Regulating Cyberworthiness: Governance Frameworks for Safety-Critical Cyber-Physical Systems
Abstract
1. Introduction
- Continuous validation of the status of cyber-physical safety?
- Lifecycle traceability of cyber-resilience claims?
- Interoperability across multi-jurisdictional Complex Systems of Cyber-Physical Systems (CSoCPS)?
2. The Cyber-Physical Safety Challenge
2.1. Cyber-Physical Systems
2.2. Complex Systems of Cyber-Physical Systems
2.3. Complex Systems Governance
2.4. Cyberworthiness
- Maintain safety-critical functions under cyber-induced disruptions.
- Distinguish security-safety dependencies and conflicts.
- Sustain evidence-based assurance across lifecycle phases.
2.5. Proliferation of CPS in High-Hazard Applications
2.6. The Drawbacks of CPS
2.7. Inherent CPS Vulnerabilities
2.8. Ensuring the Cyberworthiness of CPS and CSoCPS
2.9. Current Regulatory Landscape for CPS
3. Relevant Regulatory Practices
3.1. Regulatory Approaches to Assure the Safety of High-Hazard CPS for Safety
‘…the promulgation of rules accompanied by mechanisms for monitoring and enforcement.’ [22]. The phrase regulation can include a combination of laws, regulations, technical standards, policies and processes, that apply to a specific thing.’
3.2. Prescriptive vs. Principle-Based Regulation
3.3. The Impact of Changing Technology and Disruptors on the Effectiveness of Regulation
3.4. Internal Self-Regulation vs. External Regulation
3.5. The Relevance of Cyberworthiness to CPS and CSoCPS
3.6. Illustrative Case Studies of Cyberworthiness Issues of Cyber-Physical Systems
3.7. International Cooperation on External Regulations for the Safety of CPS
- IAEA—International Atomic Energy Agency
- OECD—Organisation for Economic Co-operation and Development
- ICAO—International Civil Aviation Organization
- UNOSA—United Nations Office for Outer Space Affairs
- ENISA—European Union Agency for Cybersecurity
- IEC—International Electrotechnical Commission
- IEEE—Institute of Electrical and Electronics Engineers
- ISO—International Standards Organization
- NIST—National Institute of Standards and Technology
3.8. Regulatory Gaps in Regulating the Cyberworthiness of High-Hazard Cyber-Physical Systems
4. Analysis of International Cybersecurity Regulation of High–Hazard CPS
4.1. Regulatory Analysis of International Organizations and Domestic Regulators of Their Member States
- International Maritime Organization (IMO) for civilian maritime vessels and port facilities
- ○
- USA—United States Coast Guard (USCG)
- ○
- EU—European Maritime Safety Agency (EMSA)
- ○
- Australia—Australian Maritime Safety Authority (AMSA)
- International Civil Aviation Organization (ICAO) for civilian aircraft and aerodromes
- ○
- US—Federal Aviation Authority (FAA)
- ○
- EU—European Aviation Safety Agency (EASA)
- ○
- Australia –Civil Aviation Safety Authority (CASA)
- International Atomic Energy Agency (IAEA) for the civilian use of nuclear material
- ○
- US—Nuclear Regulatory Commission (NRC)
- ○
- EU—European Nuclear Safety Regulators Group (ENSREG)
- ○
- Australia—Australian Radiation Protection and Nuclear Safety Agency (ARPANSA)
4.2. Purpose of Analysis
4.3. Method of Analysis
- No Importance—Where the bolded words in Table 2 were not included in a document (reiterating, lower-level guidance materials could still be used to bridge information gaps)
- Low Importance—Only mentions the bolded terms in Table 2 as areas to be considered.
- Moderate Importance—Includes many of the bolded terms in Table 2 and identifies a requirement to conduct cybersecurity risk assessments, report cyber incidents, or apply fundamental cybersecurity to the CPS.
- High Importance—Has good coverage of the search terms in Table 2 and identifies a requirement to conduct cybersecurity risk assessments, report cyber incidents, and apply advanced cybersecurity to the CPS, with good consideration for operational technology and specialist associated technical practitioners.
- Strategic monitoring of the cybersecurity of the operational technology components of the regulated CPS. For strategic monitoring, strong links to government cyber authorities are a key consideration.
- Environmental scanning of the cybersecurity of the operational technology components of the regulated CPS. A key consideration for environmental scanning is the inclusion of research and test and evaluation requirements for cyber (IT and OT) components.
- Operational performance of the CPS relating to maintaining system safety while assuring the ongoing delivery of the physical outputs of the regulated CPS. A key search term considered for operational performance is resilience (cyber and Technology).
- No conformance—no indication of the contemporary Complex Systems Governance theories and practices listed above being incorporated in the aggregate documentation and established practices of the organization under assessment.
- Low conformance—indications that one of the types of contemporary Complex Systems Governance theories and practices listed above have been incorporated in the aggregate documentation and established practices in a high-level, cursory way.
- Moderate conformance—indicates two of the types of contemporary Complex Systems Governance theories and practices listed above have been incorporated in the aggregate documentation and established practices with some guidance and structure.
- High conformance—indicates that all three types of contemporary Complex Systems Governance theories and practices listed above have been incorporated in the aggregate documentation and established practices with strong guidance and structure.
- International Electrotechnical Commission (IEC)
- International Standards Organization (ISO)
- Institute of Electrical and Electronics Engineers (IEEE)
- MITRE Corporation
4.4. Findings of Analysis
4.4.1. Results of Analysis for International Organizations
4.4.2. Results of Analysis for Regulators from the United States of America
4.4.3. Results of Analysis for Regulators from the European Union
4.4.4. Results of Analysis for Regulators from Australia
5. The Need for Cyberworthiness Governance and Regulation
5.1. Potential Benefits of Regulating Cyberworthiness
5.2. Essential Elements of Cyberworthiness Governance
- Establish a Cyberworthiness governance regime for their high-hazard CPS.
- ○
- ▪
- Apply relevant cybersecurity practices to the cyber-systems within CPS.
- ▪
- Ensure cybersecurity certification of cyber-systems within the CPS.
- ▪
- Ensure cybersecurity accreditation of practitioners working with the CPS.
- ▪
- Ensure appropriate patch management of cyber-systems within CPS.
- ▪
- Ensure that the obsolescence of cyber-systems is planned for and managed.
- ○
- ▪
- Incorporate diversity of cyber-technology into the CPS.
