Research Article
BibTex RIS Cite
Year 2022, Volume: 19 Issue: 45, 35 - 49, 30.01.2022
https://doi.org/10.26466/opusjsr.1063227

Abstract

References

  • Akhuseyinoglu, N.B. and Joshi, J. (2020). A constraint and risk-aware approach to attribute-based access control for cyber-physical systems. Computers & Security, 96, 1-18.
  • Al-Mhiqani, M.N., Ahmad, R., Yassin, W., Hassan, A., Zainal Abidin, Z., Salih Ali, N. and Abdulkareem, K.H. (2018). Cyber-Security incidents: A review cases in cyber-physical systems. (IJACSA) International Journal of Advanced Computer Science and Applications, 9(1), 499-508.
  • Alguliyev, R., Imamverdiyev, Y. and Sukhostat, L. (2018). Cyber-physical systems and their security issues. Computers in Industry, 100, 212–223.
  • Arnaboldi, L., Czekster, R.M. and Morisset, C. (2020). Modelling load-changing attacks in cyber-physical systems. Electronic Notes in Theoretical Computer Science, 353, 39–60.
  • Brandman, J., Sturm, L., White, J. and Williams, C. (2020). A physical hash for preventing and detecting cyber-physical attacks in additive manufacturing systems. Journal of Manufacturing Systems, 56, 202–212.
  • Carter, B., Adams, S., Bakirtzis, G., Sherburne, T., Beling, P., Horowitz, B. and Fleming, C. (2019). A preliminary design-phase security methodology for cyber–physical systems. Systems, 7(21), 1-22.
  • Chen, D., Wawrzynski, P. and Lv, Z. (2021). Cyber security in smart cities: A review of deep learning-based applications and case studies. Sustainable Cities and Society, 66,1-12.
  • Çakmak, H. and Demir, C. K. (2009), Siber dünyadaki tehdit ve kavramlar”, suç, terör ve savaş üçgeninde siber dünya, 1. Baskı İçinde (p.23-54), Ankara: Barış Platin Kitabevi.
  • DiMase, D., Collier, Z.A., Heffner, K. and Linkov, I. (2015). Systems engineering framework for cyber physical security and resilience. Environ Syst Decis, 35, 291–300.
  • Elhabashy, A.E., Wells, L.J. and Camelio, J.A. (2019). Cyber-Physical security research efforts in manufacturing – a literature review. Procedia Manufacturing, 34, 921-931.
  • Geismann, J. and Bodden, E. (2020). A systematic literature review of model-driven security engineering for cyber–physical systems. The Journal of Systems & Software, 169, 1-17.
  • Ghadge, A., Weiß, M., Caldwell, N.D. and Wilding, R. (2020), Managing cyber risk in supply chains: a review and research agenda. Supply Chain Management, 25(2), 223-240.
  • Gunes, B., Kayisoglu, G. and Bolat, P. (2021). Cyber security risk assessment for seaports: A case study of a container port. Computers & Security, 103, 1-22.
  • Ismail, R., and Zainab, A. (2011). Information systems security in special and public libraries: An assessment of status. Malaysian Journal of Library & Information Science, 16(2), 45- 62.
  • Kaur, J. and Ramkumar, K.R. (2021). The recent trends in cyber security: A review. Journal of King Saud University – Computer and Information Sciences, 34(1), 1-16.
  • Kholidy, H.A. (2021). Autonomous mitigation of cyber risks in the Cyber–Physical Systems. Future Generation Computer Systems, 115, 171–187.
  • Mourtzis, D. and Vlachou, E. (2016). Cloud-based cyber-physical systems and quality of services. The TQM Journal, 28(5), 704-733.
  • Palleti, V.R., Chong, T.Y. and Samavedham, L. (2018). A mechanistic fault detection and isolation approach using Kalmanfilter to improve the security of cyber physical systems. Journal of Process Control, 68, 160–170.
  • Pan, M., Wang, J., Errapotu, S. M., Zhang, X., Ding, J., and Han, Z. (2019). Big data privacy preservation for cyber-physical systems. Cham: Springer International Publishing. https://doi. org/10.1007/978-3-030-13370-2.
  • Pandey, S., Singh, R.K., Gunasekaran, A. and Kaushik, A. (2020). Cyber security risks in globalized supply chains: conceptual framework. Journal of Global Operations and Strategic Sourcing, 13(1), 103-128.
  • Parn, E.A. and Edwards, D. (2019). Cyber threats confronting the digital built environment Common data environment vulnerabilities and block chain deterrence. Engineering, Construction and Architectural Management, 26(2), 245-266.
  • Pasqualetti, F., Dörfler, F. and Bullo, F. (2013). Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 58(11), 2715-2729.
  • Raban, Y. and Hauptman, A. (2018). Foresight of cyber security threat drivers and affecting technologies. Foresight, 20(4), 353-363.
  • Rajkumar, R., Lee, I., Sha, L., and Stankovic, J. (2010). Cyber-physical systems. In S. Sapatnekar (Ed.), Proceedings of the 47th Design Automation Conference on - DAC ‘10 (p.731). New York, New York, USA: ACM Press. https://doi.org/10.1145/1837274.1837461.
  • Rid, T. and McBurney, P. (2012), Cyber-Weapons. The RUSI Journal, 157(1), 6-13.
  • Sreeram, M. and Shimon, Y. N. (2021). Human-in-the-loop: role in cyber physical agricultural systems. Internatıonal Journal of Computers Communıcatıons & Control, 16(2), 1-20.
  • Tantawy, A., Abdelwahed, S., Erradi, A. and Shaban, K. (2020). Model-based risk assessment for cyber physical systems security. Computers & Security, 96, 1-15.
  • Tripathi, D., Singh, L.K., Tripathi, A.K. and Chaturvedi, A. (2021). Model based security verification of Cyber-Physical system based on Petrinet: A case study of nuclear power plant. Annals of Nuclear Energy, 159, 1-14.
  • ur Rehman, S. and Gruhn, V. (2018). An effective security requirements engineering framework for cyber-physical systems. Technologies, 6(65),1-20.
  • Walker‑Roberts Hammoudeh, S.M., Aldabbas, O., Aydin, M. and Dehghantanha, A. (2020). Threats on the horizon: understanding security threats in the era of cyber‑physical systems. The Journal of Supercomputing, 76, 2643–2664.
  • Wu, G., Sun, J. and Chen, J. (2016). A survey on the security of cyber-physical systems. Control Theory and Technology, 14(1), 2–10.
  • Yaacoub, J.P.A., Salman, O., Noura, H.N., Kaaniche, N., Chehab A. and Malli M. (2020). Cyber-physical systems security: Limitations, issues and future trends. Microprocessors and Microsystems, 77, 1-33.
  • Zegzhda, D.P. (2016). Sustainability as a criterion for information security in cyber-physical systems. Automatic Control and Computer Sciences, 50(8), 813–819.
  • Zhang, D., Wang, Q.G., Feng, G., Shi, Y. and Vasilakos, A.V. (2021). A survey on attack detection, estimation and control of industrial cyber–physical systems. ISA Transactions, 116, 1-16.

