{"id":1821,"date":"2024-09-27T09:22:39","date_gmt":"2024-09-27T13:22:39","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?p=1821"},"modified":"2026-01-26T10:41:49","modified_gmt":"2026-01-26T15:41:49","slug":"new-publication-requirements-for-applying-scia-a-structured-cyberattack-impact-analysis-approach-for-ics","status":"publish","type":"post","link":"https:\/\/carleton.ca\/cybersea\/2024\/new-publication-requirements-for-applying-scia-a-structured-cyberattack-impact-analysis-approach-for-ics\/","title":{"rendered":"New Publication: Requirements for Applying SCIA: A Structured Cyberattack Impact Analysis Approach for ICS"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        New Publication: Requirements for Applying SCIA: A Structured Cyberattack Impact Analysis Approach for ICS\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<p>Our latest publication &#8220;<a href=\"https:\/\/doi.org\/10.1109\/QRS62785.2024.00045\">Requirements for Applying SCIA: A Structured Cyberattack Impact Analysis Approach for ICS<\/a>&#8221; is now available online. This work clarifies the rationale behind 20 requirements for applying SCIA: a Structured Cyberattack Impact Analysis approach with different modeling and simulation platforms. Based on a manufacturing ICS case study, we demonstrate two distinct applications of SCIA: (1) Application A, based on formal modeling and verification in UPPAAL-SMC, and (2) Application B, based on simulations in MATLAB\/Simulink. We show how both applications are effective at visualizing the evolution of attacks and analyzing temporary and sustained impacts on ICS reliability and availability. In doing so, we detail the methodological differences, the extent of requirement satisfaction, and the associated trade-offs This paper was was presented at the <a href=\"https:\/\/qrs24.techconf.org\/track\/award\"><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">24th IEEE International Conference on Software Quality, Reliability, and Security (QRS 2024)<\/span><\/a> in July 2024 where it won the <em>Best Paper Award<\/em>. See <a href=\"https:\/\/carleton.ca\/cybersea\/publications\/\">Publications<\/a> for more details!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our latest publication &#8220;Requirements for Applying SCIA: A Structured Cyberattack Impact Analysis Approach for ICS&#8221; is now available online. This work clarifies the rationale behind 20 requirements for applying SCIA: a Structured Cyberattack Impact Analysis approach with different modeling and simulation platforms. Based on a manufacturing ICS case study, we demonstrate two distinct applications of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"class_list":["post-1821","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publication"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=1821"}],"version-history":[{"count":1,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1821\/revisions"}],"predecessor-version":[{"id":1822,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1821\/revisions\/1822"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media\/431"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=1821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/categories?post=1821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/tags?post=1821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}