Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security.
Sam MaesschalckVasileios GiotsasBenjamin GreenNicholas J. P. RacePublished in: Comput. Secur. (2022)
Keyphrases
- control system
- industrial automation
- critical infrastructure
- forensic analysis
- information security
- control algorithm
- fuzzy logic
- control strategy
- industrial applications
- pid controller
- real time
- security problems
- intrusion detection
- closed loop
- security policies
- control method
- access control
- control law
- security requirements
- control scheme
- fuzzy control
- security issues
- fuzzy controller
- network security
- key management
- information flow
- computer security
- risk analysis
- security threats
- technology transfer
- functional requirements