Cyber-Physical Systems and Cyber Security: A Bibliometric Analysis

Year 2022, Volume: 19 Issue: 45, 35 - 49, 30.01.2022
https://doi.org/10.26466/opusjsr.1063227

Abstract

With the emergence of Industry 4.0, the use of advanced technologies has become widespread in both the manufacturing and service sectors. Among the most important of the advanced technologies used are cyber physical systems (CPS). Along with the use of technology, security has also become highly important. For this reason, along with CPSs, the issue of cyber security has also developed. For this purpose, in this study, bibliometric analysis of 827 studies published between 1999-2021 in the field of CPS and cyber security in journals scanned in Web of Science was performed. With the thematic evolution analysis, the change in the field has been revealed based on time. While the basic elements of cyber security issues were discussed in the period of 1999-2015, which was determined as the first period, issues such as smart grids and education were observed in the period of 2016-2019, which was determined as the second period. In the last period of 2020-2021, topics such as cloud computing, game theory and maritime cyber security have emerged. However, there are also CPSs and cyber security concepts that exist in all three periods. From this point of view, it can be concluded that the field of CPS and cyber security is not yet fully mature and more detailed studies are needed on basic issues, while interdisciplinary studies are expected to gain weight in the coming days, as it is a subject that has an impact on many different dimensions.

