT devices control critical infrastructures and processes. Our work presents an implementation of a robust industrial cybersecurity strategy with a segmented network architecture, collaborative efforts between information technology (IT) and operational technology (OT) teams for enhanced resilience and effecti
APA, Harvard, Vancouver, ISO, and other styles
39

Simola, Jussi, Arttu Takala, Riku Lehkonen, Tapio Frantti, and Reijo Savola. "The Importance of Cybersecurity Governance Model in Operational Technology Environments." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 506–15. http://dx.doi.org/10.34190/eccws.23.1.2272.

Full text
Abstract:
There is a common will to unify regulation in the Western world regarding overall security, including cybersecurity. European cyber security regulations aim to create a foundation and guidelines for international standards in various industries and the operation of critical infrastructure. Protected critical infrastructure is a common goal for Western allies. Allies of NATO and EU member states mainly support the anti-aggression policy in Europe. The unstable situation in the world forces states to find solutions that represent the thoughts of the allies. Defending common values is crucial whe
APA, Harvard, Vancouver, ISO, and other styles
40

Jyothsna, Devi Dontha. "Cybersecurity Best Practices For Industrial Automation in Smart Data Centers." International Journal on Science and Technology 12, no. 4 (2021): 1–10. https://doi.org/10.5281/zenodo.14752361.

Full text
Abstract:
This paper explores the best practices for cybersecurity in industrial automation systems within smart data centers, focusing on the protection of critical infrastructure and the prevention of cyber threats. As industries increasingly adopt automation technologies, securing industrial control systems and data centers from cyberattacks has become a top priority. This paper identifies common vulnerabilities, assesses the potential impact of security breaches, and proposes practical cybersecurity strategies. It further discusses the role of IoT, AI, and machine learning in enhancing security fram
APA, Harvard, Vancouver, ISO, and other styles
41

Arifin, Syamsul, Agus H. Sulistiyono Reksoprodjo, and Fauzia Gustarina Cempaka Timur. "Cybersecurity Strategy in Financial Application Systems in the Era of Industrial Revolution 4.0." International Journal of Integrative Research 2, no. 1 (2024): 57–72. http://dx.doi.org/10.59890/ijir.v2i1.1172.

Full text
Abstract:
In the Industrial Revolution 4.0 era, the development of information technology has had a significant impact on financial application systems. Along with these advances, cybersecurity risks are also increasing. This journal aims to investigate and analyze effective cyber security strategies in financial application systems in the Industrial Revolution 4.0 era. This research methodology uses a quasi-qualitative research method. Through in-depth interviews, observations, and engaging in-depth literature surveys to understand current trends in cyber security, their application to the financial se
APA, Harvard, Vancouver, ISO, and other styles
42

Kouari, Oumaima El, Saiida Lazaar, and Tarik Achoughi. "Fortifying industrial cybersecurity: a novel industrial internet of things architecture enhanced by honeypot integration." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 1089–98. https://doi.org/10.11591/ijece.v15i1.pp1089-1098.

Full text
Abstract:
The industrial internet of things (IIoT) has significantly transformed the industrial sectors by connecting devices, machines, and systems to enhance automation, efficiency, and decision-making. However, the increased interconnectivity also poses significant security challenges because IIoT devices control critical infrastructures and processes. Our work presents an implementation of a robust industrial cybersecurity strategy with a segmented network architecture, collaborative efforts between information technology (IT) and operational technology (OT) teams
APA, Harvard, Vancouver, ISO, and other styles
43

Anwar, Raja W., Yasmine Souissi, and Saqib Ali. "Cyber Threats and Vulnerabilities in Industry 5.0: A Review." Arab Journal of Administrative Sciences 32, no. 2 (2025): 435–54. https://doi.org/10.34120/ajas.v32i2.1289.

Full text
Abstract:
Purpose: This study aims to explore the cybersecurity threats and vulnerabilities unique to Industry 5.0, emphasizing the need for a robust security framework to protect human-machine interactions and industrial systems.Study design/methodology/approach: This review adopts a systematic analysis of existing literature, identifying security risks, challenges, and potential countermeasures within Industry 5.0. The study synthesizes findings from peer-reviewed journals, industry reports, and case studies to provide a comprehensive assessment of cybersecurity concerns in this emerging paradigm.Samp
APA, Harvard, Vancouver, ISO, and other styles
44

Tari Yvonne Elete. "Impact of ransomware on industrial control systems in the oil and gas sector: Security challenges and strategic mitigations." Computer Science & IT Research Journal 5, no. 12 (2024): 2664–81. https://doi.org/10.51594/csitrj.v5i12.1759.

Full text
Abstract:
Ransomware attacks significantly threaten Industrial Control Systems (ICS) within the oil and gas industry, endangering operational continuity and cybersecurity. This research investigates the vulnerabilities that allow ransomware to infiltrate ICS, focusing on common attack vectors, delivery mechanisms, and the subsequent impacts on operations and financial stability. The analysis draws from notable case studies, including the Colonial Pipeline and TRITON malware incidents, highlighting how interconnected IT and Operational Technology (OT) systems exacerbate risks. The findings underscore the
APA, Harvard, Vancouver, ISO, and other styles
45

Nasir, Abdul, Naeem Jan, Abdu Gumaei, Sami Ullah Khan, and Fahad R. Albogamy. "Cybersecurity against the Loopholes in Industrial Control Systems Using Interval-Valued Complex Intuitionistic Fuzzy Relations." Applied Sciences 11, no. 16 (2021): 7668. http://dx.doi.org/10.3390/app11167668.