- ▪
- Design into [159] the CPS the upgradability of components.
- ▪
- Provide diversity in the operation of critical functions of the CPS with gradual and degraded modes of failure.
- ○
- ▪
- Develop and maintain a workforce proficient in both the cyber and physical aspects of the CPS and CSoCPS.
- ▪
- Provide for the organization’s ICT and CPS engineering personnel to consult, cooperate, and coordinate to ensure that they are collectively addressing the cyberworthiness of their CPS and CSoCPS in a collaborative manner.
- ○
- ▪
- Establish a through-life test and evaluation plan that includes testing of new systems with legacy systems.
- ▪
- Regularly test the effects of the interactions via the cyber-domain for new CPS and ICT systems that have been determined to, will, or may interact with the cyber-domain.
- ○
- Undertake regular environmental scanning [12] to:
- ▪
- Ensure all knowable cyber and physical hazards are known.
- ▪
- Ensure trends in cyber technology are understood.
- ▪
- Identify changes in cybersecurity, cyber standards, cyber trends, and emerging cyber hazards (not only cybersecurity threats) that have the potential to affect the safe and ongoing operation of the CPS.
- ▪
- Rapidly assess changes and apply as contemporary, where appropriate.
- ▪
- Identify new CPS and ICT systems that do, will, or may interact with the CPS via the cyber-domain.
- ▪
- Maintain a thorough understanding of all cyber systems and CPS that their CPS connects to or interfaces with.
- ○
- ▪
- Develop and enforce a standard risk management framework.
- ▪
- Use contemporary risk management tools like model-based systems engineering to assess risks rapidly and communicate risk effectively.
- Regulatory Gap Analysis. Current standards (e.g., NIST SP 800-82r3 [4]) and agency guidelines (e.g., FAA, IMO, NRC) prioritize cybersecurity but lack binding mechanisms to enforce safety-security co-assurance. Our document analysis reveals that <15% of regulatory texts directly address cyber-physical interaction hazards (e.g., sensor spoofing causing control instability), leaving systemic cyberworthiness unregulated.
- Cyberworthiness as a Governance Mandate. Self-regulation based on fragmented cybersecurity principles is insufficient. Cyberworthiness requires lifecycle validation of safety invariants under cyber disruptions, emergent risk monitoring in CSoCPS and evidence-backed assurance cases traceable to operators.
- Principles-Based Cyberworthiness Regulations: Strict rules-based legislation cannot keep pace with technological change. We propose for regulators of high-hazard CPS to adopt Complex Systems Governance principles to enable adaptive compliance, environmental scanning, strategic monitoring and metasystem performance tracking.
- Short-term. Regulators should pilot cyberworthiness clauses referencing established cyber standards for operational technology, such as NIST SP 800-82r3 [4] for high-hazard CPS.
- Mid-term. Develop quantifiable cyberworthiness indices based on operational performance parameters from the Complex Systems Governance metasystem (e.g., mean-time-to-safe-recovery under cyber-attack) for compliance monitoring and auditing.
- Long-term. Establish international CSoCPS safety committees to harmonize governance of cross-border CPS hazards.
6. Limitations and Future Research
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
CSG | Complex Systems Governance |
OT | Operational Technology |
ICT | Information and Communication Technology |
SCADA | Supervisory Control and Data Acquisition |
PLC | Programmable Logic Controller |
ICS | Industrial Control System |
IoT | Internet of Things |
CPS | Cyber-Physical System |
CSoCPS | Complex System of Cyber-Physical Systems |
FAA | Federal Aviation Authority |
IAEA | International Atomic Energy Agency |
OECD | Organisation for Economic Co-operation and Development |
IEEE | Institute of Electrical and Electronics Engineers |
IEC | International Electrotechnical Commission |
ISO | International Standards Organization |
ENISA | European Union Agency for Cybersecurity |
NIST | National Institute of Standards and Technology |
USCG | United States Coast Guard |
EMSA | European Maritime Safety Agency |
AMSA | Australian Maritime Safety Authority |
EASA | European Aviation Safety Agency |
CASA | Australia –Civil Aviation Safety Authority |
NRC | Nuclear Regulatory Commission |
ENSREG | European Nuclear Safety Regulators Group |
ARPANSA | Australian Radiation Protection and Nuclear Safety Agency |
IMO | International Maritime Organization |
ICAO | International Civil Aviation Organization |
HA | (Australian Department of) Home Affairs |
ACSC | Australian Cyber Security Centre |
References
- Fowler, S.; Joiner, K.F.; Ma, S. Assessing Cyberworthiness of Complex System Capabilities Using the Cyber Evaluation and Management Toolkit (CEMT). Comput. Secur. 2025. [Google Scholar] [CrossRef]
- CISCO. Cisco Annual Internet Report (2018–2023) Public White Paper. 2020. Available online: https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html (accessed on 25 March 2025).
- NISTIR 8074; Supplemental Information for the Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity. NIST: Gaithersburg, MD, USA, 2015.
- NIST SP 800-82r3; Guide to Operational Technology (OT) Security, NIST Special Publication. NIST: Gaithersburg, MD, USA, 2023.
- Mattioli, R.; Moulinos, K. Analysis of ICS-SCADA Cyber Security Maturity Levels in Critical Sectors; European Union Agency for Network and Information Security: Heraklion, Greece, 2015. [Google Scholar]
- Ross, R.; Pillitteri, V.; Graubart, R.; Bodeau, D.; McQuaid, R. Developing Cyber-Resilient Systems: A Systems Security Engineering Approach; Unites States Department of Commerce: Washington, DC, USA, 2021.
- NIST SP 800-171r3; Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. NIST: Gaithersburg, MD, USA, 2024.
- Mousavi, M.R.; Berger, C. Core Research and Innovation Areas in Cyber-Physical Systems of Systems Initial Findings of the CPSoS Project. In Cyber Physical Systems Design, Modelling, and Evaluation, Proceedings of the 5th International Workshop, CyPhy 2015, Amsterdam, The Netherlands, 8 October 2015; Springer: Cham, Switzerland, 2015; pp. 40–55. [Google Scholar]
- NSF. Cyber-Physical Systems—National Science Foundation 24-581; National Science Foundation: Alexandria, VA, USA, 2024.
- National Science and Technology Council. Cyber Physical Systems (CPS) Vision Statement (Working Document). 2015, Networking and Information Technology Research and Development Program. Available online: https://www.nitrd.gov/nitrdgroups/images/6/6a/Cyber_Physical_Systems_%28CPS%29_Vision_Statement.pdf (accessed on 17 June 2025).
