{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T17:38:55Z","timestamp":1778607535225,"version":"3.51.4"},"reference-count":126,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2022,7,31]],"date-time":"2022-07-31T00:00:00Z","timestamp":1659225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2022,7,31]]},"abstract":"<jats:p>\n            There has been significant interest within the offshore oil and gas industry to utilise\n            <jats:bold>Industrial Internet of Things (IIoT)<\/jats:bold>\n            and\n            <jats:bold>Industrial Cyber-Physical Systems (ICPS)<\/jats:bold>\n            . There has also been a corresponding increase in cyberattacks targeted at oil and gas companies. Offshore oil production requires remote access to and control of large and complex hardware resources. This is achieved by integrating ICPS,\n            <jats:bold>Supervisory, Control and Data Acquisition (SCADA)<\/jats:bold>\n            systems, and IIoT technologies. A successful cyberattack against an\n            <jats:bold>oil and gas (O&amp;G)<\/jats:bold>\n            offshore asset could have a major impact on the environment, marine ecosystem and safety of personnel. Any disruption to the world\u2019s supply of O&amp;G can also have an effect on oil prices and the global economy. We describe the cyberattack surface within the oil and gas industry, discussing emerging trends in the offshore sub-sector and provide a historical perspective of known cyberattacks. We also present a case study of a subsea control system architecture typically used in offshore O&amp;G operations and highlight potential vulnerabilities affecting the components of the system. This study is the first to provide a detailed analysis of attack vectors in a subsea control system. The analysis provided can be used to understand key vulnerabilities in such systems and may be used to implement efficient mitigation methods.\n          <\/jats:p>","DOI":"10.1145\/3548691","type":"journal-article","created":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T11:13:14Z","timestamp":1657797194000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective"],"prefix":"10.1145","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7505-7835","authenticated-orcid":false,"given":"Abubakar Sadiq","family":"Mohammed","sequence":"first","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2411-0891","authenticated-orcid":false,"given":"Philipp","family":"Reinecke","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0396-633X","authenticated-orcid":false,"given":"Pete","family":"Burnap","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3597-2646","authenticated-orcid":false,"given":"Omer","family":"Rana","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5274-0727","authenticated-orcid":false,"given":"Eirini","family":"Anthi","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,9,7]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"Rachel Adams-Heard David Wethe and Kevin Crowley. 2020. Turning Oil Wells Back On is Trickier than Shutting Them Off. (2020). https:\/\/energynow.com\/2020\/05\/turning-oil-wells-back-on-is-trickier-than-shutting-them-off\/."},{"key":"e_1_3_1_3_2","volume-title":"Abu Dhabi International Petroleum Conference and Exhibition","author":"Al-Issa Ayman","year":"2012","unstructured":"Ayman Al-Issa et\u00a0al. 2012. Protecting the digital oil field from emerging cyber threats. In Abu Dhabi International Petroleum Conference and Exhibition. Society of Petroleum Engineers."