References

  • Akhuseyinoglu, N.B. and Joshi, J. (2020). A constraint and risk-aware approach to attribute-based access control for cyber-physical systems. Computers & Security, 96, 1-18.
  • Al-Mhiqani, M.N., Ahmad, R., Yassin, W., Hassan, A., Zainal Abidin, Z., Salih Ali, N. and Abdulkareem, K.H. (2018). Cyber-Security incidents: A review cases in cyber-physical systems. (IJACSA) International Journal of Advanced Computer Science and Applications, 9(1), 499-508.
  • Alguliyev, R., Imamverdiyev, Y. and Sukhostat, L. (2018). Cyber-physical systems and their security issues. Computers in Industry, 100, 212–223.
  • Arnaboldi, L., Czekster, R.M. and Morisset, C. (2020). Modelling load-changing attacks in cyber-physical systems. Electronic Notes in Theoretical Computer Science, 353, 39–60.
  • Brandman, J., Sturm, L., White, J. and Williams, C. (2020). A physical hash for preventing and detecting cyber-physical attacks in additive manufacturing systems. Journal of Manufacturing Systems, 56, 202–212.
  • Carter, B., Adams, S., Bakirtzis, G., Sherburne, T., Beling, P., Horowitz, B. and Fleming, C. (2019). A preliminary design-phase security methodology for cyber–physical systems. Systems, 7(21), 1-22.
  • Chen, D., Wawrzynski, P. and Lv, Z. (2021). Cyber security in smart cities: A review of deep learning-based applications and case studies. Sustainable Cities and Society, 66,1-12.
  • Çakmak, H. and Demir, C. K. (2009), Siber dünyadaki tehdit ve kavramlar”, suç, terör ve savaş üçgeninde siber dünya, 1. Baskı İçinde (p.23-54), Ankara: Barış Platin Kitabevi.
  • DiMase, D., Collier, Z.A., Heffner, K. and Linkov, I. (2015). Systems engineering framework for cyber physical security and resilience. Environ Syst Decis, 35, 291–300.
  • Elhabashy, A.E., Wells, L.J. and Camelio, J.A. (2019). Cyber-Physical security research efforts in manufacturing – a literature review. Procedia Manufacturing, 34, 921-931.
  • Geismann, J. and Bodden, E. (2020). A systematic literature review of model-driven security engineering for cyber–physical systems. The Journal of Systems & Software, 169, 1-17.
  • Ghadge, A., Weiß, M., Caldwell, N.D. and Wilding, R. (2020), Managing cyber risk in supply chains: a review and research agenda. Supply Chain Management, 25(2), 223-240.
  • Gunes, B., Kayisoglu, G. and Bolat, P. (2021). Cyber security risk assessment for seaports: A case study of a container port. Computers & Security, 103, 1-22.
  • Ismail, R., and Zainab, A. (2011). Information systems security in special and public libraries: An assessment of status. Malaysian Journal of Library & Information Science, 16(2), 45- 62.
  • Kaur, J. and Ramkumar, K.R. (2021). The recent trends in cyber security: A review. Journal of King Saud University – Computer and Information Sciences, 34(1), 1-16.
  • Kholidy, H.A. (2021). Autonomous mitigation of cyber risks in the Cyber–Physical Systems. Future Generation Computer Systems, 115, 171–187.
  • Mourtzis, D. and Vlachou, E. (2016). Cloud-based cyber-physical systems and quality of services. The TQM Journal, 28(5), 704-733.
  • Palleti, V.R., Chong, T.Y. and Samavedham, L. (2018). A mechanistic fault detection and isolation approach using Kalmanfilter to improve the security of cyber physical systems. Journal of Process Control, 68, 160–170.