- Keating, C.B.; Katina, P.F.; Hodge, R.; Bradley, J.M. Systems Theory: Bridging the Gap Between Science and Practice for Systems Engineering. INCOSE Int. Symp. 2020, 30, 1017–1031. [Google Scholar] [CrossRef]
- Keating, C.B.; Katina, P.F. Complex system governance: Concept, utility, and challenges. Syst. Res. Behav. Sci. 2019, 36, 687–705. [Google Scholar] [CrossRef]
- Fowler, S.; Sitnikova, E. Toward a Framework for Assessing the Cyber-worthiness of Complex Mission Critical Systems. In Proceedings of the Military Communications and Information Systems Conference, Canberra, Australia, 12–14 November 2019. [Google Scholar]
- Liveri, D.; Theocharidou, M.; Naydenov, R. Railway Cybersecurity—Security Measures in the Railway Transport Sector; European Union Agency for Cybersecurity: Attiki, Greece, 2020. [Google Scholar]
- Pauna, A. Certification of Cyber Security Skills of ICS/SCADA Professionals—Good Practices and Recommendations for Developing Harmonised Certification Schemes; ENISA: Attiki, Greece, 2014. [Google Scholar]
- Smith, D.; Tombs, S. Beyond Self-Regulation: Towards a Critique of Self-Regulation as a Control Strategy for Hazardous Activities. J. Manag. Stud. 1995, 32, 619–636. [Google Scholar] [CrossRef]
- Devereaux, J.E. Obsolescence: A Systems Engineering and Management Approach for Complex Systems. Master’s Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 2010. [Google Scholar]
- Alelyani, T.; Michel, R.; Yang, Y.; Wade, J.; Verma, D.; Törngren, M. A literature review on obsolescence management in COTS-centric cyber physical systems. Procedia Comput. Sci. 2019, 153, 135–145. [Google Scholar] [CrossRef]
- Arpagian, N. The Threat of Technological Obsolescence for Cybersecurity in the Energy Sector. In The Palgrave Handbook of Cybersecurity, Technologies and Energy Transitions, Palgrave Studies in Energy Transitions; Barichella, A., Yada, J., Eds.; Palgrave Macmillan: Cham, Switzerland, 2025. [Google Scholar]
- F2025L00325; Security of Critical Infrastructure (Telecommunications Security and Risk Management Program) Rules 2025. Commonwealth of Australia: Canberra, Australia, 2025.
- Commonwealth of Australia, Department of the Prime Minister and Cabinet. Australian Government Guide to Regulatory Impact Analysis; Commonwealth of Australia: Canberra, Australia, 2020.
- Black, J. Decentring Regulation: Understanding the Role of Regulation and Self-regulation in a ‘Post-regulatory’ World. Curr. Leg. Probl. 2001, 54, 103–146. [Google Scholar] [CrossRef]
- Government, U.S. United States Code—Title 14—Coast Guard—Part 101 to 106, Establishment and Duties, U.S.C. Guard, Editor. Office of the Law Revision Counsel. 2019. Available online: https://www.govinfo.gov/content/pkg/USCODE-2019-title14/html/USCODE-2019-title14.htm (accessed on 23 June 2025).
- IAEA. Safeguards Statement for 2023; IAEA: Vienna, Austria, 2023. [Google Scholar]
- Handl, G.; Svendsen, K. Managing the Risk of Offshore Oil and Gas Accidents—The International Legal Dimension. Nordicum-Mediterraneum 2019, 18–52. [Google Scholar] [CrossRef]
- Dixon-Woods, M.; Yeung, K.; Bosk, C.L. Why is UK medicine no longer a self-regulating profession? The role of scandals involving “bad apple” doctors. Soc. Sci. Med. 2011, 73, 1452–1459. [Google Scholar] [CrossRef]
- Mathews, B. Optimising Implementation of Reforms to Better Prevent and Respond to Child Sexual Abuse in Institutions: Insights from Public Health, Regulatory Theory, and Australia’s Royal Commission. Child Abus. Negl. 2017, 74, 86–98. [Google Scholar] [CrossRef]
- Maurer, M.; von Engelhardt, S. Industry self-governance: A new way to manage dangerous technologies. Bull. At. Sci. 2013, 69, 53–62. [Google Scholar] [CrossRef]
- Coglianese, C.; Nash, J.; Olmstead, T.A. Performance-Based Regulation: Prospects and Limitations in Health, Safety, and Environmental Protection. Adm. Law Rev. 2003, 55, 706–730. [Google Scholar] [CrossRef]
- Wilpert, B. Regulatory styles and their consequences for safety. Saf. Sci. 2008, 46, 371–375. [Google Scholar] [CrossRef]
- Leveson, N. The Use of Safety Cases in Certification and Regulation (ESD-WP-2011-13); Massachusetts Institute of Technology: Cambridge, MA, USA, 2011. [Google Scholar]
- AS/NZS 3000:2018; Electrical Installations—Known as the Australian/New Zealand Wiring Rules. Ministry of Business, Innovation & Employment: Wellington, New Zealand, 2018.
- National Fire Protection Association. National Electrical Code—NFPA 70—Development. 2023. Available online: https://www.nfpa.org/codes-and-standards/nfpa-70-standard-development/70 (accessed on 7 July 2025).
- NFPA 70; National Electrical Code. National Fire Protection Association: Quincy, MA, USA, 2023.
- Carter, R.B.; Marchant, G.E. Principles-Based Regulation and Emerging Technology. In The Growing Gap Between Emerging Technologies and Legal-Ethical Oversight—The Pacing Problem; Springer: London, UK, 2011. [Google Scholar]
- National Offshore Petroleum Safety and Environmental Management Authority. The safety case in context: An overview of the safety case regime. In Guidance Note; National Offshore Petroleum Safety and Environmental Management Authority: Perth, Australia, 2020. [Google Scholar]
- Commonwealth of Australia. Offshore Petroleum and Greenhouse Gas Storage (Safety) Regulations 2009; Commonwealth of Australia: Canberra, Australia, 2009.
