A review of security assessment methodologies in industrial control systems
Computer crime; Crime; Network security; Power control; SCADA systems; Standby power systems; Cyber-attacks; Design/methodology/approach; Electrical power networks; Industrial control systems; Security assessment; Security vulnerabilities; Vulnerability analysis; Vulnerability assessments; Electric...
Saved in:
Main Authors: | Qassim Q.S., Jamil N., Daud M., Patel A., Ja�affar N. |
---|---|
Other Authors: | 36613541700 |
Format: | Article |
Published: |
Emerald Group Holdings Ltd.
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A review of security assessment methodologies in industrial control systems
by: Qassim, Q.S., et al.
Published: (2020) -
A Study on security vulnerabilities assessment and quantification in SCADA systems
by: Firdaus Z., et al.
Published: (2023) -
Compromising the Data Integrity of an Electrical Power Grid SCADA System
by: Qassim Q.S., et al.
Published: (2023) -
Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system
by: Qassim Q.S., et al.
Published: (2023) -
Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
by: Qassim Q.S., et al.
Published: (2023)