Analyzing ICS security: A survey of design principles, risks, threats, and mitigation methods. Saini, A., Krishan, K., & Gaur, M. S. Comput. Electr. Eng., 132:110967, 2026.
Paper doi bibtex @article{DBLP:journals/cee/SainiKG26,
author = {Anil Saini and
Kewal Krishan and
Manoj Singh Gaur},
title = {Analyzing {ICS} security: {A} survey of design principles, risks,
threats, and mitigation methods},
journal = {Comput. Electr. Eng.},
volume = {132},
pages = {110967},
year = {2026},
url = {https://doi.org/10.1016/j.compeleceng.2026.110967},
doi = {10.1016/J.COMPELECENG.2026.110967},
timestamp = {Wed, 11 Mar 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/cee/SainiKG26.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"jjGR698DXkrkrx7gg","bibbaseid":"saini-krishan-gaur-analyzingicssecurityasurveyofdesignprinciplesrisksthreatsandmitigationmethods-2026","author_short":["Saini, A.","Krishan, K.","Gaur, M. S."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Anil"],"propositions":[],"lastnames":["Saini"],"suffixes":[]},{"firstnames":["Kewal"],"propositions":[],"lastnames":["Krishan"],"suffixes":[]},{"firstnames":["Manoj","Singh"],"propositions":[],"lastnames":["Gaur"],"suffixes":[]}],"title":"Analyzing ICS security: A survey of design principles, risks, threats, and mitigation methods","journal":"Comput. Electr. Eng.","volume":"132","pages":"110967","year":"2026","url":"https://doi.org/10.1016/j.compeleceng.2026.110967","doi":"10.1016/J.COMPELECENG.2026.110967","timestamp":"Wed, 11 Mar 2026 00:00:00 +0100","biburl":"https://dblp.org/rec/journals/cee/SainiKG26.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/cee/SainiKG26,\n author = {Anil Saini and\n Kewal Krishan and\n Manoj Singh Gaur},\n title = {Analyzing {ICS} security: {A} survey of design principles, risks,\n threats, and mitigation methods},\n journal = {Comput. Electr. Eng.},\n volume = {132},\n pages = {110967},\n year = {2026},\n url = {https://doi.org/10.1016/j.compeleceng.2026.110967},\n doi = {10.1016/J.COMPELECENG.2026.110967},\n timestamp = {Wed, 11 Mar 2026 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/cee/SainiKG26.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Saini, A.","Krishan, K.","Gaur, M. S."],"key":"DBLP:journals/cee/SainiKG26","id":"DBLP:journals/cee/SainiKG26","bibbaseid":"saini-krishan-gaur-analyzingicssecurityasurveyofdesignprinciplesrisksthreatsandmitigationmethods-2026","role":"author","urls":{"Paper":"https://doi.org/10.1016/j.compeleceng.2026.110967"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://dblp.org/pers/tb2/g/Gaur:Manoj_Singh","dataSources":["dvnZAb5DbKvsvGk9M"],"keywords":[],"search_terms":["analyzing","ics","security","survey","design","principles","risks","threats","mitigation","methods","saini","krishan","gaur"],"title":"Analyzing ICS security: A survey of design principles, risks, threats, and mitigation methods","year":2026}