- Collier, R.B.; Dubal, V.B.; Carter, C.L. Disrupting Regulation, Regulating Disruption: The Politics of Uber in the United States. Perspect. Politics 2018, 16, 919–937. [Google Scholar] [CrossRef]
- Coman, M.-M.; Kifor, C.-V. The Emerging and Disruptive Technologies—A Risk-Based Approach. Land Forces Acad. Rev. 2024, 29, 237–246. [Google Scholar] [CrossRef]
- Drapalova, E.; Wegrich, K. Platforms’ regulatory disruptiveness and local regulatory outcomes in Europe. Internet Policy Rev. 2024, 13. [Google Scholar] [CrossRef]
- Fenwick, M.D.; Kaal, W.A.; Vermeule, E.P.M. Regulation tomorrow: What happens when technology is faster than the law? Am. Univ. Bus. Law Rev. 2017, 6, 561–594. [Google Scholar] [CrossRef]
- Nanyonga, A.; Wasswa, H.; Joiner, K.; Turhan, U.; Wild, G. Explainable Supervised Learning Models for Aviation Predictions in Australia. Aerospace 2025, 12, 223. [Google Scholar] [CrossRef]
- Klein, N.; Hinds, M.; Koermer, S.; Geyer, M. Beyond Accuracy: Evaluating Bayesian Neural Networks in a Real-World Application. ITEA J. Test. 2025, 46. [Google Scholar] [CrossRef]
- Rausch, A.; Sedeh, A.M.; Zhang, M. Autoencoder-Based Semantic Novelty Detection: Towards Dependable AI-Based Systems. Appl. Sci. 2021, 11, 9881. [Google Scholar] [CrossRef]
- Torens, C.; Juenger, F.; Schirmer, S.; Schopferer, S.; Zhukov, D.; Dauer, J.C. Ensuring Safety of Machine Learning Components Using Operational Design Domain Forum. In Proceedings of the AIAA SCITECH 2023 Forum, National Harbor, MD, USA, 23–27 January 2023. [Google Scholar]
- Mutambik, I. A Hybrid CNN–BiLSTM Framework Optimized with Bayesian Search for Robust Android Malware Detection. Systems 2025, 13, 612. [Google Scholar] [CrossRef]
- House Committee on Transportation and Infrastructure. 737 MAX Report for Public Release; House Committee on Transportation and Infrastructure: Washington, DC, USA, 2020.
- Eshun, E.A.; Waters, S.; Amoako, R.O. Implicating Communication: An Analysis of the US House Committee on Transportation and Infrastructure’s Investigative Report of the Boeing 737 MAX Crises. J. Contingencies Crisis Manag. 2024, 32, e70006. [Google Scholar] [CrossRef]
- United States Coast Guard. Report of the Marine Board of Investigation into the Implosion of the Submersible Titan (CG1788361) in the North Atlantic Ocean Near the Wreck Site of the RMS Titanic Resulting in the Loss of Five Lives on Jun 18, 2023MISLE Activity Number: 7724663. 2025: Washington, DC, USA. Available online: https://www.dco.uscg.mil/Portals/9/DCO%20Documents/5p/CG-5PC/INV/MBOIs/TITAN_7724663_MBIR_Redacted.pdf (accessed on 10 September 2025).
- Lindøe, P.; Baram, M.; Renn, O. Risk Governance of Offshore Oil and Gas Operations; Cambridge University Press: Cambridge, UK, 2013. [Google Scholar]
- Shavell, S. Liability for Harm versus Regulation of Safety. J. Leg. Stud. 1984, 13, 357–374. [Google Scholar] [CrossRef]
- Farwell, J.P.; Rohozinski, R. Stuxnet and the Future of Cyber War. Survival 2011, 53, 23–40. [Google Scholar] [CrossRef]
- Baladari, V. Unraveling the 2024 CrowdStrike Incident: How a Security Patch Led to Global System Failure and Blue Screen of Death. Int. J. Adv. Res. Sci. Commun. Technol. 2025, 5, 171–177. [Google Scholar] [CrossRef]
- Page, R. What CIOs Can Learn from the Massive Optus Outage. 2023. Available online: https://www.cio.com/article/1249111/what-cios-can-learn-from-the-massive-optus-outage.html (accessed on 28 April 2025).
- Jiang, Y.; Ji, X.; Wang, K.; Yan, C.; Mitev, R.; Sadeghi, A.-R.; Xu, W. WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens. In Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 22–26 May 2022. [Google Scholar]
- Jiang, Y.; Ji, X.; Jiang, Y.; Wang, K.; Xu, C.; Xu, W. PowerRadio: Manipulate Sensor Measurement via Power GND Radiation. In Proceedings of the 2025 Network and Distributed System Security Symposium, San Diego, CA, USA, 24–28 February 2025. [Google Scholar]
- Jiang, Y.; Jiang, Y.; Zhou, R.; Chen, Y.-C.; Ji, X.; Xu, W. False Reality: Uncovering Sensor-induced Human-VR Interaction Vulnerability. arXiv 2025, arXiv:2508.08043v1. [Google Scholar]
- Ni, T.; Zhang, X.; Zuo, C.; Li, J.; Yan, Z.; Wang, W.; Xu, W.; Luo, X.; Zhao, Q. Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels. In Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 21–25 May 2023. [Google Scholar]
- Ni, T.; Zhang, X.; Zhao, Q. Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 26–30 November 2023; pp. 253–267. [Google Scholar]
- Ni, T.; Li, J.; Zhang, X.; Zuo, C.; Wang, W.; Xu, W.; Luo, X.; Zhao, Q. Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning. In Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, New York, NY, USA, 2–6 October 2023; pp. 1–15. [Google Scholar]
- Cao, H.; Liu, D.; Jiang, H.; Luo, J. MagSign: Harnessing Dynamic Magnetism for User Authentication on IoT Devices. IEEE Trans. Mob. Comput. 2022, 23, 597–611. [Google Scholar] [CrossRef]
- Cao, H.; Jiang, H.; Liu, D.; Xiong, J. Evidence in Hand: Passive Vibration Response-based Continuous User Authentication. In Proceedings of the 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS), Washington, DC, USA, 7–10 July 2021; pp. 1020–1030. [Google Scholar]
- Cao, H.; Liu, D.; Jiang, H.; Cai, C.; Zheng, T.; Lui, J.C.S.; Luo, J. HandKey: Knocking-Triggered Robust Vibration Signature for Keyless Unlocking. IEEE Trans. Mob. Comput. 2022, 23, 520–534. [Google Scholar] [CrossRef]
- Department of Home Affairs. Security of Critical Infrastructure Act 2018; Commonwealth of Australia: Canberra, Australia, 2024.
