Ly present what are the security needs that have to be
Ly present what would be the security needs that have to be fulfilled [33,34]. The first part of the very first stage was a systematic literature review and evaluation followed by the choice of the relevant security publications for critical infrastructure protection. The aim was to locate the publications that may help in the extraction of safety control classes and construction of your model for safety specifications that may assistance with cross-publication compliance checks and appropriate safety assessments. As with any literature evaluation, the limitations of our critique procedure should be noted. The analysis was performed based only on our interpretation of the papers. Additionally, we cannot fully rule out the existence of other relevant standards which might be applied in some geographic regions but that weren’t incorporated in the analysis. Some proposals might have not identified their spot within the critique on account of many factors for example terminology made use of by authors which did not bring a paper for the focus of our analysis, a paper not becoming listed on the databases examined, or not consulting the gray literature. Nonetheless, the literature search technique adopted helped to ensure an acceptable level of completeness of our literature critique. Hence, we Thromboxane B2 custom synthesis believe that the set of papers analyzed is representative and also the outcomes in the analysis may well be generalized for the intelligent grid domain. The literature critique was performed following the methodological Decanoyl-L-carnitine References method proposed by authors in [35]. The aggregative databases Google Scholar and Semantic Scholar that contain papers of a lot of publishers too as recognized publishers including IEEE and Springer had been made use of within the search. Search keywords and phrases were “cybersecurity”, “security”, “standard”, and “requirements”, but because the final results have been too broad, further keywords “smart grid”, “power grid”, and “electrical grid” had been distinctively added in combination using the 1st 4. Nonetheless, distinct search engines like google within the majority looked at each on the keyword phrases individually; thus, the initial results had to be refined further by taking a look at the titles, keywords, abstracts, and eliminating duplicate and irrelevant studies, as well as employing backward and forward reference “snowballing” method. By employing that approach, the initial records count was drastically decreased and 34 papers that were relevant for the analysis have been further analyzed. Following a critique on the chosen papers, the greatest variety of them only pointed out relevant publications in other contexts, and only some of them presented the analysis a lot more comprehensively. The occurrence on the most mentioned publications in relevant context is presented in Table 1.Energies 2021, 14,9 ofTable 1. Publication occurrences within the study. Publication NERC CIP IEC 62351 ISO/IEC 27001/27002 NISTIR 7628 NIST SP 800-53 IEC 62443 (ISA 99) NIST SP 800-82 IEC 61850 GB/T 22239 DHS Catalog Sort of Publication Regulation Common Common Common Guideline Common Guideline Standard Normal Guideline Occurrence 16 14 11 11 9 8 six four 3After the evaluation, the selection of the relevant publications was performed. You can find unique qualitative [368] approaches that evaluate requirements by their domain, structure, and maturity as well as quantitative [21] approaches that base their evaluation around the variety of occurrences of certain key phrases inside the text. In this research, the initial choice was according to the quantitative strategy followed by further qualitative specifications for mo.