Open Access
Issue
Security and Safety
Volume 5, 2026
Article Number 2026002
Number of page(s) 19
Section Industrial Control
DOI https://doi.org/10.1051/sands/2026002
Published online 27 January 2026
  1. Adamov A. Russian wipers in the cyberwar against Ukraine. In: Virus Bulletin Conference. Pague: Virus Bulletin, 2022, https://www.virusbulletin.com/uploads/pdf/conference/vb2022/papers/VB2022-Russian-wipers-in-the-cyberwar-against-Ukraine.pdf [Google Scholar]
  2. Lella I, Theocharidou M and Magonara E et al. ENISA threat landscape 2024. Attiki: European Union Agency for Cybersecurity 2024, https://www.enisa.europa.eu/sites/default/files/2024-11/ENISA%20Threat%20Landscape%202024_0.pdf [Google Scholar]
  3. Maynard P, McLaughlin K and Sezer S. Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems. J Cybers 2020; 6: tyaa020, https://doi.org/10.1093/cybsec/tyaa020 [Google Scholar]
  4. Palleti VR, Adepu S and Mishra VK, et al. Cascading effects of cyber-attacks on interconnected critical infrastructure. Cybersecurity 2021; 4: 8, https://doi.org/10.1186/s42400-021-00071-z [Google Scholar]
  5. Aljohani TM. Cyberattacks on energy infrastructures as modern war weapons – part I: Analysis and motives. IEEE Techn Soc Magaz 2024; 43: 59–69, https://doi.org/10.1109/mts.2024.3395688 [Google Scholar]
  6. Haataja S. Cyber operations against critical infrastructure under norms of responsible state behaviour and international law. Inter J Law Inform Techn 2023; 30: 423–443, https://doi.org/10.1093/ijlit/eaad006 [Google Scholar]
  7. Alqudhaibi A, Albarrak M and Aloseel A, et al. Predicting cybersecurity threats in critical infrastructure for industry 4.0: A proactive approach based on attacker motivations. Sensors 2023; 23: 4539, https://doi.org/10.3390/s23094539 [Google Scholar]
  8. Kasabji D. Deep dive into the May 2023 cyber attack on Danish energy infrastructure, 2023, https://conscia.com/blog/deep-dive-into-the-may-2023-cyber-attack-on-danish-energy-infrastructure/ [Google Scholar]
  9. Orleans-Bosomtwe PK. Critical infrastructure security: Penetration testing and exploit development perspectives, 2024, https://doi.org/10.48550/arXiv.2407.17256 [Google Scholar]
  10. Tovkun, Y. Personal data protection in context of cyberwarfare. Karlskrona: Blekinge Inst Techn, 2023. https://www.diva-portal.org/smash/get/diva2:1773044/FULLTEXT02 [Google Scholar]
  11. Pollard M. A case study of Russian cyber-attacks on the Ukrainian power grid: Implications and best practices for the United States. Pepper Policy Rev 2024; 16: 1, https://digitalcommons.pepperdine.edu/ppr/vol16/iss1/1 [Google Scholar]
  12. Presekal A, Rajkumar VS and Ştefanov A et al. Cyberattacks on power systems. In: Parizad A, Baghaee HR, Rahman S (Eds.). Smart Cyber-Physical Power Systems: Fundamental Concepts, Challenges, and Solutions. Hoboken: Institute of Electrical and Electronics Engineers, 2025, https://doi.org/10.1002/9781394191529.ch15 [Google Scholar]
  13. Olteanu M. SSSCIP’s perspective on the cyber-attacks in the context of the military conflict between Russia and Ukraine (January 2022-January 2024). Bul of “Carol I” Nat Defen Univ 2024; 13: 63–79, https://doi.org/10.53477/2284-9378-24-04 [Google Scholar]
  14. Brooks RR, Yu L and Ozcelik I et al. Distributed denial of service (DDoS): a history. IEEE Annals of the Hist Comp 2022; 44: 44–54, https://doi.org/10.1109/MAHC.2021.3072582 [Google Scholar]
  15. Sam J. A research report on advanced persistent threat Fancy Bear (APT28) threat actor, 2024, https://www.researchgate.net/publication/383606556 [Google Scholar]