- Whittfield, C.; Jones, P.; Kelly, H.; Lim, L. Demystifying Australia’s Security of Critical Infrastructure Regime. 28 April 2025. Available online: https://www.hsfkramer.com/insights/2023-03/demystifying-australias-recent-security-of-critical-infrastructure-act-reforms (accessed on 1 August 2025).
- Department of Home Affairs. Australian Government Protective Security Policy Framework; Department of Home Affairs: Canberra, Australia, 2024.
- Code of Federal Regulations. Title 14 Aeronautics and Space—Parts 1 to 59; National Archives and Records Administration: Washington, DC, USA, 2024.
- European Union Aviation Safety Agency. Easy Access Rules for Initial Airworthiness and Environmental Protection; European Union Aviation Safety Agency: Cologne, Germany, 2024.
- U.S. Government Accountability Office. Aviation Cybersecurity: FAA Should Fully Implement Key Practices to Strengthen Its Oversight of Avionics Risks (GAO-21-86); Report to Congressional Requesters; U.S. Government Accountability Office: Washington, DC, USA, 2020.
- Silei, G. Chapter 8 Technological Hazards, Disasters and Accidents. In The Basic Environmental History; Springer: Cham, Switzerland, 2014; Volume 4. [Google Scholar]
- Agustini, E.; Kareng, Y.; Victoria, O.A. The Role of ICAO (International Civil Aviation Organization) in Implementing International Flight Safety Standards. KnE Soc. Sci. 2021, 2020, 100–114. [Google Scholar] [CrossRef]
- Fischer, D. History of the International Atomic Energy Agency—The First Forty Years; IAEA: Vienna, Austria, 1997. [Google Scholar]
- National Institute of Standards and Technology. The NIST Cybersecurity Framework (SCF) 2.0; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024.
- European Union. Treaty of Lisbon Amending the Treaty on European Union and the Treaty Establishing the European Community—Signed at Lisbon, 13 December 2007; Official Journal of the European Union: Lisbon, Portugal, 2007. [Google Scholar]
- European Union. Regulation (Eu) 2019/881 of The European Parliament and of The Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on Information and Communications Technology Cybersecurity Certification and Repealing Regulation (EU) No 526/2013 (Cybersecurity Act); Official Journal of the European Union: Lisbon, Portugal, 2019. [Google Scholar]
- Rädiker, S.; Gizzi, M.C. The Practice of Qualitative Data Analysis Research Examples Using MAXQDA; MAXQDA Press: Berlin, Germany, 2021; Volume 2. [Google Scholar]
- International Maritime Organization. SOLAS 2018 Consolidated Edition; International Maritime Organization: London, UK, 2018. [Google Scholar]
- International Maritime Organization. Annex10—Resolution MSC.428(98) Maritime Cyber Risk Management in Safety Management Systems; International Maritime Organization: London, UK, 2017. [Google Scholar]
- BIMCO; CLIA; ICS; INTERCARGO; InterManager; INTERTANKO; IUMI; OCIMF; World Shipping Council. The Guidelines on Cyber Security Onboard Ships; BIMCO: Copenhagen, Denmark; CLIA: Washington, DC, USA; ICS: Bristol, UK; INTERCARGO: London, UK; InterManager: London, UK; INTERTANKO: Oslo, Norway; IUMI: Hong Kong, China; OCIMF: London, UK; World Shipping Council: Washington, DC, USA, 2020. [Google Scholar]
- International Civil Aviation Organization. Annex 8 to the Convention on International Civil Aviation—Airworthiness of Aircraft; ICAO: Montreal, QC, Canada, 2018. [Google Scholar]
- International Civil Aviation Organization. Airworthiness Manual, 3rd ed.; ICAO: Montreal, QC, Canada, 2014. [Google Scholar]
- International Civil Aviation Organization. Annex 14 to the Convention on International Civil Aviation—Aerodromes—Volume 1: Aerodrome Design and Operations; ICAO: Montreal, QC, Canada, 2018. [Google Scholar]
- International Civil Aviation Organization. Annex 17 to the Convention on International Civil Aviation—Security—Safeguarding International Civil Aviation Against Acts of Unlawful Interference, 10th ed.; ICAO: Montreal, QC, Canada, 2017. [Google Scholar]
- International Civil Aviation Organization. Cybersecurity Policy Guidance; ICAO: Montreal, QC, Canada, 2022. [Google Scholar]
- International Civil Aviation Organization. Aviation Security Manual (Doc 8973—Restricted), 3rd ed.; ICAO: Montreal, QC, Canada, 2022. [Google Scholar]
- International Atomic Energy Agency. Long Term Structure of The IAEA Safety Standards and Current Status; IAEA: Vienna, Austria, 2025. [Google Scholar]
- International Atomic Energy Agency. IAEA Safety Standards—Protecting People and the Environment; IAEA: Vienna, Austria, 2024. [Google Scholar]
- International Atomic Energy Agency. IAEA Nuclear Security Series; IAEA: Vienna, Austria, 2023. [Google Scholar]
- International Atomic Energy Agency. Regulatory Oversight of the Interfaces Between Nuclear Safety and Nuclear Security in Nuclear Power Plants; Technical Report Series No. 1003, Technical Report Series; IAEA: Vienna, Austria, 2024. [Google Scholar]
- International Atomic Energy Agency. A Systems View of Nuclear Security and Nuclear Safety: Identifying Interfaces and Building Strategies; Ad-Sec/INSAG Report No. 1, Ad-Sec/INSAG Report; IAEA: Vienna, Austria, 2023. [Google Scholar]
- International Atomic Energy Agency. Computer Security Aspects of Design for Instrumentation and Control Systems at Nuclear Power Plants; Marketing and Sales Unit, Publishing Section International Atomic Energy Agency Vienna International Centre: Vienna, Austria, 2020. [Google Scholar]
- International Atomic Energy Agency. Computer Security for Nuclear Security; Marketing and Sales Unit; Publishing Section International Atomic Energy Agency Vienna International Centre: Vienna, Austria, 2021. [Google Scholar]
- International Atomic Energy Agency. Computer Security Techniques for Nuclear Facilities; Marketing and Sales Unit, Publishing Section International Atomic Energy Agency Vienna International Centre: Vienna, Austria, 2021. [Google Scholar]
- U.S. Coast Guard. Fact Sheet: U.S. Coast Guard Issues Final Rule & Request for Comments on New Cybersecurity Regulations for the Marine Transportation System; U.S. Coast Guard: Washington, DC, USA, 2025.
