Please use this identifier to cite or link to this item: http://dspace.uniten.edu.my/jspui/handle/123456789/10687
DC FieldValueLanguage
dc.contributor.authorQassim, Q.S.en_US
dc.contributor.authorJamil, N.en_US
dc.contributor.authorJidin, R.en_US
dc.contributor.authorRusli, M.E.en_US
dc.contributor.authorAhmad Zawawi, M.N.en_US
dc.contributor.authorJamaludin, M.Z.en_US
dc.contributor.authorZ'aba, M.R.en_US
dc.contributor.authorKamarulzaman, W.A.W.en_US
dc.date.accessioned2018-11-07T08:19:28Z-
dc.date.available2018-11-07T08:19:28Z-
dc.date.issued2018-
dc.identifier.urihttp://dspace.uniten.edu.my/jspui/handle/123456789/10687-
dc.description.abstractSupervisory Control and Data Acquisition (SCADA) system is the underlying control system of most national critical infrastructures such as power, energy, water, transportation and telecommunication. In order to understand the potential threats to these infrastructures and the mechanisms to protect them, different types of cyber-attacks applicable to these infrastructures need to be identified. Therefore, there is a significant need to have a comprehensive understanding of various types of cyber-attacks and its classification associated with both Opera-tion Technology (OT) and Information Technology (IT). This paper presents a comprehensive review of existing cyber-attack taxonomies available in the literature and evaluates these taxonomies based on defined criteria. © 2018 Qais Saif Qassim et. al.en_US
dc.language.isoenen_US
dc.relation.ispartofInternational Journal of Engineering and Technology(UAE) Volume 7, Issue 2.14 Special Issue 14, 2018, Pages 138-144en_US
dc.titleA review: Towards practical attack taxonomy for industrial control systemsen_US
dc.typeArticleen_US
item.fulltextNo Fulltext-
item.grantfulltextnone-
Appears in Collections:CCI Scholarly Publication
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.