<> <http://www.w3.org/2000/01/rdf-schema#comment> "The repository administrator has not yet configured an RDF license."^^<http://www.w3.org/2001/XMLSchema#string> . <> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10118313> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/AcademicArticle> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/dc/terms/title> "A Systematic Review of the State of Cyber-Security in Water Systems"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/ontology/bibo/abstract> "Critical infrastructure systems are evolving from isolated bespoke systems to those that use general-purpose computing hosts, IoT sensors, edge computing, wireless networks and artificial intelligence. Although this move improves sensing and control capacity and gives better integration with business requirements, it also increases the scope for attack from malicious entities that intend to conduct industrial espionage and sabotage against these systems. In this paper, we review the state of the cyber-security research that is focused on improving the security of the water supply and wastewater collection and treatment systems that form part of the critical national infrastructure. We cover the publication statistics of the research in this area, the aspects of security being addressed, and future work required to achieve better cyber-security for water systems."^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/dc/terms/date> "2021-01" . <https://discovery.ucl.ac.uk/id/document/1243385> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Document> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/ontology/bibo/volume> "13" . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/ontology/bibo/issue> "1" . <https://discovery.ucl.ac.uk/id/org/ext-0e8d92de9fd14082663dc2f585fd1d29> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> . <https://discovery.ucl.ac.uk/id/org/ext-0e8d92de9fd14082663dc2f585fd1d29> <http://xmlns.com/foaf/0.1/name> "MDPI"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/dc/terms/publisher> <https://discovery.ucl.ac.uk/id/org/ext-0e8d92de9fd14082663dc2f585fd1d29> . <https://discovery.ucl.ac.uk/id/publication/ext-96a02670e884fcf9350004c8cc5ac7aa> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Collection> . <https://discovery.ucl.ac.uk/id/publication/ext-96a02670e884fcf9350004c8cc5ac7aa> <http://xmlns.com/foaf/0.1/name> "Water"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/publication/ext-96a02670e884fcf9350004c8cc5ac7aa> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/published> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-18c94e76f18bcf3d713c6f19604fbd32> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10118313#authors> . <https://discovery.ucl.ac.uk/id/eprint/10118313#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-18c94e76f18bcf3d713c6f19604fbd32> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-b8f6e7523d1739215a1ff4c6c7f16534> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10118313#authors> . <https://discovery.ucl.ac.uk/id/eprint/10118313#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_2> <https://discovery.ucl.ac.uk/id/person/ext-b8f6e7523d1739215a1ff4c6c7f16534> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-4d4c34a10d7935feb3d561963c0d1db8> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10118313#authors> . <https://discovery.ucl.ac.uk/id/eprint/10118313#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_3> <https://discovery.ucl.ac.uk/id/person/ext-4d4c34a10d7935feb3d561963c0d1db8> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-b02ec0ca4bba6b7ebc486882d22e4f71> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10118313#authors> . <https://discovery.ucl.ac.uk/id/eprint/10118313#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_4> <https://discovery.ucl.ac.uk/id/person/ext-b02ec0ca4bba6b7ebc486882d22e4f71> . <https://discovery.ucl.ac.uk/id/person/ext-b02ec0ca4bba6b7ebc486882d22e4f71> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> . <https://discovery.ucl.ac.uk/id/person/ext-b02ec0ca4bba6b7ebc486882d22e4f71> <http://xmlns.com/foaf/0.1/givenName> "S"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-b02ec0ca4bba6b7ebc486882d22e4f71> <http://xmlns.com/foaf/0.1/familyName> "Hailes"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-b02ec0ca4bba6b7ebc486882d22e4f71> <http://xmlns.com/foaf/0.1/name> "S Hailes"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-18c94e76f18bcf3d713c6f19604fbd32> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> . <https://discovery.ucl.ac.uk/id/person/ext-18c94e76f18bcf3d713c6f19604fbd32> <http://xmlns.com/foaf/0.1/givenName> "N"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-18c94e76f18bcf3d713c6f19604fbd32> <http://xmlns.com/foaf/0.1/familyName> "Tuptuk"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-18c94e76f18bcf3d713c6f19604fbd32> <http://xmlns.com/foaf/0.1/name> "N Tuptuk"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-b8f6e7523d1739215a1ff4c6c7f16534> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> . <https://discovery.ucl.ac.uk/id/person/ext-b8f6e7523d1739215a1ff4c6c7f16534> <http://xmlns.com/foaf/0.1/givenName> "P"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-b8f6e7523d1739215a1ff4c6c7f16534> <http://xmlns.com/foaf/0.1/familyName> "Hazell"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-b8f6e7523d1739215a1ff4c6c7f16534> <http://xmlns.com/foaf/0.1/name> "P Hazell"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-4d4c34a10d7935feb3d561963c0d1db8> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> . <https://discovery.ucl.ac.uk/id/person/ext-4d4c34a10d7935feb3d561963c0d1db8> <http://xmlns.com/foaf/0.1/givenName> "J"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-4d4c34a10d7935feb3d561963c0d1db8> <http://xmlns.com/foaf/0.1/familyName> "Watson"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-4d4c34a10d7935feb3d561963c0d1db8> <http://xmlns.com/foaf/0.1/name> "J