- U.S. Government. Cybersecurity in the Marine Transportation System, Federal Register Vol. 90, No. 112025 Rules and Regulations; Department of Homeland Security: Washington, DC, USA, 2025.
- U.S. Government. Guidelines for Addressing Cyber Risks at Maritime Transportation Security Act (MTSA) Regulated Facilities, Navigation and Vessel Inspection Circular; NO. 01-20; Department of Homeland Security: Washington, DC, USA, 2020.
- U.S. Government. Small Entity Compliance Guide for MTSA-Regulated Facilities and OCS Facilities, The U.S. Coast Guard Cybersecurity Regulations for the Marine Transportation System; Department of Homeland Security: Washington, DC, USA, 2025.
- U.S. Government. Small Entity Compliance Guide for MTSA-Regulated U.S.-Flagged Vessels, The U.S. Coast Guard Cybersecurity Regulations for the Marine Transportation System; Department of Homeland Security: Washington, DC, USA, 2025.
- International Maritime Organization. Guidelines on Maritime Cyber Risk Management—MSC-FAL.1/Circ.3/Rev.3; International Maritime Organization: London, UK, 2025. [Google Scholar]
- International Maritime Organization. Guidelines on Maritime Cyber Risk Management, MSC-FAL.1/Circ.3/Rev.2; International Maritime Organization: London, UK, 2022. [Google Scholar]
- U.S. Government. Part 21—Certification Procedures for Products and Articles, Title 14—Aeronautics and Space. In Code of Federal Regulations; United States Government: Washington, DC, USA, 2024. [Google Scholar]
- U.S. Government. Part 139—Certification of Airports, Title 14—Aeronautics and Space. In Code of Federal Regulations; United States Government: Washington, DC, USA, 2025. [Google Scholar]
- U.S. Government. FAA Extension, Safety and Security Act of 2016, Public Law 114–190, As Amended Through P.L. 118–63, Enacted May 16, 2024; United States Government: Washington, DC, USA, 2016.
- President by the Constitution and the Laws of the United States of America. Executive Order 13800 of May 11, 2017, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, Federal Register Vol. 82, No. 93, Presidential Documents; United States Government: Washington, DC, USA, 2017.
- President by the Constitution and the Laws of the United States of America. Executive Order 14028 of May 17, 2021, Improving the Nation’s Cybersecurity, Federal Register Vol. 86, No. 93, Presidential Documents; United States Government: Washington, DC, USA, 2021.
- Department of Transportation. DOT Order 1351.37 Departmental Cybersecurity Policy; USDOT: Washington, DC, USA, 2011.
- Federal Aviation Administration. Memorandum (dated 12 May 2025)—Reauthorization Program Guidance Letter (R-PGL) 25-06: Planning and Project Eligibility; Federal Aviation Administration: Washington, DC, USA, 2025.
- Aerospace Industry Association; Federal Aviation Administration. Venetos, Overview of Cyber Safety—Cyber Safety Commercial Aviation Team; Federal Aviation Administration: Washington, DC, USA; Aerospace Industry Association: Arlington, VA, USA, 2020.
- U.S. Government. Title 10, Code of Federal Regulations. In 10, N.R. Commission; United States Government: Washington, DC, USA, 2010. [Google Scholar]
- Nuclear Regulatory Commission. Cyber Security Programs for Nuclear Facilities, Regulatory Guide Office of Nuclear Regulatory Research; Nuclear Regulatory Commission: Rockville, MD, USA, 2010.
- Nuclear Regulatory Commission. Digital Instrumentation and Controls Research. 2025. Available online: https://www.nrc.gov/about-nrc/regulatory/research/digital.html#7 (accessed on 15 March 2025).
- Stabelin, H. What is NIST and Why Is It Critical to Cybersecurity? 2025. Available online: https://segura.security/post/what-is-nist (accessed on 29 April 2025).
- National Institute of Standards and Technology (NIST). NIST SP 800-160 v2r3; Developing Cyber-Resilient Systems: A Systems Security Engineering Approach, NIST Special Publication; NIST: Gaithersburg, MD, USA, 2021.
- European Union. Establishing a European Maritime Safety Agency, Regulation (EC) No 1406/2002 of the European Parliament and of the Council; European Parliament and of the Council: Brussels, Belgium, 2002. [Google Scholar]
- European Union. EU Maritime Security Strategy; Council of the European Union: Brussels, Belgium, 2014.
- European Maritime Safety Agency. Guidance on How to Address Cybersecurity Onboard Ships During Audits, Controls, Verifications and Inspections; European Maritime Safety Agency: Lisbon, Portugal, 2023. [Google Scholar]
- European Border and Coast Guard Agency (Frontex). Working Together at Sea: European Cooperation on Coast Guard Functions. 2022. Available online: https://www.frontex.europa.eu/publications/european-cooperation-on-coast-guard-functions-OiI2hK (accessed on 4 May 2025).
- European Union. Regulation (EU) 2018/1139 of the European Parliament and of the Council; European Union: Brussels, Belgium, 2018. [Google Scholar]
- European Union. Commission Regulation (EU) No 784/2012—Laying Down Implementing Rules for the Airworthiness and Environmental Certification of Aircraft and Related Products, Parts and Appliances, as well as for the Certification of Design and Production Organisations; EU Commission: Brussels, Belgium, 2012.
- European Union. EU Commission Implementing Regulation (EU) No 2023/1769—Laying Down Technical Requirements and Administrative Procedures for the Approval of Organisations Involved in the Design or Production of Air Traffic Management/Air Navigation Services Systems and Constituents; EU Commission: Brussels, Belgium, 2012.
- European Union Aviation Safety Agency. Easy Access Rules for Aerodromes; European Union Aviation Safety Agency: Cologne, Germany, 2024.
- European Union Aviation Safety Agency. Easy Access Rules for Air Operations; European Union Aviation Safety Agency: Cologne, Germany, 2025.
- European Union Aviation Safety Agency. Easy Access Rules for Continuing Airworthiness; European Union Aviation Safety Agency: Cologne, Germany, 2024.
- European Centre for Cybersecurity in Aviation. European Centre for Cybersecurity in Aviation (ECCSA). 2025. Available online: https://www.easa.europa.eu/en/eccsa (accessed on 5 April 2025).
- European Union Aviation Safety Agency. Strategy for Cybersecurity in Aviation; European Union Aviation Safety Agency: Cologne, Germany, 2019.
