TY - JOUR AU - Chee-Wooi Ten AU - Govindarasu Manimaran AU - Chen-Ching Liu AB - To address cybersecurity vulnerabilities in control systems, this paper proposes a supervisory control and data acquisition (SCADA) security framework that includes real-time monitoring, anomaly detection, impact analysis, and mitigation strategies, alongside an attack-tree-based methodology to evaluate system vulnerabilities. BT - Institute of Electrical and Electronics Engineers (IEEE) DA - 2010-07 DO - 10.1109/TSMCA.2010.2048028 N1 - Cybersecurity for critical infrastructures requires further research, particularly in areas like real-time correlation and intrusion detection algorithms, risk monitoring, and advanced modeling techniques that account for dynamic attacker behavior and system impacts. The proposed RAIM framework and attack-tree methodology offer a structured approach to evaluating system vulnerabilities, but further development, including test-bed validation and visualization techniques, is necessary for practical application. N2 - To address cybersecurity vulnerabilities in control systems, this paper proposes a supervisory control and data acquisition (SCADA) security framework that includes real-time monitoring, anomaly detection, impact analysis, and mitigation strategies, alongside an attack-tree-based methodology to evaluate system vulnerabilities. PY - 2010 T2 - Institute of Electrical and Electronics Engineers (IEEE) TI - Cybersecurity for Critical Infrastructures: Attack and Defense Modeling UR - https://ieeexplore.ieee.org/abstract/document/5477189 SN - 1083-4427 ER -