},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.69"},{"key":"e_1_3_1_5_2","volume-title":"SPE International Conference and Exhibition on Health, Safety, Security, Environment, and Social Responsibility","author":"Aljubran Mohammad","year":"2018","unstructured":"Mohammad Aljubran, Mohammed Al-Ghazal, Viranchi Vedpathak, et\u00a0al. 2018. Integrated cybersecurity for modern information control models in oil and gas operations. In SPE International Conference and Exhibition on Health, Safety, Security, Environment, and Social Responsibility. Society of Petroleum Engineers."},{"key":"e_1_3_1_6_2","volume-title":"International Petroleum Technology Conference","author":"Almusaher Hadi","year":"2020","unstructured":"Hadi Almusaher, Gulzar Alam, et\u00a0al. 2020. How feasible moving target defense is within ICS environment. In International Petroleum Technology Conference. International Petroleum Technology Conference."},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2018.2823906"},{"key":"e_1_3_1_8_2","first-page":"228","volume-title":"Cloud Infrastructures, Services, and IoT Systems for Smart Cities","author":"Anthi Eirini","year":"2017","unstructured":"Eirini Anthi, Amir Javed, Omer Rana, and George Theodorakopoulos. 2017. Secure data sharing and analysis in cloud-based energy management systems. In Cloud Infrastructures, Services, and IoT Systems for Smart Cities. Springer, 228\u2013242."},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102352"},{"key":"e_1_3_1_10_2","unstructured":"Oil & Gas Authority. 2017. Analysis of UKCS Operating Costs in 2016. (2017). https:\/\/www.ogauthority.co.uk\/media\/4514\/ukcs-operating-cost-analysis.pdf."},{"key":"e_1_3_1_11_2","volume-title":"Offshore Mediterranean Conference and Exhibition","author":"Avanzini Giovanni Buizza","year":"2019","unstructured":"Giovanni Buizza Avanzini, Andrea Spessa, et\u00a0al. 2019. Cybersecurity verification approach for the oil & gas industry. In Offshore Mediterranean Conference and Exhibition."},{"key":"e_1_3_1_12_2","article-title":"Grounds for suspicion: Physics-based early warnings for stealthy attacks on industrial control systems","author":"Azzam Mazen","year":"2021","unstructured":"Mazen Azzam, Liliana Pasquale, Gregory Provan, and Bashar Nuseibeh. 2021. Grounds for suspicion: Physics-based early warnings for stealthy attacks on industrial control systems. arXiv preprint arXiv:2106.07980 (2021).","journal-title":"arXiv preprint arXiv:2106.07980"},{"key":"e_1_3_1_13_2","first-page":"807","volume-title":"25th  \\( \\lbrace \\) USENIX \\( \\rbrace \\)  Security Symposium ( \\( \\lbrace \\) USENIX \\( \\rbrace \\)  Security 16)","author":"Bartos Karel","year":"2016","unstructured":"Karel Bartos, Michal Sofka, and Vojtech Franc. 2016. Optimized invariant representation of network traffic for detecting unseen malware variants. In 25th \\( \\lbrace \\) USENIX \\( \\rbrace \\) Security Symposium ( \\( \\lbrace \\) USENIX \\( \\rbrace \\) Security 16). 807\u2013822."},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2013.105"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101677"},{"key":"e_1_3_1_16_2","unstructured":"Bernard Brode. 2021. 7 cyber threat actors to watch for in 2021. (2021). https:\/\/www.securityinfowatch.com\/cybersecurity\/article\/21207268\/7-cyber-threat-actors-to-watch-for-in-2021."},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ocecoaman.2018.10.024"},{"issue":"6","key":"e_1_3_1_18_2","article-title":"Effects of cybercrime on oil and gas industry","volume":"8","author":"Bundi Dorothy","year":"2020","unstructured":"Dorothy Bundi and Mayieka Jared Maranga. 2020. Effects of cybercrime on oil and gas industry. GSJ 8, 6 (2020).","journal-title":"GSJ"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203865"},{"key":"e_1_3_1_21_2","first-page":"154","volume-title":"International Conference on Critical Information Infrastructures Security","author":"Choi Seungoh","year":"2018","unstructured":"Seungoh Choi, Jeong-Han Yun, and Sin-Kyu Kim. 2018. A comparison of ICS datasets for security research based on attack paths. In International Conference on Critical Information Infrastructures Security. Springer, 154\u2013166."