  16. CERT-UA. The first annual report on the results of the vulnerability detection and response system for cyber incidents and cyber attacks, 2022, https://cert.gov.ua/article/17696 [Google Scholar]
  17. European Union Agency for Network and Information Security. 2024 Report on the state of the cybersecurity in the Union, 2024, https://www.enisa.europa.eu/publications/2024-report-on-the-state-of-the-cybersecurity-in-the-union [Google Scholar]
  18. Cybersecurity & Infrastructure Security Agency. Cybersecurity Advisory Committee (CSAC) Reports and Recommendations, 2025, http://cisa.gov/resources-tools/resources/cybersecurity-advisory-committee-csac-reports-and-recommendations [Google Scholar]
  19. Center for Threat Informed Defense MITRE. 2024 Impact Report, 2025, https://ctid.mitre.org/resources/2024-impact-report/2024%20Impact%20Report%20Center%20for%20Threat-Informed%20Defense.pdf [Google Scholar]
  20. Georgescu A, Gurău M-M and Bucovetchi O, et al. The European cybersecurity framework for critical energy infrastructures. In: Barichella A, Yada J (Eds.). The Palgrave Handbook of Cybersecurity, Technologies and Energy Transitions. Cham: Palgrave Macmillan 2025, https://doi.org/10.1007/978-3-031-04196-9_9-1 [Google Scholar]
  21. Li X. Cybercrime prevention on the agenda of modern international relations. For Affairs 2025; 35: 115–127, https://doi.org/10.59214/2663-2675.35(3).2025.115 [Google Scholar]
  22. Li Q, Zhang B and Tian D et al. MDGraph: A novel malware detection method based on memory dump and graph neural network. Expert Syst Appl 2024; 255: 124776, https://doi.org/10.1016/j.eswa.2024.124776 [Google Scholar]
  23. Dzera S. Digital human rights and their impact on intellectual property. Law Human Envir 2024; 15: 31–47, https://doi.org/10.31548/law/3.2024.31 [Google Scholar]
  24. Zhao M, Yu Z and Li Q et al. Trident: A secure framework for flexible artificial intelligence model lifecycle management in public clouds. IEEE Trans Depen Secure Comp 2025, https://doi.org/10.1109/TDSC.2025.3621865 [Google Scholar]
  25. Mampilly AJ and Midhunchakkaravarthy D. Cybersecurity mesh architecture: A framework for enhanced compatibility and security. In: Selvan CP, Sehgal N, Ruhela S, Rizvi NU (Eds.), International Conference on Innovation, Sustainability, and Applied Sciences. Cham: Springer, 2025, https://doi.org/10.1007/978-3-031-68952-9_58 [Google Scholar]
  26. Mylrea M, Nielsen M and John J, et al. Digital twin industrial immune system: AI-driven cybersecurity for critical infrastructures. In: Lawless WF, Mittu R, Sofge DA, Shortell T, McDermott TA (eds.), Systems Engineering and Artificial Intelligence. Cham: Springer, 2021, https://doi.org/10.1007/978-3-030-77283-3_10 [Google Scholar]
  27. Alshawish A. Risk-based security management in critical infrastructure organizations. Passau: University of Passau, 2021. https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/1002 [Google Scholar]
  28. ISO/IEC 27001:2022. Information security, cybersecurity and privacy protection – Information security management systems – Requirements 2022, https://www.iso.org/standard/27001 [Google Scholar]
  29. Michalec O, Milyaeva S and Rashid A. When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures? Big Data & Soc 2022; 9, https://doi.org/10.1177/20539517221108369 [Google Scholar]
  30. Kott A and Linkov I. To improve cyber resilience, measure it. Computer 2021; 54: 80–85, https://doi.org/10.1109/MC.2020.3038411 [Google Scholar]
  31. North Atlantic Treaty Organization. 2024 Cyber security, 2024, https://www.nato.int/cps/uk/natohq/topics_78170.htm?selectedLocale=en [Google Scholar]
