Guest Editorial: Security of Communication Protocols in Industrial Control Systems (ICSs)

نویسندگان

چکیده

Over the past decade, cyber security community has witnessed a trend in which advanced adversaries – such as nation-state actors and cybercriminal groups are increasingly shifting their exploitation efforts from IT systems to OT Industrial Control Systems (ICSs). This stems fact that compromise of an ICS can have far greater consequences than traditional system potentially resulting not only financial losses but also human life and/or major environmental disasters.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Guest Editorial - - Wireless and Optical Communication Systems

role in information technology, Internet, multimedia communications, forensics, security systems, and handheld applications. Wireless and optical communications have received tremendous interests from both academics and industries over recent years which led to a significant growth of research and development activities in the fields. There are still lots of challenges in the design of an effec...

متن کامل

Guest Editorial: Special Section on Security in Distributed Computing Systems

RESEARCH in the area of security of computing systems has always been of utmost importance, particularly in recent years as orchestrated attacks have sought to cripple critical infrastructures. Security issues in distributed computing systems involve reducing vulnerabilities as well as giving system management the insight and control needed to defend distributed information systems. All aspects...

متن کامل

IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification

Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...

متن کامل

Guest Editorial: Advances in Applied Security

In this special issue, we have selected five papers from the 6th International Conference on Availability, Reliability and Security (ARES 2011)1 and its workshops to show the breadth of research. The ARES conference brings together researchers and practitioners in the area of security. ARES highlights the various aspects of security—with special focus on the crucial linkage between availability...

متن کامل

Guest Editorial Communication Methodologies for the Next-Generation Storage Systems

INFORMATION is being generated at a rapid pace. To sustain this information revolution, next-generation data storage must be more practical, economical, and reliable than ever before. There are presently more than half a million data centers world-wide and this number is expected to rise even further. Companies like Google, Facebook, and Microsoft have already invested billions of dollars into ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Communications Magazine

سال: 2023

ISSN: ['0163-6804', '1558-1896']

DOI: https://doi.org/10.1109/mcom.2023.10155720