},{"key":"e_1_3_1_22_2","unstructured":"Piotr Ciepiela. 2016. Digitization and Cyber Disruption in Oil and Gas. (2016). https:\/\/www.ey.com\/Publication\/vwLUAssets\/ey-wpc-digitization-and-cyber\/$FILE\/ey-wpc-digitization-and-cyber.pdf."},{"key":"e_1_3_1_23_2","volume-title":"22nd World Petroleum Congress","author":"Ciepiela Piotr","year":"2017","unstructured":"Piotr Ciepiela, Bala V. Venkateshwaran, et\u00a0al. 2017. Evolution of cyber threats and the development of new security architecture. In 22nd World Petroleum Congress."},{"key":"e_1_3_1_24_2","article-title":"Short guide summarising the oil and gas industry lifecycle for a non-technical audience","author":"Darko Emily","year":"2014","unstructured":"Emily Darko. 2014. Short guide summarising the oil and gas industry lifecycle for a non-technical audience. London: Overseas Development Institute (2014).","journal-title":"London: Overseas Development Institute"},{"key":"e_1_3_1_25_2","unstructured":"DEFCON23. 2015. Compilation of ICS PCAP files indexed by protocol. (2015). https:\/\/media.defcon.org\/DEFCON23\/DEFCON23villages\/DEFCON23icsvillage\/DEFCON23ICSVillagepacketcaptures.rar."},{"key":"e_1_3_1_26_2","unstructured":"H\u00e5vard Devold. 2006. Oil and Gas Production Handbook . (2006)."},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.2118\/0619-0014-JPT"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2015.7245330"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1201\/b10867"},{"key":"e_1_3_1_30_2","unstructured":"Collin Eaton. 2018. HACKED Part 1: As cyberattacks become more sophisticated energy industry\u2019s controls provide an alluring target. (2018). https:\/\/www.houstonchronicle.com\/news\/houston-texas\/houston\/article\/As-cyberattacks-become-more-sophisticated-energy-10973429.php."},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSA.2016.19"},{"key":"e_1_3_1_32_2","unstructured":"Planete Energies. 2015. Offshore Oil and Gas Production. (2015). https:\/\/www.planete-energies.com\/en\/medias\/close\/offshore-oil-and-gas-production."},{"key":"e_1_3_1_33_2","unstructured":"Offshore Energy. 2013. Samsung to Build Largest FPSO in the World. (2013). https:\/\/www.offshore-energy.biz\/samsung-to-build-largest-fpso-in-the-world\/."},{"key":"e_1_3_1_34_2","unstructured":"Equinor. 2021. Equinor sells its US onshore assets in the Bakken. (2021). https:\/\/www.equinor.com\/en\/news\/20210210-us-onshore.html."},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.05.001"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2737630"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23461-8_6"},{"key":"e_1_3_1_38_2","article-title":"Cyber-weapons in international politics: Possible sabotage against the Norwegian petroleum sector","author":"Friis Karsten","year":"2018","unstructured":"Karsten Friis, Lilly Pijnenburg Muller, and Lars Gjesvik. 2018. Cyber-weapons in international politics: Possible sabotage against the Norwegian petroleum sector. NUPI Report (2018).","journal-title":"NUPI Report"},{"key":"e_1_3_1_39_2","volume-title":"Offshore Technology Conference","author":"Frostad Anna Isabella Thomassen","year":"2020","unstructured":"Anna Isabella Thomassen Frostad, Thomas Singer, Linda Fl\u00f8ttum, Trygve Andreas Rikheim, Robin Balas, Svein Audun Haaheim, et\u00a0al. 2020. Unmanned full processing platforms; using subsea technology as enabler. In Offshore Technology Conference."},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2709310"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3203245"},{"key":"e_1_3_1_42_2","unstructured":"DNV GL. 2017. Oil and gas forecast to 2050. (2017). https:\/\/eto.dnvgl.com\/2017\/oilgas."