2021
DOI: 10.1002/spy2.150
|View full text |Cite
|
Sign up to set email alerts
|

Systematic review of features for co‐simulating security incidents in Cyber‐Physical Systems

Abstract: Cyber‐Physical Systems (CPS) and Internet‐of‐Things (IoT) plus energy are the enabling technology of modern power systems also known as the Smart Grid (SG). A SG may consist of thousands of interconnected components communicating and exchanging data across layers that stretch beyond technical capabilities, for instance, markets and customer interactions. Cyber‐physical security is a major source of concern due to the high reliance of the SG on Information and Communication Technologies (ICT) and their widespre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 44 publications
0
5
0
Order By: Relevance
“…CTI is still in its early stages as more mature tools and techniques are developed and adopted by organisations. It must be used in conjunction with other techniques such as attack modelling techniques (AMT) [40] such as attack trees or fault tree analysis, cosimulation [41], focus on APT or LCA, threat modelling, or advanced statistical analysis (ML/AI), to mention a few.…”
Section: Discussionmentioning
confidence: 99%
“…CTI is still in its early stages as more mature tools and techniques are developed and adopted by organisations. It must be used in conjunction with other techniques such as attack modelling techniques (AMT) [40] such as attack trees or fault tree analysis, cosimulation [41], focus on APT or LCA, threat modelling, or advanced statistical analysis (ML/AI), to mention a few.…”
Section: Discussionmentioning
confidence: 99%
“…CTI is still in its early stages as more mature tools and techniques are developed and adopted by organisations. It must be used in conjunction with other techniques such as attack modelling techniques (AMT) [92] where examples are attack trees or fault tree analysis, co-simulation [93], focus on advanced persistent threats or load changing attacks [11], threat modelling, or advanced statistical analysis (artificial intelligence/machine learning) [76,94], to name a few.…”
Section: Discussionmentioning
confidence: 99%
“…Co-simulation has been widely used in the engineering [10] and cyber-physical system [10,55] problem domains. DEVS-based co-simulation models have been frequently applied for these domains both in a strict sense, where all component models are DEVS models and in a hybrid sense, where DEVS component models interact with non-DEVS component models [56][57][58][59][60].…”
Section: Composable Modeling Techniquesmentioning
confidence: 99%