4.5 Article

Model-Based Cybersecurity Analysis Extending Enterprise Modeling to Critical Infrastructure Cybersecurity

Related references

Note: Only part of the references are listed.
Article Chemistry, Analytical

Identifying and Analyzing Dependencies in and among Complex Cyber Physical Systems

Aida Akbarzadeh et al.

Summary: This paper introduces a novel method, MDSM, based on a graphical model to show the inter-dependencies among subsystems within a complex system or between two different systems. It also proposes four parameters for quantitatively assessing dependency characteristics, including multi-order dependencies in large scale CIs.

SENSORS (2021)

Article Engineering, Electrical & Electronic

Comprehensive practical evaluation of wired and wireless internet base smart grid communication

Mehdi Zeinali et al.

Summary: Internet-based communications play a crucial role in enabling low-cost and scalable communication infrastructure for various smart grid applications. This article comprehensively evaluates the United Kingdom Internet network characteristics to help smart grid system designers consider essential communication parameters. By testing the performance of TCP and UDP using off-the-shelf wired and wireless communication technologies, the results show typical latency values between 200 and 600 ms for data packets and 50 bytes to kbytes for short control packets, with a potential 5%-20% improvement through data compression techniques.

IET SMART GRID (2021)

Review Computer Science, Information Systems

Model-Driven Engineering Tools and Languages for Cyber-Physical Systems-A Systematic Literature Review

Mustafa Abshir Mohamed et al.

Summary: The development of Cyber-physical Systems (CPS) has attracted more interest from researchers and industrial practitioners due to the opportunities they offer, but the engineering and management of CPS are challenging tasks due to their inherent heterogeneity and complexity. Model-driven Engineering (MDE) is a key approach to reduce development complexity for CPS, but it is challenging to determine the appropriate tools and languages for MDE activities during CPS development, especially for new researchers in the field.

IEEE ACCESS (2021)

Proceedings Paper Computer Science, Software Engineering

Modelling Security Aspects with ArchiMate: A Systematic Mapping Study

Augustus Ellerm et al.

2020 46TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2020) (2020)

Proceedings Paper Computer Science, Interdisciplinary Applications

Modeling of Cyber-Physical Intra-Dependencies in Electric Power Grids and Their Effect on Resilience

Alexis Kwasinski

2020 8TH WORKSHOP ON MODELING AND SIMULATION OF CYBER-PHYSICAL ENERGY SYSTEMS (2020)

Article Computer Science, Information Systems

Security Operations Center: A Systematic Study and Open Challenges

Manfred Vielberth et al.

IEEE ACCESS (2020)

Article Automation & Control Systems

Optimal Configuration of Interdependence Between Communication Network and Power Grid

Peng-Yong Kong

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Theory & Methods

Evaluating Domain Ontologies: Clarification, Classification, and Challenges

Melinda Mcdaniel et al.

ACM COMPUTING SURVEYS (2019)

Proceedings Paper Computer Science, Information Systems

Towards an Integration of Information Security Management, Risk Management and Enterprise Architecture Management - a Literature Review

Thomas Diefenbach et al.

11TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2019) (2019)

Proceedings Paper Computer Science, Theory & Methods

A Meta Language for Threat Modeling and Attack Simulations

Pontus Johnson et al.

13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018) (2019)

Article Computer Science, Interdisciplinary Applications

The industrial internet of things (IIoT): An analysis framework

Hugh Boyes et al.

COMPUTERS IN INDUSTRY (2018)

Article Computer Science, Theory & Methods

An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception

Harjinder Singh Lallie et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Engineering, Industrial

Industry 4.0: state of the art and future trends

Li Da Xu et al.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2018)

Article Chemistry, Multidisciplinary

An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System

Halima Ibrahim Kure et al.

APPLIED SCIENCES-BASEL (2018)

Article Chemistry, Analytical

An Ontology-Based Cybersecurity Framework for the Internet of Things

Bruno Augusti Mozzaquatro et al.

SENSORS (2018)

Article Computer Science, Hardware & Architecture

Consideration of Cyber-Physical Interdependencies in Reliability Modeling of Smart Grids

Koosha Marashi et al.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2018)

Proceedings Paper Computer Science, Information Systems

Towards Security-Aware Virtual Environments for Digital Twins

Matthias Eckhart et al.

CPSS'18: PROCEEDINGS OF THE 4TH ACM WORKSHOP ON CYBER-PHYSICAL SYSTEM SECURITY (2018)

Article Computer Science, Information Systems

Model-based security engineering for cyber-physical systems: A systematic mapping study

Phu H. Nguyen et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2017)

Review Green & Sustainable Science & Technology

A critical review of cascading failure analysis and modeling of power system

Hengdao Guo et al.

RENEWABLE & SUSTAINABLE ENERGY REVIEWS (2017)

Review Green & Sustainable Science & Technology

Application of load monitoring in appliances' energy management - A review

I. Abubakar et al.

RENEWABLE & SUSTAINABLE ENERGY REVIEWS (2017)

Article Computer Science, Information Systems

Cyber-Physical Systems Security-A Survey

Abdulmalik Humayed et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Engineering, Electrical & Electronic

Smart grid security - an overview of standards and guidelines

K. C. Ruland et al.

ELEKTROTECHNIK UND INFORMATIONSTECHNIK (2017)

Review Computer Science, Information Systems

Cyber-physical attacks and defences in the smart grid: a surveyInspec keywordsOther keywords

Haibo He et al.

IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS (2016)

Review Engineering, Industrial

Review on modeling and simulation of interdependent critical infrastructure systems

Min Ouyang

RELIABILITY ENGINEERING & SYSTEM SAFETY (2014)

Article Computer Science, Information Systems

A method for taxonomy development and its application in information systems

Robert C. Nickerson et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2013)

Article Computer Science, Information Systems

The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures

Teodor Sommestad et al.

IEEE SYSTEMS JOURNAL (2013)

Article Automation & Control Systems

Review of Security Issues in Industrial Networks

Manuel Cheminod et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2013)

Proceedings Paper Computer Science, Hardware & Architecture

Conceptual Integration of Enterprise Architecture Management and Security Risk Management

Eric Grandry et al.

17TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2013) (2013)

Article Computer Science, Information Systems

Smart Grid - The New and Improved Power Grid: A Survey

Xi Fang et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2012)

Article Engineering, Electrical & Electronic

Risk Assessment of Cascading Outages: Methodologies and Challenges

M. Vaiman et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2012)

Article Engineering, Industrial

Competing failure analysis in phased-mission systems with functional dependence in one of phases

Chaonan Wang et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2012)

Article Computer Science, Information Systems

Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA ®

Jason S. Burkett

INFORMATION SECURITY JOURNAL (2012)

Article Computer Science, Information Systems

The anatomy of the archiMate language

M. M. Lankhorst et al.

INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN (2010)

Review Computer Science, Hardware & Architecture

Information integration in the enterprise

Philip A. Bernstein et al.

COMMUNICATIONS OF THE ACM (2008)

Article Computer Science, Information Systems

A design science research methodology for Information Systems Research

Ken Peffers et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2007)

Article Computer Science, Artificial Intelligence

Secure tropos: A security-oriented extension of the tropos methodology

Haralambos Mouratidis et al.

INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING (2007)