},{"key":"e_1_3_1_43_2","first-page":"88","volume-title":"International Conference on Critical Information Infrastructures Security","author":"Goh Jonathan","year":"2016","unstructured":"Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, and Aditya Mathur. 2016. A dataset to support research in the design of secure water treatment systems. In International Conference on Critical Information Infrastructures Security. Springer, 88\u201399."},{"key":"e_1_3_1_44_2","article-title":"Drilling deep: A look at cyberattacks on the oil and gas industry","author":"Hacquebord F.","year":"2019","unstructured":"F. Hacquebord and C. Pernet. 2019. Drilling deep: A look at cyberattacks on the oil and gas industry. Trend Micro Research (2019).","journal-title":"Trend Micro Research"},{"key":"e_1_3_1_45_2","article-title":"A machine learning-based approach to build zero false-positive IPSs for industrial IoT and CPS with a case study on power grids security","author":"Haghighi Mohammad Sayad","year":"2020","unstructured":"Mohammad Sayad Haghighi, Faezeh Farivar, and Alireza Jolfaei. 2020. A machine learning-based approach to build zero false-positive IPSs for industrial IoT and CPS with a case study on power grids security. IEEE Transactions on Industry Applications (2020).","journal-title":"IEEE Transactions on Industry Applications"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2703842"},{"key":"e_1_3_1_47_2","first-page":"1","volume-title":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","author":"Hink Raymond C. Borges","year":"2014","unstructured":"Raymond C. Borges Hink, Justin M. Beaver, Mark A. Buckner, Tommy Morris, Uttam Adhikari, and Shengyi Pan. 2014. Machine learning for power system disturbance and cyber-attack discrimination. In 2014 7th International Symposium on Resilient Control Systems (ISRCS). IEEE, 1\u20138."},{"key":"e_1_3_1_48_2","unstructured":"Dragos Inc.2019. Global Oil and Gas Cyber Threat Perspective. (2019). https:\/\/www.dragos.com\/wp-content\/uploads\/Dragos-Oil-and-Gas-Threat-Perspective-2019.pdf."},{"key":"e_1_3_1_49_2","unstructured":"Ponemon Institute. 2017. The State of Cybersecurity in the Oil & Gas Industry: United States. (2017). https:\/\/assets.new.siemens.com\/siemens\/assets\/api\/uuid:4ec3d46c-234e-4f48-9bc7-aef5889dcaba\/version:1581364148\/ponemoncyberreadinessinoilgasfinal.pdf."},{"key":"e_1_3_1_50_2","unstructured":"Mordor Intelligence. 2021. Subsea Systems Market - Growth Trends COVID-19 Impact and Forecasts (2021-2026). (2021). https:\/\/www.mordorintelligence.com\/industry-reports\/subsea-systems-market."},{"key":"e_1_3_1_51_2","article-title":"Cybersecurity of industrial cyber-physical systems: A review","author":"Kayan Hakan","year":"2021","unstructured":"Hakan Kayan, Matthew Nunes, Omer Rana, Pete Burnap, and Charith Perera. 2021. Cybersecurity of industrial cyber-physical systems: A review. arXiv preprint arXiv:2101.03564 (2021).","journal-title":"arXiv preprint arXiv:2101.03564"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2016.7805855"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890184"},{"key":"e_1_3_1_54_2","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1109\/JPROC.2012.2189792","article-title":"Cyber\u2013physical systems: A perspective at the centennial","volume":"100","author":"Kim Kyoung-Dae","year":"2012","unstructured":"Kyoung-Dae Kim and Panganamala R. Kumar. 2012. Cyber\u2013physical systems: A perspective at the centennial. Proc. IEEE 100, Special Centennial Issue (2012), 1287\u20131308.","journal-title":"Proc. IEEE"},{"key":"e_1_3_1_55_2","unstructured":"David Kravets. 2009. Feds: Hacker Disabled Offshore Oil Platforms\u2019 Leak-Detection System. (2009). https:\/\/www.wired.com\/2009\/03\/feds-hacker-dis\/."