V2TSA: Analysis of Vulnerability to Attack Techniques Using a Semantic Approach

In recent years, vulnerabilities in industrial control systems have increased substantially. The operational environment’s availability constraints hinder penetration testing from the attacker’s perspective as a viable vulnerability management method, thereby limiting the abili...

Full description

Saved in:
Bibliographic Details
Main Authors: Do-Yeon Kim, Seong-Su Yoon, Ieck-Chae Euom
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10749828/
Tags: Add Tag
No Tags, Be the first to tag this record!