SCADA vulnerabilities and attacks: A review of the state-of-the-art and open issues.
Manar AlanaziAbdun MahmoodMohammad Jabed Morshed ChowdhuryPublished in: Comput. Secur. (2023)
Keyphrases
- open issues
- countermeasures
- security vulnerabilities
- security flaws
- security mechanisms
- security risks
- buffer overflow
- information security
- future trends
- control system
- data corruption
- security issues
- denial of service
- key management
- security breaches
- attack scenarios
- cyber security
- intrusion detection
- smart card
- computer security
- resource constrained
- supervisory control
- web services
- cyber attacks
- attack detection
- intrusion detection system
- access control
- real time
- denial of service attacks
- malicious attacks
- security requirements
- watermarking algorithm
- attack graphs