},{"key":"e_1_3_1_56_2","volume-title":"SPE Annual Technical Conference and Exhibition","author":"Moorthy Utheswaran Krishna","year":"2020","unstructured":"Utheswaran Krishna Moorthy, Denys Anding, Chieh Lung Ng, Sobri Songli, Sahlan Sahak, and Mohd Hafiz Baharudin. 2020. Alternative method to supply pneumatic air to an unmanned platform, in the event of the platform\u2019s instrument gas system is on downtime. In SPE Annual Technical Conference and Exhibition. OnePetro."},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2013.6622964"},{"key":"e_1_3_1_58_2","unstructured":"ICS Lab. 2015. 4SICS ICS Lab PCAP Files. (2015). https:\/\/www.netresec.com\/?page=PCAP4SICS."},{"key":"e_1_3_1_59_2","first-page":"76865","article-title":"Protecting \u201ccybersecurity & resiliency\u201d of nation\u2019s critical infrastructure\u2013energy, oil & gas","volume":"10","author":"Lamba Anil","year":"2018","unstructured":"Anil Lamba. 2018. Protecting \u201ccybersecurity & resiliency\u201d of nation\u2019s critical infrastructure\u2013energy, oil & gas. International Journal of Current Research 10 (2018), 76865\u201376876.","journal-title":"International Journal of Current Research"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHM.2016.7542860"},{"key":"e_1_3_1_61_2","unstructured":"Robert Lee Michael Assante and Tim Conway. 2014. Media report of the Baku-Tbilisi-Ceyhan (BTC) pipeline Cyber Attack. (2014). https:\/\/ics.sans.org\/media\/Media-report-of-the-BTC-pipeline-Cyber-Attack.pdf."},{"key":"e_1_3_1_62_2","volume-title":"9th Workshop on Cyber Security Experimentation and Test ( \\( \\lbrace \\) CSET \\( \\rbrace \\)  16)","author":"Lemay Antoine","year":"2016","unstructured":"Antoine Lemay and Jos\u00e9 M. Fernandez. 2016. Providing \\( \\lbrace \\) SCADA \\( \\rbrace \\) network data sets for intrusion detection research. In 9th Workshop on Cyber Security Experimentation and Test ( \\( \\lbrace \\) CSET \\( \\rbrace \\) 16)."},{"key":"e_1_3_1_63_2","volume-title":"Upstream Oil & Gas Cyber Risk: Insurance Technical Review","author":"Lobo Francis","year":"2019","unstructured":"Francis Lobo. 2019. Upstream Oil & Gas Cyber Risk: Insurance Technical Review. (2019). https:\/\/www.lmalloyds.com\/LMA\/publications\/upstreamcyberreport.aspx."},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2019.06.007"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2014.6918252"},{"key":"e_1_3_1_66_2","volume-title":"Abu Dhabi International Petroleum Exhibition & Conference","author":"Radwan M. F. Mahmoud","year":"2020","unstructured":"M. F. Mahmoud Radwan. 2020. Safe and economic attractive rigless operations using a digital slickline in unmanned platform with low structure loads and spacing. In Abu Dhabi International Petroleum Exhibition & Conference. OnePetro."},{"key":"e_1_3_1_67_2","article-title":"Assessment of cyber security challenges in nuclear power plants security incidents, threats, and initiatives","author":"Masood Rahat","year":"2016","unstructured":"Rahat Masood. 2016. Assessment of cyber security challenges in nuclear power plants security incidents, threats, and initiatives. Cybersecurity and Privacy Research Institute the George Washington University (2016).","journal-title":"Cybersecurity and Privacy Research Institute the George Washington University"},{"key":"e_1_3_1_68_2","unstructured":"Sean McBride Jeffery Ashcraft and Nathan Belk. 2016. Overload: Critical Lessons from 15 Years of ICS Vulnerabilities. (2016). https:\/\/www.fireeye.com\/blog\/threat-research\/2016\/08\/overload-critical-lessons-from-15-years-of-ics-vulnerabilities.html."},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/2380790.2380805"},{"key":"e_1_3_1_71_2","article-title":"Protecting the connected barrels: Cybersecurity for upstream oil and gas","author":"Mittal A.","year":"2017","unstructured":"A. Mittal, A. Slaughter, and P. Zonneveld. 