From: A survey of methods supporting cyber situational awareness in the context of smart cities
Research area/references | [16] | [17] | [19] | [18] | [23] | [24] | [20] | [21] | [25] | [26] | [27] | This work |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Case studies | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
Functional architecture | ✓ | ✓ | ✓ | ✓ | ||||||||
Enabling technologies | ✓ | ✓ | ✓ | |||||||||
Cybersecurity requirements | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
Threat profile | ||||||||||||
Exploratory | ✓ | ✓ | ✓ | |||||||||
Enabling technology | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||
Data | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||
Third-party vulnerabilities | ✓ | ✓ | ||||||||||
Domain-specific | ✓ | ✓ | ✓ | |||||||||
A classification of threats with examples of attack and impact | ✓ | |||||||||||
Interdependency models | ✓ | ✓ | ✓ | |||||||||
Risk and vulnerability assessment | ✓ | |||||||||||
Attack detection methods | ✓ | |||||||||||
Countermeasures | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||
Forensics | ✓ |