This work is licensed under the Creative Commons Attribution 4.0 International License.
Khan, M. T., Serpanos, D., & Shrobe, H. E. (2017). A formally reliable cognitive middleware for the security of industrial control systems. Electronics, 6(3), 58-.Search in Google Scholar
Auffret, J. P., Snowdon, J. L., Stavrou, A., Katz, J. S., Kelley, D., & Rahman, R. S., et al. (2017). Cybersecurity leadership: competencies, governance, and technologies for industrial control systems. Journal of Interconnection Networks, 17(1), 1740001.Search in Google Scholar
Handayani, S., Sri, U. M. W., Megasari, R., & Kustiandi, J. (2020). Integrating information technology and stem learning models in industrial 4.0 revolution. KnE Social Sciences.Search in Google Scholar
Gao, H. Y., Hu, A. H., Shen, W. Q., & Jiang, Z. X. (2019). Group consensus of multi-agent systems subjected to cyber-attacks. Chinese Physics B, 28(6). Search in Google Scholar
Barboni, A., Rezaee, H., Boem, F., & Parisini, T. (2020). Detection of covert cyber-attacks in interconnected systems: a distributed model-based approach. IEEE Transactions on Automatic Control, PP(99), 1-1.Search in Google Scholar
Zhang, Y., Yang, T., & Tang, Z. (2021). Active fault-tolerant control for load frequency control in multi- area power systems with physical faults and cyber attacks. International Transactions on Electrical Energy Systems.Search in Google Scholar
Ameri, K., Hempel, M., Sharif, H., Lopez, J., & Perumalla, K. (2023). Design of a novel information system for semi-automated management of cybersecurity in industrial control systems. ACM transactions on management information systems.Search in Google Scholar
Herath, T. C., Herath, H. S. B., & D'Arcy, J. (2020). Organizational adoption of information security solutions: an integrative lens based on innovation adoption and the technology-organization-environment framework. The data base for advances in information systems(2), 51.Search in Google Scholar
Du, M. (2020). Application of information communication network security management and control based on big data technology. International Journal of Communication Systems.Search in Google Scholar
Xue, S. (2019). Face database security information verification based on recognition technology. International Journal of Network Security, 21(4), 601-606.Search in Google Scholar
Zeng, Z., Li, Y., Cao, Y., Zhao, Y., Zhong, J., & Sidorov, D., et al. (2020). Blockchain technology for information security of the energy internet: fundamentals, features, strategy and application. Energies, 13.Search in Google Scholar
Chen, J., Li, C., & Wang, Y. (2018). Research on meteorological information network security system based on vpn technology. MATEC Web of Conferences, 232.Search in Google Scholar
Griscioli, F., & Pizzonia, M. (2021). Usbcaptchain: preventing (un)conventional attacks from promiscuously used usb devices in industrial control systems1. Journal of Computer Security, 29(1), 1-26.Search in Google Scholar
Dehlaghi-Ghadim, A., Balador, A., Moghadam, M. H., Hansson, H., & Conti, M. (2023). Icssim-a framework for building industrial control systems security testbeds. Computers in Industry.Search in Google Scholar
Koay, A. M. Y., Ko, R. K. L., Hettema, H., & Radke, K. (2023). Machine learning in industrial control system (ics) security: current landscape, opportunities and challenges. Journal of intelligent information systems.Search in Google Scholar
Jadidi, Z., Hagemann, J., & Quevedo, D. (2022). Multi-step attack detection in industrial control systems using causal analysis. Computers in Industry, 142.Search in Google Scholar
Portmann, C., & Renner, R. (2022). Security in quantum cryptography. Reviews of Modern Physics.Search in Google Scholar
Huang, A., Barz, S., Andersson, E., & Makarov, V. (2018). Implementation vulnerabilities in general quantum cryptography. New Journal of Physics, 20(10). Search in Google Scholar
Avanesov, A. S., & Kronberg, D. A. (2020). Possibilities of using practical limitations of an eavesdropper in quantum cryptography. Quantum Electronics, 50(5), 454-460.Search in Google Scholar
Wanchun Liu, Petar Popovski, Yonghui Li & Branka Vucetic. (2020). Wireless Networked Control Systems With Coding-Free Data Transmission for Industrial IoT. IEEE Internet of Things Journal(3),1788-1801.Search in Google Scholar
Marcin Bednarek & Tadeusz Dąbrowski. (2018). Analysis of Reliability States of an Industrial Network Data Transmission System. Journal of KONBiN(1),137-152.Search in Google Scholar
Wojciech GREGA. (2012). Information Technologies Supporting Control and Monitoring of Power Systems. Przeglad Elektrotechniczny(5a). Search in Google Scholar