2017. Protecting the connected barrels: Cybersecurity for upstream oil and gas. Deloitte Insights, London, UK, Tech. Rep (2017).","journal-title":"Deloitte Insights, London, UK, Tech. Rep"},{"issue":"1","key":"e_1_3_1_72_2","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber\u2013physical security of a smart grid infrastructure","volume":"100","author":"Mo Yilin","year":"2011","unstructured":"Yilin Mo, Tiffany Hyun-Jin Kim, Kenneth Brancik, Dona Dickinson, Heejo Lee, Adrian Perrig, and Bruno Sinopoli. 2011. Cyber\u2013physical security of a smart grid infrastructure. Proc. IEEE 100, 1 (2011), 195\u2013209.","journal-title":"Proc. IEEE"},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45355-1_5"},{"key":"e_1_3_1_74_2","volume-title":"Subsea Production Systems-A Review of Components, Maintenance and Reliability","author":"Mudrak Christian","year":"2016","unstructured":"Christian Mudrak. 2016. Subsea Production Systems-A Review of Components, Maintenance and Reliability. Ph.D. Dissertation. University of Leoben."},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIPC.2016.7470786"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.010"},{"key":"e_1_3_1_77_2","unstructured":"Hellenic Shipping News. 2021. Nigeria confirms it is in talks with Shell over sale of onshore oil assets. (2021). https:\/\/www.hellenicshippingnews.com\/nigeria-confirms-it-is-in-talks-with-shell-over-sale-of-onshore-oil-assets\/."},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.2172\/1605057"},{"key":"e_1_3_1_79_2","unstructured":"Oil and Gas IQ. 2019. 10 reasons why FPSOs are the future of oil and gas. (2019). https:\/\/www.oilandgasiq.com\/oil-gas\/news\/ten-reasons-why-fpsos-are-the-future-of-oil-and-ga."},{"key":"e_1_3_1_80_2","volume-title":"SPE Nigeria Annual International Conference and Exhibition","author":"Okpala Justin","year":"2020","unstructured":"Justin Okpala, Oluwasegun Adedokun, Adagogo Jaja, Olubukola Olubukola, Emeka Ogugua, Joseph Olayomi, Inegbenose Aitokhuehi, Peters Korede, Kunle Awonuga, and Obor Eruvbentine. 2020. Enabling reservoir management excellence through real time surveillance of an unmanned onshore gas-condensate field platform. In SPE Nigeria Annual International Conference and Exhibition. OnePetro."},{"key":"e_1_3_1_81_2","article-title":"Resilient machine learning for networked cyber physical systems: A survey for machine learning security to securing machine learning for CPS","author":"Olowononi Felix O.","year":"2020","unstructured":"Felix O. Olowononi, Danda B. Rawat, and Chunmei Liu. 2020. Resilient machine learning for networked cyber physical systems: A survey for machine learning security to securing machine learning for CPS. IEEE Communications Surveys & Tutorials (2020).","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_1_82_2","unstructured":"Ruth Olurounbi. 2021. Nigeria in talks with Shell over onshore divestment plans. (2021). https:\/\/www.bloomberg.com\/news\/articles\/2021-05-18\/nigeria-in-talks-with-shell-over-onshore-divestment-plans."},{"key":"e_1_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.3390\/s16010020"},{"key":"e_1_3_1_84_2","unstructured":"Dale Peterson and Reid Wightman. 2015. Digital bond S4x15 ICS village CTF PCAP files. (2015). https:\/\/www.netresec.com\/?page=DigitalBond_S4."},{"key":"e_1_3_1_85_2","volume-title":"SAP Cybersecurity for Oil and Gas","author":"Polyakov Alexander","year":"2015","unstructured":"Alexander Polyakov and Matheu Geli. 2015. SAP Cybersecurity for Oil and Gas. Technical Report. ERP Scan."},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2017.8247662"},{"key":"e_1_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.3390\/jmse9020112"},{"key":"e_1_3_1_88_2","unstructured":"Joe R. Reeder and Cadet Tommy Hall. 2021. Cybersecurity\u2019s Pearl Harbor moment: Lessons learned from the colonial pipeline ransomware attack. (2021)."