<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.scipedia.com/wd/index.php?action=history&amp;feed=atom&amp;title=Johnson_2013a</id>
		<title>Johnson 2013a - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://www.scipedia.com/wd/index.php?action=history&amp;feed=atom&amp;title=Johnson_2013a"/>
		<link rel="alternate" type="text/html" href="https://www.scipedia.com/wd/index.php?title=Johnson_2013a&amp;action=history"/>
		<updated>2026-04-23T16:41:15Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.0-wmf.10</generator>

	<entry>
		<id>https://www.scipedia.com/wd/index.php?title=Johnson_2013a&amp;diff=193651&amp;oldid=prev</id>
		<title>Scipediacontent: Scipediacontent moved page Draft Content 658342708 to Johnson 2013a</title>
		<link rel="alternate" type="text/html" href="https://www.scipedia.com/wd/index.php?title=Johnson_2013a&amp;diff=193651&amp;oldid=prev"/>
				<updated>2021-01-28T19:36:40Z</updated>
		
		<summary type="html">&lt;p&gt;Scipediacontent moved page &lt;a href=&quot;/public/Draft_Content_658342708&quot; class=&quot;mw-redirect&quot; title=&quot;Draft Content 658342708&quot;&gt;Draft Content 658342708&lt;/a&gt; to &lt;a href=&quot;/public/Johnson_2013a&quot; title=&quot;Johnson 2013a&quot;&gt;Johnson 2013a&lt;/a&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='1' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='1' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 19:36, 28 January 2021&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan='2' style='text-align: center;' lang='en'&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(No difference)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;</summary>
		<author><name>Scipediacontent</name></author>	</entry>

	<entry>
		<id>https://www.scipedia.com/wd/index.php?title=Johnson_2013a&amp;diff=193650&amp;oldid=prev</id>
		<title>Scipediacontent: Created page with &quot; == Abstract ==  Malware poses a growing threat to a host of safety-critical systems that depend on common software components, including the Linux operating system and the In...&quot;</title>
		<link rel="alternate" type="text/html" href="https://www.scipedia.com/wd/index.php?title=Johnson_2013a&amp;diff=193650&amp;oldid=prev"/>
				<updated>2021-01-28T19:36:33Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot; == Abstract ==  Malware poses a growing threat to a host of safety-critical systems that depend on common software components, including the Linux operating system and the In...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
Malware poses a growing threat to a host of safety-critical systems that depend on common software components, including the Linux operating system and the Internet Protocol (IP). Threats include `mass market' malware that is not deliberately aimed at safety-related systems. They also include more sophisticated techniques exploited by W32.Stuxnet, W32.Duqu, W32.Flame etc. Previous work in this area has focused on the consequences of a cyber-attack under `optimal conditions'. Very little work has been done to identify more complex scenarios when malware exacerbates routine system failures that occur in all safety-critical applications. We show how Vulnerability and Violation (V2) diagrams can identify interactions between malware and degraded modes of operation. The intention is not to accurately predict future modes of attack. In contrast, the aim is to create training scenarios that test the expertise and judgement of systems engineers, operators and managers. The initial results from our work have revealed the underlying vulnerabilities that exist across safety-critical transportation infrastructures. (6 pages)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Original document ==&lt;br /&gt;
&lt;br /&gt;
The different versions of the original document can be found in:&lt;br /&gt;
&lt;br /&gt;
* [http://dx.doi.org/10.1049/cp.2012.1502 http://dx.doi.org/10.1049/cp.2012.1502]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dcs.gla.ac.uk/~johnson/papers/IET_2012/ATM_cybersecurity.pdf http://www.dcs.gla.ac.uk/~johnson/papers/IET_2012/ATM_cybersecurity.pdf]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dcs.gla.ac.uk/~johnson/papers/IET_2012/ATM_cybersecurity.pdf http://www.dcs.gla.ac.uk/~johnson/papers/IET_2012/ATM_cybersecurity.pdf],&lt;br /&gt;
: [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6458944 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6458944],&lt;br /&gt;
: [https://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6458944 https://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6458944],&lt;br /&gt;
: [https://digital-library.theiet.org/content/conferences/10.1049/cp.2012.1502 https://digital-library.theiet.org/content/conferences/10.1049/cp.2012.1502],&lt;br /&gt;
: [https://academic.microsoft.com/#/detail/2066451289 https://academic.microsoft.com/#/detail/2066451289]&lt;/div&gt;</summary>
		<author><name>Scipediacontent</name></author>	</entry>

	</feed>