Recent advances in data analytics prompt dynamic datadriven vulnerability assessments whereby data contained from vulnerabilityalert repositories as well as from Cyber-physical System (CPS) layer networks and standardised enumerations. Yet, current vulnerability assessment processes are mostly conducted manually. However, the huge volume of scanned data requires substantial information processing and analytical reasoning, which could not be satisfied considering the imprecision of manual vulnerability analysis. In this paper, we propose to employ a cross-linked and correlated database to collect, extract, filter and visualise vulnerability data across multiple existing repositories, whereby CPS vulnerability information is inferred. Based o...
Designing secure cyber-physical systems (CPS) is fundamentally important and performing vulnerabilit...
Checking the vulnerability and vulnerability history of green economy friendly critical infrastructu...
Cyberspace, with its multiple forms of device integration, is rapidly evolving and introducing looph...
Assessing vulnerabilities supports analytics-based decision-making processes to protect Critical Inf...
Despite their wide proliferation, complex cyber–physical systems (CPSs) are subject to cybersecurity...
Current vulnerability scoring mechanisms in complex cyber-physical systems (CPSs) face challenges in...
The rapid advances in information and communication technology enable a shift from diverse systems e...
Critical Infrastructures (CIs) are complex systems. For their operations, these infrastructures are ...
Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential to p...
Vulnerability is defined as ”weakness of an asset or control that can be exploited by a threat” acco...
This paper focuses on data collection within a procedural framework of vulnerability analysis for in...
Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as powe...
© 2017 IEEE. Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures...
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as su...
Smart grid employs ICT infrastructure and network connectivity to optimize efficiency and deliver ne...
Designing secure cyber-physical systems (CPS) is fundamentally important and performing vulnerabilit...
Checking the vulnerability and vulnerability history of green economy friendly critical infrastructu...
Cyberspace, with its multiple forms of device integration, is rapidly evolving and introducing looph...
Assessing vulnerabilities supports analytics-based decision-making processes to protect Critical Inf...
Despite their wide proliferation, complex cyber–physical systems (CPSs) are subject to cybersecurity...
Current vulnerability scoring mechanisms in complex cyber-physical systems (CPSs) face challenges in...
The rapid advances in information and communication technology enable a shift from diverse systems e...
Critical Infrastructures (CIs) are complex systems. For their operations, these infrastructures are ...
Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential to p...
Vulnerability is defined as ”weakness of an asset or control that can be exploited by a threat” acco...
This paper focuses on data collection within a procedural framework of vulnerability analysis for in...
Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as powe...
© 2017 IEEE. Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures...
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as su...
Smart grid employs ICT infrastructure and network connectivity to optimize efficiency and deliver ne...
Designing secure cyber-physical systems (CPS) is fundamentally important and performing vulnerabilit...
Checking the vulnerability and vulnerability history of green economy friendly critical infrastructu...
Cyberspace, with its multiple forms of device integration, is rapidly evolving and introducing looph...