- European Nuclear Safety Regulators Group. European High Level Group on Nuclear Safety and Waste Management Revised Rules of Procedure; European Nuclear Safety Regulators Group: Brussels, Belgium, 2011. [Google Scholar]
- European Nuclear Safety Regulators Group. ENSREG WG Rules of Procedure; European Nuclear Safety Regulators Group: Brussels, Belgium, 2012. [Google Scholar]
- European Union. European Union on ENISA (The European Union Agency for Cybersecurity) and on Information and Communications Technology Cybersecurity Certification; European Union: Brussels, Belgium, 2019. [Google Scholar]
- Malatras, D.A.; Skouloudi, C.; Koukounas, A. Industry 4.0 Cybersecurity: Challenges & Recommendations; European Union Agency for Network and Information Security: Attiki, Greece, 2019.
- European Network and Information Security Agency. IoT Security Standards Gap Analysis Mapping of Existing Standards Against Requirements on Security and Privacy in the Area of IoT; European Network and Information Security Agency: Heraklion, Greece, 2018.
- European Network and Information Security Agency. Baseline Security Recommendations for IoT in the Context of Critical Information Infrastructures; European Union Agency for Network and Information Security: Heraklion, Greece, 2017.
- European Network and Information Security Agency. Good Practices for Security of Internet of Things in the Context of Smart Manufacturing; European Union Agency for Network and Information Security: Attiki, Greece, 2018.
- European Network and Information Security Agency. Securing Smart Airports; European Union Agency for Network and Information Security: Heraklion, Greece, 2016.
- European Network and Information Security Agency. GOOD Practices for Security of IOT Secure Software Development Lifecycle; European Union Agency for Cybersecurity: Attiki, Greece, 2019.
- European Network and Information Security Agency. Communication Network Dependencies for ICS/SCADA Systems; European Union Agency for Network and Information Security: Heraklion, Greece, 2016.
- European Network and Information Security Agency. Flying 2.0 Enabling Automated Air Travel by Identifying and Addressing the Challenges of IoT & RFID Technology—ANNEX I—Scenario Building and Analysis Template; European Network and Information Security Agency: Heraklion, Greece, 2009.
- Office of Parliamentary Counsel, Canberra. Australian Maritime Safety Authority Act 1990; Office of Parliamentary Counsel, Canberra: Forrest, Australia, 2014.
- Australian Maritime Safety Authority. Index of Marine Orders|Australian Maritime Safety Authority. 2025. Available online: https://www.amsa.gov.au/about/regulations-and-standards/index-marine-orders (accessed on 21 July 2025).
- Commonwealth of Australia. Civil Aviation Act 1988; Commonwealth of Australia: Canberra, Australia, 2024.
- Commonwealth of Australia. Civil Aviation Regulations 1988—Volume 1; Commonwealth of Australia: Canberra, Australia, 2024.
- Commonwealth of Australia. Civil Aviation Regulations 1988—Volume 2; Commonwealth of Australia: Canberra, Australia, 2024.
- Civil Aviation Safety Authority. Manual of Standards Part 171 Aeronautical Telecommunication and Radio Navigation Services; Civil Aviation Safety Authority: Canberra, Australia, 2016.
- Civil Aviation Safety Authority. Manual of Standards Part 172 Air Traffic Services Version 2.2; Civil Aviation Safety Authority: Canberra, Australia, 2023.
- Civil Aviation Safety Authority. Part 91 (General Operating Flight Rules) Manual of Standards 2020; Civil Aviation Safety Authority: Canberra, Australia, 2025.
- Civil Aviation Safety Authority. Part 121 (Australian Air Transport Operations—Larger Aeroplanes) Manual of Standards 2020; Civil Aviation Safety Authority: Canberra, Australia, 2024.
- Civil Aviation Safety Authority. Part 138 (Aerial Work Operations) Manual of Standards 2020; Civil Aviation Safety Authority: Canberra, Australia, 2024.
- Civil Aviation Safety Authority. Part 139 (Aerodromes) Manual of Standards 2019; Civil Aviation Safety Authority: Canberra, Australia, 2024.
- Civil Aviation Safety Authority. Roadmap—RPAS and AAM Strategic Regulatory Roadmap, Australia; Civil Aviation Safety Authority: Canberra, Australia, 2024.
- Australian Government. Australian Radiation Protection and Nuclear Safety Act 1998; Commonwealth of Australia: Canberra, Australia, 2024.
- Australian Government. Australian Radiation Protection and Nuclear Safety Regulations 1998; Commonwealth of Australia: Canberra, Australia, 2024.
- Australian Government. Cyber Security Act 2024; Commonwealth of Australia: Canberra, Australia, 2024.
- Australian Government. Cyber Security (Security Standards for Smart Devices) Rules 2025; Commonwealth of Australia: Canberra, Australia, 2025.
- Diessner, D.; Wynsma, H.; Riegle, L.; Morrissey, P. Cybersecurity Industry Assessment & Recommendations Report to the AIA Civil Aviation Council September 2020 Civil Aviation Cybersecurity Subcommittee; Civil Aviation Cybersecurity Subcommittee; Aerospace Industries Association of America: Arlington, VA, USA, 2020. [Google Scholar]
- Gheorghe, A.V. Complex System Governance Theory and Practice; Topics in Safety, Risk, Reliability and Quality; Springer Nature: Cham, Switzerland, 2022; Volume 40. [Google Scholar]
- Bristow, M.; Lachow, I. Past is Prologue: Creating a Civil Defense Mindset to Address Modern Cyber Threats; The Mitre Corporation: McLean, VA, USA, 2025. [Google Scholar]
- ISO/IEC 27000:2018; Information Technology—Security Techniques—Information Security Management Systems—Overview and Vocabulary. ISO/IEC: Geneva, Switzerland, 2018.
- ISO/IEC 27001:2022; Information Security, Cybersecurity and Privacy Protection—Information Security Management Systems—Requirements. ISO/IEC: Geneva, Switzerland, 2022.
- ISO/IEC 27002:2022; Information Security, Cybersecurity and Privacy Protection—Information Security Controls INTERNATIONAL Organization for Standardization (ISO) 27001 Cybersecurity Framework. ISO/IEC: Geneva, Switzerland, 2022.
- ISO/IEC 27005:2022; Information Security, Cybersecurity and Privacy Protection—Guidance on Managing Information Security risk. ISO/IEC: Geneva, Switzerland, 2022.
