Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA) 2014
DOI: 10.1109/etfa.2014.7005129
|View full text |Cite
|
Sign up to set email alerts
|

Security vulnerabilities and risks in industrial usage of wireless communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 10 publications
0
13
0
1
Order By: Relevance
“…In this section, we have used the security analysis methodology of Plosz et al [36], which have been designed by following ETSI guidelines [37]. The methodology includes likelihood and impact assessment of the threats in order to obtain a detailed and categorized security risk analysis as described below:…”
Section: Risk Assessment Methodologymentioning
confidence: 99%
“…In this section, we have used the security analysis methodology of Plosz et al [36], which have been designed by following ETSI guidelines [37]. The methodology includes likelihood and impact assessment of the threats in order to obtain a detailed and categorized security risk analysis as described below:…”
Section: Risk Assessment Methodologymentioning
confidence: 99%
“…In this section, we have used the security analysis methodology of Plosz et al [21], which have been designed by following ETSI guidelines [22]. The methodology includes likelihood and impact assessment of the threats in order to obtain a detailed and categorized security risk analysis as described below.…”
Section: Risk Assessment Methodologymentioning
confidence: 99%
“…As the example in [43], a threat catalogue for wireless connections was specified which can be used as an input for FMVEA. Reusability of CHASSIS elements is mostly not possible.…”
Section: Reusability Of Analysis Artefactsmentioning
confidence: 99%