  • Pan, M., Wang, J., Errapotu, S. M., Zhang, X., Ding, J., and Han, Z. (2019). Big data privacy preservation for cyber-physical systems. Cham: Springer International Publishing. https://doi. org/10.1007/978-3-030-13370-2.
  • Pandey, S., Singh, R.K., Gunasekaran, A. and Kaushik, A. (2020). Cyber security risks in globalized supply chains: conceptual framework. Journal of Global Operations and Strategic Sourcing, 13(1), 103-128.
  • Parn, E.A. and Edwards, D. (2019). Cyber threats confronting the digital built environment Common data environment vulnerabilities and block chain deterrence. Engineering, Construction and Architectural Management, 26(2), 245-266.
  • Pasqualetti, F., Dörfler, F. and Bullo, F. (2013). Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 58(11), 2715-2729.
  • Raban, Y. and Hauptman, A. (2018). Foresight of cyber security threat drivers and affecting technologies. Foresight, 20(4), 353-363.
  • Rajkumar, R., Lee, I., Sha, L., and Stankovic, J. (2010). Cyber-physical systems. In S. Sapatnekar (Ed.), Proceedings of the 47th Design Automation Conference on - DAC ‘10 (p.731). New York, New York, USA: ACM Press. https://doi.org/10.1145/1837274.1837461.
  • Rid, T. and McBurney, P. (2012), Cyber-Weapons. The RUSI Journal, 157(1), 6-13.
  • Sreeram, M. and Shimon, Y. N. (2021). Human-in-the-loop: role in cyber physical agricultural systems. Internatıonal Journal of Computers Communıcatıons & Control, 16(2), 1-20.
  • Tantawy, A., Abdelwahed, S., Erradi, A. and Shaban, K. (2020). Model-based risk assessment for cyber physical systems security. Computers & Security, 96, 1-15.
  • Tripathi, D., Singh, L.K., Tripathi, A.K. and Chaturvedi, A. (2021). Model based security verification of Cyber-Physical system based on Petrinet: A case study of nuclear power plant. Annals of Nuclear Energy, 159, 1-14.
  • ur Rehman, S. and Gruhn, V. (2018). An effective security requirements engineering framework for cyber-physical systems. Technologies, 6(65),1-20.
  • Walker‑Roberts Hammoudeh, S.M., Aldabbas, O., Aydin, M. and Dehghantanha, A. (2020). Threats on the horizon: understanding security threats in the era of cyber‑physical systems. The Journal of Supercomputing, 76, 2643–2664.
  • Wu, G., Sun, J. and Chen, J. (2016). A survey on the security of cyber-physical systems. Control Theory and Technology, 14(1), 2–10.
  • Yaacoub, J.P.A., Salman, O., Noura, H.N., Kaaniche, N., Chehab A. and Malli M. (2020). Cyber-physical systems security: Limitations, issues and future trends. Microprocessors and Microsystems, 77, 1-33.
  • Zegzhda, D.P. (2016). Sustainability as a criterion for information security in cyber-physical systems. Automatic Control and Computer Sciences, 50(8), 813–819.
  • Zhang, D., Wang, Q.G., Feng, G., Shi, Y. and Vasilakos, A.V. (2021). A survey on attack detection, estimation and control of industrial cyber–physical systems. ISA Transactions, 116, 1-16.
There are 34 citations in total.

Details

Primary Language English
Journal Section Research Articles
Authors

Bülent Yıldız This is me 0000-0002-5368-2805

Elham Hasan Younes Gejam This is me 0000-0002-0024-2910

Publication Date January 30, 2022
Published in Issue Year 2022 Volume: 19 Issue: 45

Cite

APA Yıldız, B., & Younes Gejam, E. H. (2022). Cyber-Physical Systems and Cyber Security: A Bibliometric Analysis. OPUS Journal of Society Research, 19(45), 35-49. https://doi.org/10.26466/opusjsr.1063227