},{"key":"e_1_3_1_89_2","volume-title":"Global Distributed Control Systems (DCS) Market in the Oil and Gas Industry 2019-2023","year":"2019","unstructured":"Research and Market. 2019. Global Distributed Control Systems (DCS) Market in the Oil and Gas Industry 2019-2023. Technical Report. Research and Market."},{"key":"e_1_3_1_90_2","unstructured":"Jordan Robertson and Michael Riley. 2014. Mysterious\u201908 Turkey Pipeline Blast Opened New Cyberwar. (2014). https:\/\/www.bloomberg.com\/news\/articles\/2014-12-10\/mysterious-08-turkey-pipeline-blast-opened-new-cyberwar."},{"key":"e_1_3_1_91_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59870-3_30"},{"key":"e_1_3_1_92_2","unstructured":"Space Rogue. 2016. Tilting It Sideways. (2016). https:\/\/www.spacerogue.net\/wordpress\/?p=625."},{"key":"e_1_3_1_93_2","volume-title":"Offshore Technology Conference","author":"Rosner M.","year":"2017","unstructured":"M. Rosner, P. Herve, K. Moore, et\u00a0al. 2017. Using a cognitive analytic approach to enhance cybersecurity on oil and gas OT systems. In Offshore Technology Conference."},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"e_1_3_1_95_2","unstructured":"David Sanger Clifford Krauss and Nicole Perlroth. 2021. Cyberattack forces a shutdown of a top US pipeline. (2021). https:\/\/www.nytimes.com\/2021\/05\/08\/us\/politics\/cyberattack-colonial-pipeline.html."},{"key":"e_1_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITechnology.2013.6579516"},{"key":"e_1_3_1_97_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102481"},{"key":"e_1_3_1_98_2","volume-title":"SPE Offshore Europe Conference and Exhibition","author":"Settemsdal Stig Olav","year":"2019","unstructured":"Stig Olav Settemsdal, Ben Bishop, et\u00a0al. 2019. When to go with cloud or edge computing in offshore oil and gas. In SPE Offshore Europe Conference and Exhibition. Society of Petroleum Engineers."},{"key":"e_1_3_1_99_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.020"},{"key":"e_1_3_1_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPES.2017.8387337"},{"key":"e_1_3_1_101_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2857811"},{"key":"e_1_3_1_102_2","doi-asserted-by":"publisher","DOI":"10.1115\/OMAE2008-57411"},{"key":"e_1_3_1_103_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45931-8_6"},{"key":"e_1_3_1_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2855563"},{"key":"e_1_3_1_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007960"},{"key":"e_1_3_1_106_2","doi-asserted-by":"crossref","first-page":"215","DOI":"10.4018\/978-1-7998-2910-2","volume-title":"Cyber Security of Industrial Control Systems in the Future Internet Environment","author":"Stojanovi\u0107 Mirjana D.","year":"2020","unstructured":"Mirjana D. Stojanovi\u0107 and Slavica V. Bo\u0161tjan\u010di\u010d Rakas. 2020. Building industrial scale cyber security experimentation testbeds for critical infrastructures. In Cyber Security of Industrial Control Systems in the Future Internet Environment. IGI Global, 215."},{"issue":"82","key":"e_1_3_1_107_2","first-page":"16","article-title":"Guide to industrial control systems (ICS) security","volume":"800","author":"Stouffer Keith","year":"2011","unstructured":"Keith Stouffer, Joe Falco, and Karen Scarfone. 2011. Guide to industrial control systems (ICS) security. NIST Special Publication 800, 82 (2011), 16\u201316.","journal-title":"NIST Special Publication"},{"key":"e_1_3_1_108_2","volume-title":"Offshore Technology Conference Asia","author":"Tan Jaime HuiChoo","year":"2020","unstructured":"Jaime HuiChoo Tan, Brian Roberts, Prabakaran Sundararaju, Christophe Sintive, Laurent Facheris, Joel Vanden Bosch, Virginie Lehning, and Mathew Pegg. 2020. Transforming offshore oil and gas production platforms into smart unmanned installations. In Offshore Technology Conference Asia. OnePetro."