Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities.
Engla Rencelj LingMathias EkstedtPublished in: ICISSP (2022)
Keyphrases
- control system
- trade off
- control strategy
- control algorithm
- industrial applications
- intelligent control
- process control
- real time
- industrial processes
- fuzzy logic
- closed loop
- control law
- technology transfer
- critical infrastructure
- attack graph
- accurate estimation
- rigid body
- security issues
- control scheme
- control method
- information security
- security vulnerabilities
- matlab simulation
- pid control
- quality improvement
- controller design
- control architecture
- genetic algorithm
- neural network