Source 1
- Database: “EBSCOhost, Computer Source”
- Search: “Vulnerability AND Security AND Cyber Attack.” There were no other filters applied.
- Results: 122
- Article selected: “Computer Security Vulnerability as Concerns the Electricity Distribution Grid” by Stosovic, Dimitrijevic, and Litovski.
- Subject terms: computer security, electric power distribution, cyberterrorism, malware, eavesdropping, artificial intelligence.
Stošović, M. A., Dimitrijević, M., & Litovski, V. (2014). Computer security vulnerability as concerns the electricity distribution grid. Applied Artificial Intelligence, 28(4), 323–336. https://doi.org/10.1080/08839514.2014.891831
The article covers the security vulnerabilities to cyber attacks on the electrical grid. It comes from the Applied Artificial Intelligence journal and is 14 pages long. The first listed author, Stosovic, works in the Electronic Engineering department of the University of Nis in Serbia. I believe this article will be useful in my research into the current risk level of a successful major cyber attack on our infrastructure.
Source 2
- Database: “EBSCOhost, Computer Source”
- Search: “Vulnerability AND Security AND Cyber Attack.” There were no other filters applied.
- Results: 122
- Article selected: “Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations” by Yaacoub, Noura, Salman, Chehab
- Subject terms: multi-factor authentication, internet security, robotics, robot control systems, vulnerability (phsychology), law enforcement
Yaacoub, J.-P. A., Noura, H. N., Salman, O., & Chehab, A. (2021). Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations. International Journal of Information Security, 21(1), 115–158. https://doi.org/10.1007/s10207-021-00545-8
The article covers the security vulnerabilities to cyber attacks on different robotically controlled systems, such as farm equipment. It comes from the International Journal of Information Security and is 44 pages long. One of the authors, Salman, works in the Electrical and Computer Engineering Department at the American University of Beirut in Lebanon. I believe this article will be useful in my research into the current risk level of a successful major cyber attack on our infrastructure.