},{"key":"e_1_3_1_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/MoWNet.2017.8045959"},{"key":"e_1_3_1_110_2","unstructured":"Offshore Technology. 2019. The longest standing fixed offshore platforms. (2019). https:\/\/www.offshore-technology.com\/features\/the-longest-standing-fixed-offshore-platforms\/."},{"key":"e_1_3_1_111_2","unstructured":"Silvia Tham. 2019. Exploring the growth of the FPSO industry. (2019). https:\/\/www.fircroft.com\/blogs\/exploring-the-growth-of-the-fpso-industry-95120129599."},{"key":"e_1_3_1_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258164"},{"key":"e_1_3_1_113_2","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2016.74"},{"key":"e_1_3_1_114_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2020.105059"},{"key":"e_1_3_1_115_2","unstructured":"Doug Walser. 2021. Production Restarts: Fiscal Technical Issues Define Operator Strategies in Restarting Shut-in Wells. (2021). https:\/\/www.aogr.com\/magazine\/cover-story\/fiscal-technical-issues-define-operator-strategies-in-restarting-shut-in-wells."},{"key":"e_1_3_1_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2995617"},{"key":"e_1_3_1_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/64.621229"},{"key":"e_1_3_1_118_2","unstructured":"Joe Weiss. 2019. What the lack of cyber security of process sensors means. (2019). https:\/\/sigasec.com\/blog\/uncategorized\/what-the-lack-of-cyber-security-of-process-sensors-means\/."},{"key":"e_1_3_1_119_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1118029109"},{"key":"e_1_3_1_120_2","unstructured":"Science X. 2012. Chevron says hit by Stuxnet virus in 2010. (2012). https:\/\/phys.org\/news\/2012-11-chevron-stuxnet-virus.html."},{"key":"e_1_3_1_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2884906"},{"key":"e_1_3_1_122_2","first-page":"101","volume-title":"1st International Symposium for ICS & SCADA Cyber Security Research 1 (ICS-CSR\u201913)","author":"Yasakethu S. L. P.","year":"2013","unstructured":"S. L. P. Yasakethu and J. Jiang. 2013. Intrusion detection via machine learning for SCADA system protection. In 1st International Symposium for ICS & SCADA Cyber Security Research 1 (ICS-CSR\u201913). 101\u2013105."},{"key":"e_1_3_1_123_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2384-3_32"},{"key":"e_1_3_1_124_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2891261"},{"key":"e_1_3_1_125_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2072970"},{"issue":"2","key":"e_1_3_1_126_2","first-page":"1","article-title":"SCADA intrusion detection system based on self-learning semi-supervised one-class support vector machine","volume":"37","author":"Zhang Yun-Gui","year":"2013","unstructured":"Yun-Gui Zhang, Wei Zhang, Xiang-Rong Xue, and Xiao-Jun Yang. 2013. SCADA intrusion detection system based on self-learning semi-supervised one-class support vector machine. Metallurgical Industry Automation 37, 2 (2013), 1\u20135.","journal-title":"Metallurgical Industry Automation"},{"key":"e_1_3_1_127_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912022"}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548691","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:53Z","timestamp":1750182653000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548691"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,31]]},"references-count":126,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,7,31]]}},"alternative-id":["10.1145\/3548691"],"URL":"https:\/\/doi.org\/10.1145\/3548691","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"value":"2378-962X","type":"print"},{"value":"2378-9638","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,31]]},"assertion":[{"value":"2021-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}