Full text
Abstract:
Technology is rapidly advancing and every aspect of life is being digitalized. Since technology has made life much better and easier, so organizations, such as businesses, industries, companies and educational institutes, etc., are using it. Despite the many benefits of technology, several risks and serious threats, called cyberattacks, are associated with it. The method of neutralizing these cyberattacks is known as cybersecurity. Sometimes, there are uncertainties in recognizing a cyberattack and nullifying its effects using righteous cybersecurity. For that reason, this article introduces i
APA, Harvard, Vancouver, ISO, and other styles
46

Raveling, Alan, and Yanzhen Qu. "Quantifying the Effects of Operational Technology or Industrial Control System based Cybersecurity Controls via CVSS Scoring." European Journal of Electrical Engineering and Computer Science 7, no. 4 (2023): 1–6. http://dx.doi.org/10.24018/ejece.2023.7.4.546.

Full text
Abstract:
This paper has examined the application of the Common Vulnerability Scoring System applied to operational technology or industrial control system-based cybersecurity controls and demonstrated that the unique considerations and aspects of these environments are more accurately captured when compared against a traditional IT based evaluation. Multiple business drivers are compelling consumer goods manufacturers to augment and connect their manufacturing systems bringing with it increases in potential for experiencing a cybersecurity incident [1]. While other business verticals are able to utiliz
APA, Harvard, Vancouver, ISO, and other styles
47

Boeding, Matthew, Kelly Boswell, Michael Hempel, Hamid Sharif, Juan Lopez, and Kalyan Perumalla. "Survey of Cybersecurity Governance, Threats, and Countermeasures for the Power Grid." Energies 15, no. 22 (2022): 8692. http://dx.doi.org/10.3390/en15228692.

Full text
Abstract:
The convergence of Information Technologies and Operational Technology systems in industrial networks presents many challenges related to availability, integrity, and confidentiality. In this paper, we evaluate the various cybersecurity risks in industrial control systems and how they may affect these areas of concern, with a particular focus on energy-sector Operational Technology systems. There are multiple threats and countermeasures that Operational Technology and Information Technology systems share. Since Information Technology cybersecurity is a relatively mature field, this paper empha
APA, Harvard, Vancouver, ISO, and other styles
48

Jia, Chengbo. "Research on Industrial Internet Intrusion Detection Based on Deep Learning Algorithms." Applied and Computational Engineering 133, no. 1 (2025): 33–37. https://doi.org/10.54254/2755-2721/2025.20597.

Full text
Abstract:
With the rapid popularization of the Industrial Internet, the connection between industrial control systems and enterprise networks has become increasingly tight, making them primary targets for cyberattacks. This trend not only intensifies the security risks of industrial control systems but also presents new challenges for cybersecurity protection. Deep learning technology in artificial intelligence, with its capability to learn complex problems from unsupervised data, is a powerful tool for protecting the cybersecurity of industrial control systems. This paper explores the foundational theo
APA, Harvard, Vancouver, ISO, and other styles
49

Haleem, Abid, Mohd Javaid, Ravi Pratap Singh, Shanay Rab, and Rajiv Suman. "Perspectives of cybersecurity for ameliorative Industry 4.0 era: a review-based framework." Industrial Robot: the international journal of robotics research and application 49, no. 3 (2022): 582–97. http://dx.doi.org/10.1108/ir-10-2021-0243.

Full text
Abstract:
Purpose Industry 4.0 refers to the interconnection of cyber-physical systems, which connects the physical and digital worlds by collecting digital data from physical objects/processes, and using this data to drive automation and optimisation. Digital technologies used in this revolution gather and handle massive volumes of high-velocity streams while automating field operations and supply chain activities. Cybersecurity is a complicated process that helps sort out various hacking issues of Industry 4.0. This purpose of this paper is to provide an overview on cybersecurity and its major applica
APA, Harvard, Vancouver, ISO, and other styles
50

Zhu, Qianxiang, Yuanqing Qin, Chunjie Zhou, and Weiwei Gao. "Extended multilevel flow model-based dynamic risk assessment for cybersecurity protection in industrial production systems." International Journal of Distributed Sensor Networks 14, no. 6 (2018): 155014771877956. http://dx.doi.org/10.1177/1550147718779564.

Full text
Abstract:
Cybersecurity protection becomes an essential requirement for industrial production systems, while industrial production systems are moving from isolation to interconnection with the development of information and communication technology. Dynamic risk assessment plays an important role in cybersecurity protection, providing the real-time security situation to the industrial production systems managers. Currently, few researches in this domain focus on the physical process of industrial production systems, let alone considering the combination of attack propagation in cyber space and the abnor
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!