Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap
暂无分享,去创建一个
[1] Yuqian Lu,et al. Standards for Smart Manufacturing: A review , 2019, 2019 IEEE 15th International Conference on Automation Science and Engineering (CASE).
[2] P. Eng,et al. 7 Steps to ICS and SCADA Security , 2012 .
[3] Xi Chen,et al. Analysis on security standards for industrial control system and enlightenment on relevant Chinese standards , 2016, 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA).
[4] Henning Trsek,et al. Analysis of the Cyber-Security of industry 4.0 technologies based on RAMI 4.0 and identification of requirements , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).
[5] Christoph Schmittner,et al. Application of IEC 62443 for IoT Components , 2018, SAFECOMP Workshops.
[6] Yacine Challal,et al. A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.
[7] Tanesh Kumar,et al. 5G security: Analysis of threats and solutions , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[8] Saqib Ali,et al. Cyber Security for Cyber Physical Systems , 2018, Studies in Computational Intelligence.
[10] Kyoung Dae Kim,et al. An Overview and Some Challenges in Cyber-Physical Systems , 2013 .
[11] Kyungho Lee,et al. Advanced Approach to Information Security Management System Model for Industrial Control System , 2014, TheScientificWorldJournal.
[12] Hans A. Hansson,et al. Applicability of the IEC 62443 standard in Industry 4.0 / IIoT , 2019, ARES.
[13] Jian Zhou,et al. Smart manufacturing standardization: Architectures, reference models and standards framework , 2018, Comput. Ind..
[14] R.S.H. Piggin. Development of industrial cyber security standards: IEC 62443 for SCADA and Industrial Control System security , 2013 .
[15] Sushmita Ruj,et al. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT , 2020, J. Netw. Comput. Appl..
[16] Cristina Cano,et al. A Square Peg in a Round Hole: The Complex Path for Wireless in the Manufacturing Industry , 2018, IEEE Communications Magazine.
[17] Muhammad Murtaza Yousaf,et al. Security assessment of data management systems for cyber physical system applications , 2019, J. Softw. Evol. Process..
[18] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[19] Yashwant Singh,et al. IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges , 2020, IEEE Access.
[20] Andrea Bartoli,et al. Advanced security taxonomy for machine-to-machine (M2M) communications in 5G capillary networks , 2015 .
[21] Peter Burnap,et al. SCADA System Forensic Analysis Within IIoT , 2017 .
[22] Min Chen,et al. Machine-to-Machine Communications: Architectures, Standards and Applications , 2012, KSII Trans. Internet Inf. Syst..
[23] Dmitry Korzun,et al. Secure Communication and Data Processing Challenges in the Industrial Internet , 2016, Balt. J. Mod. Comput..
[24] Quan Wang,et al. Comparative Examination on Architecture and Protocol of Industrial Wireless Sensor Network Standards , 2016, IEEE Communications Surveys & Tutorials.
[25] Sundeep Rangan,et al. Towards 6G Networks: Use Cases and Technologies , 2019, ArXiv.
[26] Antonio Skarmeta,et al. Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks , 2020, IEEE Journal on Selected Areas in Communications.
[27] Karen A. Scarfone,et al. Guide to Securing Legacy IEEE 802.11 Wireless Networks , 2008 .
[28] Alex Talevski,et al. Comparison of industrial WSN standards , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.
[29] David Hutchison,et al. A survey of cyber security management in industrial control systems , 2015, Int. J. Crit. Infrastructure Prot..
[30] Sheila E. Frankel,et al. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i , 2007 .
[31] Mohsen Guizani,et al. M2M Communications in 5G: State-of-the-Art Architecture, Recent Advances, and Research Challenges , 2017, IEEE Communications Magazine.
[32] Jacek Rak,et al. Guide to Disaster-Resilient Communication Networks , 2020, Computer Communications and Networks.
[33] Cuong Nguyen,et al. NIST framework and roadmap for smart grid interoperability standards, release 4.0 , 2021 .
[35] Johannes Schneider,et al. A security evaluation of IEC 62351 , 2017, J. Inf. Secur. Appl..
[36] Antonio Skarmeta,et al. Challenges in Cybersecurity and Privacy - the European Research Landscape , 2019, Challenges in Cybersecurity and Privacy - the European Research Landscape.
[37] Chantal CHERIFI,et al. Wireless Connectivity of CPS for Smart Manufacturing: A Survey , 2018, 2018 12th International Conference on Software, Knowledge, Information Management & Applications (SKIMA).
[38] Jürgen Dunkel,et al. Intelligent M2M: Complex event processing for machine-to-machine communication , 2015, Expert Syst. Appl..
[39] Andrei V. Gurtov,et al. Secure communication channel architecture for Software Defined Mobile Networks , 2017, Comput. Networks.
[40] Manan Shah,et al. A Comprehensive Study on Critical Security Issues and Challenges of the IoT World , 2020, Journal of Data, Information and Management.
[41] Stephen Hailes,et al. Security of smart manufacturing systems , 2018 .
[42] Sufian Hameed,et al. Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review , 2019, J. Comput. Networks Commun..
[43] Yan Lu,et al. Standards landscape and directions for smart manufacturing systems , 2015, 2015 IEEE International Conference on Automation Science and Engineering (CASE).
[44] Jeffrey L. Hieb,et al. Cyber security risk assessment for SCADA and DCS networks. , 2007, ISA transactions.
[45] Athanasios V. Vasilakos,et al. A review of industrial wireless networks in the context of Industry 4.0 , 2015, Wireless Networks.
[46] Justin Varghese,et al. Security issues in SCADA based industrial control systems , 2017, 2017 2nd International Conference on Anti-Cyber Crimes (ICACC).
[47] Ramjee Prasad,et al. Cyber Security for IntelligentWorld with Internet of Things and Machine to Machine Communication , 2015, J. Cyber Secur. Mobil..
[48] P. Martigne. Overview of ETSI machine-to-machine and oneM2M architectures , 2015 .