{"id":1138,"date":"2021-10-13T16:47:34","date_gmt":"2021-10-13T20:47:34","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?p=1138"},"modified":"2026-01-26T10:41:50","modified_gmt":"2026-01-26T15:41:50","slug":"new-publication-modeling-and-simulation-approaches-for-cybersecurity-impact-analysis-state-of-the-art","status":"publish","type":"post","link":"https:\/\/carleton.ca\/cybersea\/2021\/new-publication-modeling-and-simulation-approaches-for-cybersecurity-impact-analysis-state-of-the-art\/","title":{"rendered":"New Publication: Modeling and Simulation Approaches for Cybersecurity Impact Analysis: State-of-the-Art"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        New Publication: Modeling and Simulation Approaches for Cybersecurity Impact Analysis: State-of-the-Art\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<p>Our new publication &#8220;<a href=\"https:\/\/doi.org\/10.23919\/ANNSIM52504.2021.9552043\">Modeling and Simulation Approaches for Cybersecurity Impact Analysis: State-of-the-Art<\/a>&#8221; is now published online. In this paper, we survey the existing literature to aggregate the diverse modeling and simulation-based approaches that have been used to define and\/or characterize the impact of attacks on cyber-physical and industrial control systems. The resulting analysis provides insight into the varying definitions of impact and domains of application, providing recommendations to guide future impact analysis studies. It was presented at the <a href=\"https:\/\/scs.org\/annsim\/\">2021 Annual Modeling and Simulation Conference (ANNSIM)<\/a> in July 2021. See <a href=\"https:\/\/carleton.ca\/cybersea\/publications\/\">Publications<\/a>&nbsp;for more details!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our new publication &#8220;Modeling and Simulation Approaches for Cybersecurity Impact Analysis: State-of-the-Art&#8221; is now published online. In this paper, we survey the existing literature to aggregate the diverse modeling and simulation-based approaches that have been used to define and\/or characterize the impact of attacks on cyber-physical and industrial control systems. The resulting analysis provides insight [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"class_list":["post-1138","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publication"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=1138"}],"version-history":[{"count":2,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1138\/revisions"}],"predecessor-version":[{"id":1140,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1138\/revisions\/1140"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media\/431"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=1138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/categories?post=1138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/tags?post=1138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}