- Fantechi, A. Software Engineering for Resilient Systems. In Software Engineering for Resilient Systems, 7th International Workshop; SERENE, Paris, France, 7–8 September 2015; Springer: Berlin/Heidelberg, Germany, 2015; Volume 9274. [Google Scholar]
- Wu, J.; Wang, P. A Comparison of Control Strategies for Disruption Management in Engineering Design for Resilience. ASCE-ASME J. Risk Uncertain. Eng. Syst. Part B Mech. Eng. 2019, 5. [Google Scholar] [CrossRef]
- Maglaras, L.A.; Kim, K.-H.; Janicke, H.; Ferrag, M.A.; Rallis, S.; Fragkou, P.; Maglaras, A.; Cruz, T.J. Cyber Security of Critical Infrastructures. ICT Express 2018, 4, 42–45. [Google Scholar] [CrossRef]
- Kim, I.; Park, M.; Lee, H.-J.; Jang, J.; Lee, S.; Shin, D. A Study on the Multi-Cyber Range Application of Mission-Based Cybersecurity Testing and Evaluation in Association with the Risk Management Framework. Information 2023, 15, 18. [Google Scholar] [CrossRef]
Incident | Cyber-Physical Failure | Regulatory/Governance Gap |
---|---|---|
Boeing 737-Max | MCAS | Lack of regulatory rigor in establishing the existence of mission creep in a new automated system, leading to it becoming an unnoticed critical safety operational technology subsystem of a CSoCPS. Lack of regulatory rigor in scanning environmental drivers in the civil aviation industry, prioritizing minimal pilot re-training on re-engineered aircraft. Failure of the regulator to identify a systematic breakdown of internal safety governance within a major regulated industry participant. |
Optus/Singtel | Forced Patch Error | Lack of regulatory rigor in strategic monitoring of the potential for telecommunications providers to cause a failure of broader systems (within the CSoCPS construct), reliant on the telecommunications system, to supply critical physical outputs (e.g., emergency services). |
Stuxnet | Operational Technology Cyber-attack | A lack of application of basic cybersecurity to operational technology systems. A lack of operator governance on the use of operational technology to perform operations and report back on them without the use of alternative means of verification. |
Code System | Frequency |
---|---|
Cyber * | 15,659 |
Cybersecurity * | 11,201 |
Cyberworthiness * | 0 |
Computer * | 6333 |
Information Technology * | 2815 |
Data (Transmission) | 258 |
Data (Storage) | 293 |
Data (Processing) | 1435 |
Operational Technology * | 2845 |
SCADA * | 1268 |
Resilience (Technology) | 3 |
Resilience (Cyber) | 301 |
IoT (IoT + IIoT) * | 3906 |
Control (Digital) | 1102 |
Sensing | 3134 |
PLC * | 1253 |
ICS * | 1706 |
Digital | 11,595 |
Electronic | 9208 |
Networked | 10,497 |
Transfer (Information) | 22 |
Transfer (Data) | 62 |
Communication (Digital) | 254 |
Communication (Digital/Computer) | 34 |
Communication (Computer) | 190 |
Automation | 1609 |
Instrumentation (Digital) | 765 |
Simulated | 1715 |
Virtual | 462 |
IMO | ICAO | IAEA | |
---|---|---|---|
Agreement | Convention based | Convention based | Treaty and Convention based |
Members | 176 | 193 | 180 |
Relevant number of documents | 16 | 41 + | 24 |
USCG | FAA | NRC | |
---|---|---|---|
Authorized by | Legislation | Legislation | Legislation |
Relevant number of documents | 23 | 33 | 92 |
EMSA | EASA | ENSREG | |
---|---|---|---|
Authorized by | Legislation * | Legislation * | Agreement |
Relevant number of documents | 38 | 36 | 2 |
AMSA | CASA | ARPANSA | |
---|---|---|---|
Authorized by | Legislation | Legislation | Legislation |
Relevant number of documents | 11 | 17 | 31 |
NIST | ENISA | HA/SOCI | |
---|---|---|---|
Authorized by | USA | EU | Australia |
Relevant number of documents | 8 | 65 | 14 |
International Organization | Operational Technology Cybersecurity Maturity | Complex Systems Governance Conformance |
---|---|---|
IMO | High Importance | Moderate Conformance |
ICAO | Moderate to High Importance | Low Conformance |
IAEA | Moderate Importance | Low Conformance |
US Regulator | Operational Technology Cybersecurity Maturity | Complex Systems Governance Conformance |
---|---|---|
USCG | High Importance | Moderate Conformance |
FAA | High Importance | Low Conformance |
NRC | High Importance | Moderate to High Conformance |
EU Regulator | Operational Technology Cybersecurity Maturity | Complex Systems Governance Conformance |
---|---|---|
EMSA | High Importance | Low Conformance |
EUASA | High Importance | Low Conformance |
ENSREG | No Importance | No Conformance |
Australian Regulator | Operational Technology Cybersecurity Maturity | Complex Systems Governance Conformance |
---|---|---|
AMSA | High Importance | Moderate Conformance |
CASA | Moderate to High Importance | Low Conformance |
ARPANSA | Low to Moderate Importance | Low Conformance |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
van Zomeren, M.; Deane, F.; Joiner, K.F.; Qiao, L.; Horne, R.; Suprun, E. Regulating Cyberworthiness: Governance Frameworks for Safety-Critical Cyber-Physical Systems. Systems 2025, 13, 862. https://doi.org/10.3390/systems13100862
van Zomeren M, Deane F, Joiner KF, Qiao L, Horne R, Suprun E. Regulating Cyberworthiness: Governance Frameworks for Safety-Critical Cyber-Physical Systems. Systems. 2025; 13(10):862. https://doi.org/10.3390/systems13100862
Chicago/Turabian Stylevan Zomeren, Mark, Felicity Deane, Keith F. Joiner, Li Qiao, Rachel Horne, and Emiliya Suprun. 2025. "Regulating Cyberworthiness: Governance Frameworks for Safety-Critical Cyber-Physical Systems" Systems 13, no. 10: 862. https://doi.org/10.3390/systems13100862
APA Stylevan Zomeren, M., Deane, F., Joiner, K. F., Qiao, L., Horne, R., & Suprun, E. (2025). Regulating Cyberworthiness: Governance Frameworks for Safety-Critical Cyber-Physical Systems. Systems, 13(10), 862. https://doi.org/10.3390/systems13100862