Articles with "cyber vulnerabilities" as a keyword



Photo by charlesdeluvio from unsplash

Cybersafety: A System-Theoretic Approach to Identify Cyber-Vulnerabilities & Mitigation Requirements in Industrial Control Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3093214

Abstract: Recent cyber-physical attacks, such as Stuxnet, Triton etc., have invoked an ominous realization about the vulnerability of critical infrastructure, including water, power and gas distribution systems. Traditional IT security-biased protection methods that focus on improving… read more here.

Keywords: system; control systems; system theoretic; cyber vulnerabilities ... See more keywords
Photo by scottwebb from unsplash

Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3152164

Abstract: Cyber vulnerabilities are security deficiencies in computer and network systems of organizations, which can be exploited by an adversary to cause significant damage. The technology and security personnel resources currently available in organizations to mitigate… read more here.

Keywords: vulnerability; security; cyber vulnerabilities; context sensitive ... See more keywords