2022
DOI: 10.1007/978-981-16-9008-2_27
|View full text |Cite
|
Sign up to set email alerts
|

Critical Infrastructure Asset Discovery and Monitoring for Cyber Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Almost all PLCs lack encryption, authorization, and authentication mechanisms, leading to vulnerable and weak security [2]. More and more security events, e.g., the Stuxnet, Duqu, and Black Energy [3] have shown attacks against the PLC may cause substantive damages with economic and even life losses in the real world [4]. Specifically, a tampering attack against the PLC firmware is incredibly harmful and has become one of the most threatening attacks [5].…”
Section: Introductionmentioning
confidence: 99%
“…Almost all PLCs lack encryption, authorization, and authentication mechanisms, leading to vulnerable and weak security [2]. More and more security events, e.g., the Stuxnet, Duqu, and Black Energy [3] have shown attacks against the PLC may cause substantive damages with economic and even life losses in the real world [4]. Specifically, a tampering attack against the PLC firmware is incredibly harmful and has become one of the most threatening attacks [5].…”
Section: Introductionmentioning
confidence: 99%
“…Most of the above-mentioned applications are realized in smart cities, that are municipalities using ICT to increase operational efficiency, share information with the public and improve both the quality of government services and citizen welfare. The key components of smart cities are the following [33]: a.…”
mentioning
confidence: 99%