Top 20 stuxnet worm impact on industrial cyber physical system security

1 Throwback Attack: How Stuxnet changed cybersecurity

  • Author: industrialcybersecuritypulse.com
  • Published: 11/03/2021
  • Review: 4.94 (772 vote)
  • Summary: · Stuxnet, technically a worm, is the first known offensive cyberweapon specifically designed to inflict damage on equipment in the real world 

2 Stuxnet worm impact on industrial cyber-physical system security

  • Author: ieeexplore.ieee.org
  • Published: 12/17/2021
  • Review: 4.6 (204 vote)
  • Summary: The Stuxnet worm attack demonstrated widely in mid 2010 that many of the security assumptions made about the operating environment, technological capabilities 

3 Stuxnet Worm Impact on Industrial Cyber-Physical System Security

  • Author: researchgate.net
  • Published: 08/29/2021
  • Review: 4.51 (213 vote)
  • Summary: · The Stuxnet worm attack demonstrated widely in mid 2010 that many of the security assumptions made about the operating environment, 

4 Hypergames and Cyber-Physical Security for Control Systems

  • Author: dl.acm.org
  • Published: 11/13/2021
  • Review: 4.33 (377 vote)
  • Summary: The identification of the Stuxnet worm in 2010 provided a highly publicized example of a cyber attack that physically damaged an industrial control system

5 Cyber Physical System Security Issues in Industrial Organizations in

  • Author: search.proquest.com
  • Published: 06/05/2022
  • Review: 4.01 (547 vote)
  • Summary: The purpose of this qualitative case study is to investigate a more efficient hardware design and software algorithm protocol for cyber-physical systems to 

6 The Stuxnet computer worm: what is its legacy today? | Stormshield

  • Author: stormshield.com
  • Published: 07/16/2022
  • Review: 3.8 (483 vote)
  • Summary: · A malware that hit the PLCs in charge of the centrifuges of an Iranian nuclear power plant and which highlighted the vulnerability of industrial 

7 Stuxnet – an overview | ScienceDirect Topics

  • Author: sciencedirect.com
  • Published: 06/03/2022
  • Review: 3.59 (358 vote)
  • Summary: Stuxnet is a worm that spreads by infecting Windows computers. Stuxnet was discovered on systems in Iran in June 2010 by a security firm from Belarus – 

8 Do you know about the underlying system attacked by Stuxnet worm

  • Author: isfcr.pes.edu
  • Published: 12/12/2021
  • Review: 3.39 (223 vote)
  • Summary: · Stuxnet exploited the control system’s physical nature which is exactly a compromise of Iranian PLCs to gather information on industrial systems 

9 [PDF] Intelligent Network Layer for Cyber-Physical Systems Security – arXiv

  • Author: arxiv.org
  • Published: 05/16/2022
  • Review: 3.26 (279 vote)
  • Summary: · prove the overall Cyber Physical Systems security posture by considering ICS … The most notable malware worm “Stuxnet” was first

10 Stuxnet worm impact on industrial cyber-physical system security

  • Author: typeset.io
  • Published: 07/01/2022
  • Review: 3.04 (467 vote)
  • Summary: · Stuxnet modified the control system, increasing pressure in the centrifuges in a first version of the worm and spinning centrifuges in an erratic 

11 Security of Cyber-Physical Systems – POWER Magazine

  • Author: powermag.com
  • Published: 12/15/2021
  • Review: 2.84 (122 vote)
  • Summary: · With the advent of networking, many previously closed systems are becoming open to malicious agents. Many reported cyberattacks on cyber- 

12 What Is Stuxnet? – Trellix

  • Author: trellix.com
  • Published: 10/30/2021
  • Review: 2.87 (191 vote)
  • Summary: Stuxnet is a computer worm that was originally aimed at Iran’s nuclear facilities and has since mutated and spread to other industrial and energy-producing 

13 Cyber–Physical Systems Forensics: Today and Tomorrow – MDPI

  • Author: mdpi.com
  • Published: 10/05/2021
  • Review: 2.72 (161 vote)
  • Summary: Fortunately, many of the passive attacks can be thwarted by employing good physical security measures and using strong encryption/decryption methods for data in 

14 Aligning Cyber-Physical System Safety and Security – SpringerLink

  • Author: link.springer.com
  • Published: 09/21/2021
  • Review: 2.51 (123 vote)
  • Summary: Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In: Proceedings of the 37th IEEE Annual Conference on Ind. Electronics Soc 

15 Countermeasures to Enhance Cyber-physical System Security and

  • Author: academia.edu
  • Published: 05/07/2022
  • Review: 2.46 (89 vote)
  • Summary: [4] S. Karnouskos, “Stuxnet worm impact on industrial cyber-physical system security,” Proc. 37th IEEE Annu. Conf. Ind. Electronics Soc. (IECON 11), Nov

16 Cyber-physical systems security: Limitations, issues and future trends

  • Author: ncbi.nlm.nih.gov
  • Published: 10/17/2021
  • Review: 2.35 (98 vote)
  • Summary: · Moreover, CPS security vulnerabilities, threats and attacks are … Stuxnet worm impact on industrial cyber-physical system security; pp

17 [PDF] Hypergames and Cyber-Physical Security for Control Systems

  • Author: osti.gov
  • Published: 01/26/2022
  • Review: 2.21 (176 vote)
  • Summary: have been the first cyber attack to cause physical damage to an ICS, but it was highly … Stuxnet worm impact on industrial cyber-physical system security

18 [PDF] Smart Grid Cyber-Physical Attack and Defense: A Review – NSF PAR

  • Author: par.nsf.gov
  • Published: 02/19/2022
  • Review: 2.17 (104 vote)
  • Summary: INDEX TERMS Cyber-physical power system, cyber-physical security, … [93] S. Karnouskos, “Stuxnet worm impact on industrial cyber-physical sys

19 [PDF] A Systems Theoretic Approach to the Security Threats in Cyber

  • Author: mitsloan.mit.edu
  • Published: 11/01/2021
  • Review: 2.1 (151 vote)
  • Summary: CPS security design, Stuxnet analysis, CPS, STAMP, Security and safety analysis. … Cyber physical systems (CPS) [1] such as industrial control systems

20 Stuxnet worm impact on industrial cyber-physical system security

  • Author: semanticscholar.org
  • Published: 10/11/2021
  • Review: 2.09 (57 vote)
  • Summary: · The Stuxnet worm attack demonstrated widely in mid 2010 that many of the security assumptions made about the operating environment,