2021
DOI: 10.48550/arxiv.2101.03564
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Cybersecurity of Industrial Cyber-Physical Systems: A Review

Abstract: Industrial cyber-physical systems (ICPSs) manage critical infrastructures by controlling the processes based on the "physics" data gathered by edge sensor networks. Recent innovations in ubiquitous computing and communication technologies have prompted the rapid integration of highly interconnected systems to ICPSs. Hence, the "security by obscurity" principle provided by air-gapping is no longer followed. As the interconnectivity in ICPSs increases, so does the attack surface. Industrial vulnerability assessm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 120 publications
0
1
0
Order By: Relevance
“…which yielded interesting results. The first answer correctly quotes [23] and responds with "lack of adequate evaluation/test environments that utilize up-to-date datasets, variety of testbeds while adapting unified evaluation methods", while the second answer builds on the first one with "lack of research methodology standards" [24].…”
Section: Resultsmentioning
confidence: 99%
“…which yielded interesting results. The first answer correctly quotes [23] and responds with "lack of adequate evaluation/test environments that utilize up-to-date datasets, variety of testbeds while adapting unified evaluation methods", while the second answer builds on the first one with "lack of research methodology standards" [24].…”
Section: Resultsmentioning
confidence: 99%
“…", which yielded interesting results. The first answer correctly quoted [53] and responded with "lack of adequate evaluation/test environments that utilize up-to-date datasets, variety of testbeds while adapting unified evaluation methods", while the second answer built on the first one with "lack of research methodology standards" [54]. Finally, by asking "Which machine learning models are commonly used?"…”
Section: Cybersecuritymentioning
confidence: 99%