A review of security assessment methodologies in industrial control systems

Computer crime; Crime; Network security; Power control; SCADA systems; Standby power systems; Cyber-attacks; Design/methodology/approach; Electrical power networks; Industrial control systems; Security assessment; Security vulnerabilities; Vulnerability analysis; Vulnerability assessments; Electric...

Full description

Saved in:
Bibliographic Details
Main Authors: Qassim Q.S., Jamil N., Daud M., Patel A., Ja�affar N.
Other Authors: 36613541700
Format: Article
Published: Emerald Group Holdings Ltd. 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Tenaga Nasional
Description
Summary:Computer crime; Crime; Network security; Power control; SCADA systems; Standby power systems; Cyber-attacks; Design/methodology/approach; Electrical power networks; Industrial control systems; Security assessment; Security vulnerabilities; Vulnerability analysis; Vulnerability assessments; Electric power system control