  32. CISA Cybersecurity Awareness Program 2025, https://www.cisa.gov/resources-tools/programs/cisa-cybersecurity-awareness-program [Google Scholar]
  33. Li Q, Wang Y and Tian D et al. Component-based modeling of cascading failure propagation in directed dual-weight software networks. Comp Netw 2024; 255: 110861, https://doi.org/10.1016/j.comnet.2024.110861 [Google Scholar]
  34. Sontan AD and Samuel SV. Emerging trends in cybersecurity for critical infrastructure protection: A comprehensive review. Open MenuComput Sci IT Res J 2024; 5: 576–593, https://doi.org/10.51594/csitrj.v5i3.872 [Google Scholar]
  35. Khaustova V, Tirlea MR and Dandara L, et al. Development of critical infrastructure from the point of view of information security. Strategic Univ – J Interdisciplinary Strat Secur Stud 2023; 53: 170–188, https://ibn.idsi.md/sites/default/files/imag_file/p-170-188.pdf [Google Scholar]
  36. Aminu M, Akinsanya A and Oyedokun O et al. A review of advanced cyber threat detection techniques in critical infrastructure: Evolution, current state, and future directions. Icon Res Engin J 2024; 8: 74–87, https://www.irejournals.com/paper-details/1706103 [Google Scholar]
  37. Liu S, Li K and Zhao M et al. M3-Med: A benchmark for multi-lingual, multi-modal, and multi-hop reasoning in medical instructional video understanding. ArXiv preprint [arXiv: arXiv.2507.04289], 2025, https://doi.org/10.48550/arXiv.2507.04289 [Google Scholar]
  38. Riggs H, Tufail S and Parvez I et al. Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure. Sensors 2023; 23: 4060, https://doi.org/10.3390/s23084060 [Google Scholar]
  39. George AS, Baskar T and Srikaanth PB. Cyber threats to critical infrastructure: assessing vulnerabilities across key sectors. Part Univ Inter Innov J 2024; 2: 51–75, https://doi.org/10.5281/zenodo.10639463 [Google Scholar]
  40. Thakur K, Ali ML and Jiang N et al. Impact of cyber-attacks on critical infrastructure. In: Qiu M (ed.), IEEE International Conference on High Performance and Smart Computing. New York: IEEE 2016, https://doi.org/10.1109/bigdatasecurity-hpsc-ids.2016.22 [Google Scholar]
  41. Maglaras L, Janicke H and Ferrag MA. Cybersecurity of critical infrastructures: Challenges and solutions. Sensors 2022; 22: 5105, https://doi.org/10.3390/s22145105 [Google Scholar]
  42. Lehto M. Cyber-attacks against critical infrastructure. In: Lehto M, Neittaanmäki P (eds.), Cyber security: Critical Infrastructure Protection. Cham: Springer, 2022, https://doi.org/10.1007/978-3-030-91293-2_1 [Google Scholar]
  43. Haridas R, Sharma S and Bhakar R et al. Cybersecurity threats to critical energy infrastructure in India: challenges, opportunities and insights for developing nations. Common Cyber J 2025; 3: 53–78, https://production-new-commonwealth-files.s3.eu-west-2.amazonaws.com/s3fs-public/2025-04/d20104 _v9-cybercrime-journal_vol3_v1_lr.pdf [Google Scholar]
  44. Stoddart K. Cyberwar: Attacking critical infrastructure. In: Stoddart K (ed.), Cyberwarfare: Threats to Critical Infrastructure. Cham: Palgrave Macmillan, 2022, https://doi.org/10.1007/978-3-030-97299-8_3 [Google Scholar]
  45. Djenna A, Harous S and Saidouni DE. Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure. Applied Scien 2021; 11: 4580, https://doi.org/10.3390/app11104580 [Google Scholar]
  46. Pidpalyi O and Romanov O. SDN and blockchain integration: Overview of the current state and prospects for ensuring network security. Inform Techn Comp Engin 2025; 22: 20–34, https://doi.org/10.31649/vitce/2.2025.20 [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.