Watson"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/EPrint> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/ArticleEPrint> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/repository> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243385> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1243385> <http://www.w3.org/2000/01/rdf-schema#label> "A Systematic Review of the State of Cyber-Security in Water Systems (Text)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://purl.org/dc/elements/1.1/hasVersion> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://eprints.org/ontology/hasPublished> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243385> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10118313/1/water-13-00081-v4.pdf> . <https://discovery.ucl.ac.uk/id/document/1243385> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10118313/1/water-13-00081-v4.pdf> . <https://discovery.ucl.ac.uk/id/eprint/10118313/1/water-13-00081-v4.pdf> <http://www.w3.org/2000/01/rdf-schema#label> "water-13-00081-v4.pdf"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1243386> . <https://discovery.ucl.ac.uk/id/document/1243386> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1243386> <http://www.w3.org/2000/01/rdf-schema#label> "A Systematic Review of the State of Cyber-Security in Water Systems (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1243386> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243386> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243386> <http://eprints.org/relation/islightboxThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243386> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10118313/2/lightbox.jpg> . <https://discovery.ucl.ac.uk/id/document/1243386> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10118313/2/lightbox.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10118313/2/lightbox.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "lightbox.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1243387> . <https://discovery.ucl.ac.uk/id/document/1243387> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1243387> <http://www.w3.org/2000/01/rdf-schema#label> "A Systematic Review of the State of Cyber-Security in Water Systems (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1243387> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243387> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243387> <http://eprints.org/relation/ispreviewThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243387> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10118313/3/preview.jpg> . <https://discovery.ucl.ac.uk/id/document/1243387> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10118313/3/preview.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10118313/3/preview.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "preview.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1243388> . <https://discovery.ucl.ac.uk/id/document/1243388> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1243388> <http://www.w3.org/2000/01/rdf-schema#label> "A Systematic Review of the State of Cyber-Security in Water Systems (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1243388> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243388> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243388> <http://eprints.org/relation/ismediumThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243388> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10118313/4/medium.jpg> . <https://discovery.ucl.ac.uk/id/document/1243388> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10118313/4/medium.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10118313/4/medium.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "medium.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1243389> . <https://discovery.ucl.ac.uk/id/document/1243389> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1243389> <http://www.w3.org/2000/01/rdf-schema#label> "A Systematic Review of the State of Cyber-Security in Water Systems (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1243389> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243389> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243389> <http://eprints.org/relation/issmallThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243389> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10118313/5/small.jpg> . <https://discovery.ucl.ac.uk/id/document/1243389> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10118313/5/small.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10118313/5/small.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "small.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1243390> . <https://discovery.ucl.ac.uk/id/document/1243390> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1243390> <http://www.w3.org/2000/01/rdf-schema#label> "A Systematic Review of the State of Cyber-Security in Water Systems (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1243390> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243390> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243390> <http://eprints.org/relation/isIndexCodesVersionOf> <https://discovery.ucl.ac.uk/id/document/1243385> . <https://discovery.ucl.ac.uk/id/document/1243390> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10118313/6/indexcodes.txt> . <https://discovery.ucl.ac.uk/id/document/1243390> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10118313/6/indexcodes.txt> . <https://discovery.ucl.ac.uk/id/eprint/10118313/6/indexcodes.txt> <http://www.w3.org/2000/01/rdf-schema#label> "indexcodes.txt"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10118313> <http://www.w3.org/2000/01/rdf-schema#seeAlso> <https://discovery.ucl.ac.uk/id/eprint/10118313/> . <https://discovery.ucl.ac.uk/id/eprint/10118313/> <http://purl.org/dc/elements/1.1/title> "HTML Summary of #10118313 \n\nA Systematic Review of the State of Cyber-Security in Water Systems\n\n" . <https://discovery.ucl.ac.uk/id/eprint/10118313/> <http://purl.org/dc/elements/1.1/format> "text/html" . <https://discovery.ucl.ac.uk/id/eprint/10118313/> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10118313> .