Designing Control and Protection Systems with Regard to Integrated Functional Safety and Cybersecurity Aspects
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Hiromitsu Kumamoto, 2007. "Satisfying Safety Goals by Probabilistic Risk Assessment," Springer Series in Reliability Engineering, Springer, number 978-1-84628-682-7, December.
- Gabriel, Angelito & Ozansoy, Cagil & Shi, Juan, 2018. "Developments in SIL determination and calculation," Reliability Engineering and System Safety, Elsevier, vol. 177(C), pages 148-161.
- Aven, Terje, 2007. "A unified framework for risk and vulnerability analysis covering both safety and security," Reliability Engineering and System Safety, Elsevier, vol. 92(6), pages 745-754.
- Kriaa, Siwar & Pietre-Cambacedes, Ludovic & Bouissou, Marc & Halgand, Yoran, 2015. "A survey of approaches combining safety and security for industrial control systems," Reliability Engineering and System Safety, Elsevier, vol. 139(C), pages 156-178.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Kazimierz T. Kosmowski & Emilian Piesik & Jan Piesik & Marcin Śliwiński, 2022. "Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management," Energies, MDPI, vol. 15(10), pages 1-21, May.
- Georgios Kavallieratos & Sokratis Katsikas & Vasileios Gkioulos, 2020. "Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey," Future Internet, MDPI, vol. 12(4), pages 1-17, April.
- Øystein Amundrud & Terje Aven & Roger Flage, 2017. "How the definition of security risk can be made compatible with safety definitions," Journal of Risk and Reliability, , vol. 231(3), pages 286-294, June.
- Argenti, Francesca & Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio, 2018. "Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 515-530.
- Alanen, Jarmo & Linnosmaa, Joonas & Malm, Timo & Papakonstantinou, Nikolaos & Ahonen, Toni & Heikkilä, Eetu & Tiusanen, Risto, 2022. "Hybrid ontology for safety, security, and dependability risk assessments and Security Threat Analysis (STA) method for industrial control systems," Reliability Engineering and System Safety, Elsevier, vol. 220(C).
- Aven, Terje, 2010. "Some reflections on uncertainty analysis and management," Reliability Engineering and System Safety, Elsevier, vol. 95(3), pages 195-201.
- Terje Aven & Ortwin Renn, 2015. "An Evaluation of the Treatment of Risk and Uncertainties in the IPCC Reports on Climate Change," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 701-712, April.
- Kim, Hee Eun & Son, Han Seong & Kim, Jonghyun & Kang, Hyun Gook, 2017. "Systematic development of scenarios caused by cyber-attack-induced human errors in nuclear power plants," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 290-301.
- Zio, E., 2018. "The future of risk assessment," Reliability Engineering and System Safety, Elsevier, vol. 177(C), pages 176-190.
- Ferretto, D. & Mazzini, G. & Ambrosini, W. & Aldorf, R. & Hrehor, M., 2021. "Risk monitor implementation for the LVR-15 research reactor," Reliability Engineering and System Safety, Elsevier, vol. 208(C).
- Scholz, Roland W. & Czichos, Reiner & Parycek, Peter & Lampoltshammer, Thomas J., 2020. "Organizational vulnerability of digital threats: A first validation of an assessment method," European Journal of Operational Research, Elsevier, vol. 282(2), pages 627-643.
- Iaiani, Matteo & Tugnoli, Alessandro & Macini, Paolo & Cozzani, Valerio, 2021. "Outage and asset damage triggered by malicious manipulation of the control system in process plants," Reliability Engineering and System Safety, Elsevier, vol. 213(C).
- Aven, Terje, 2013. "Practical implications of the new risk perspectives," Reliability Engineering and System Safety, Elsevier, vol. 115(C), pages 136-145.
- Alexandros Korkovelos & Dimitrios Mentis & Morgan Bazilian & Mark Howells & Anwar Saraj & Sulaiman Fayez Hotaki & Fanny Missfeldt-Ringius, 2020. "Supporting Electrification Policy in Fragile States: A Conflict-Adjusted Geospatial Least Cost Approach for Afghanistan," Sustainability, MDPI, vol. 12(3), pages 1-34, January.
- Cheng, Ruijun & Cheng, Yu & Chen, Dewang & Song, Haifeng, 2021. "Online quantitative safety monitoring approach for unattended train operation system considering stochastic factors," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
- Carreras Guzman, Nelson H. & Zhang, Jin & Xie, Jing & Glomsrud, Jon Arne, 2021. "A Comparative Study of STPA-Extension and the UFoI-E Method for Safety and Security Co-analysis," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
- Redutskiy Yury & Balycheva Marina & Dybdahl Hendrik, 2022. "Employee scheduling and maintenance planning for safety systems at the remotely located oil and gas industrial facilities," Engineering Management in Production and Services, Sciendo, vol. 14(4), pages 1-21, December.
- Kriaa, Siwar & Pietre-Cambacedes, Ludovic & Bouissou, Marc & Halgand, Yoran, 2015. "A survey of approaches combining safety and security for industrial control systems," Reliability Engineering and System Safety, Elsevier, vol. 139(C), pages 156-178.
- Stef Janssen & Alexei Sharpanskykh & Richard Curran, 2019. "AbSRiM: An Agent‐Based Security Risk Management Approach for Airport Operations," Risk Analysis, John Wiley & Sons, vol. 39(7), pages 1582-1596, July.
- Longxia Qian & Ren Zhang & Mei Hong & Hongrui Wang & Lizhi Yang, 2016. "A new multiple integral model for water shortage risk assessment and its application in Beijing, China," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 80(1), pages 43-67, January.
More about this item
Keywords
functional safety; cybersecurity; risk cube; SIL; determination; verification; SIS;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:14:y:2021:i:8:p:2227-:d:537432. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.