Cyber Security Challenges in Complex Systems

A special issue of Systems (ISSN 2079-8954). This special issue belongs to the section "Complex Systems and Cybernetics".

Deadline for manuscript submissions: 15 May 2025 | Viewed by 8998

Special Issue Editor


E-Mail Website
Guest Editor
Capability Systems Centre, University of New South Wales, Australian Defence Force Academy, Canberra 2600, Australia
Interests: test and evaluation; capability management; cybersecurity; AI-enabled systems

Special Issue Information

Dear Colleagues,

Modern systems are inherently interconnected, with mixed maturity and complex supply chains for software and hardware elements. Advancing cyber threats increasingly exploits vulnerabilities in these capabilities, while global uncertainties create similar risks in supply chains and markets. Systematically identifying these vulnerabilities and risks can help determine whether to increase protections, diversify or consolidate supply and optimise the through-life infrastructure and support needed to manage complex systems. This challenge at each node and discipline is a systems challenge, but, collectively, it is a system of systems challenge for capabilities. Much of the systems research applies modern systems engineering tools and techniques to improving cyber resilience and finding the right balance between meeting cyber threats and commercial profitability. Much cybersecurity research is focused on the automated defence at machine speed of intelligent and adaptive intrusion detection systems; however, this primarily algorithmic work is nascent, likely to be privileged and usually does not address the systems challenges of implementation. More adaptive research approaches use model-based systems engineering and cybersecurity awareness training techniques to analyse and improve, taking on the educational and penetration challenge of such a diverse socio-technical problem. Each domain, and often different counties, especially for their critical infrastructure, must adapt the research, tools and techniques slightly differently based upon their supply footprints, profit margins, societal awareness and exposure to nation-state and criminal threats. This Special Issue concerns systems and socio-technical challenges as well as solutions to achieving greater cyber resilience in complex systems and capabilities. Submissions may be from any critical infrastructure domain or multi-domain as long as they address cyber resilience with a systems approach.

Dr. Keith Joiner
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Systems is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity
  • systems of systems
  • critical infrastructure
  • model-based systems engineering
  • socio-technical systems

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

23 pages, 934 KiB  
Article
Cyber Resilience Limitations in Space Systems Design Process: Insights from Space Designers
by Syed Shahzad, Keith Joiner, Li Qiao, Felicity Deane and Jo Plested
Systems 2024, 12(10), 434; https://doi.org/10.3390/systems12100434 - 15 Oct 2024
Viewed by 1482
Abstract
Space technology is integral to modern critical systems, including navigation, communication, weather, financial services, and defence. Despite its significance, space infrastructure faces unique cyber resilience challenges exacerbated by the size, isolation, cost, persistence of legacy systems, and lack of comprehensive cyber resilience engineering [...] Read more.
Space technology is integral to modern critical systems, including navigation, communication, weather, financial services, and defence. Despite its significance, space infrastructure faces unique cyber resilience challenges exacerbated by the size, isolation, cost, persistence of legacy systems, and lack of comprehensive cyber resilience engineering standards. This paper examines the engineering challenges associated with incorporating cyber resilience into space design, drawing on insights and experiences from industry experts. Through qualitative interviews with engineers, cybersecurity specialists, project managers, and testers, we identified key themes in engineering methodologies, cybersecurity awareness, and the challenges of integrating cyber resilience into space projects. Participants emphasised the importance of incorporating cybersecurity considerations from the earliest stages of design, advocating for principles such as zero-trust architecture and security by design. Our findings reveal that experts favour Model-Based Systems Engineering (MBSE) and Agile methodologies, highlighting their synergy in developing flexible and resilient systems. The study also underscores the tension between principles-based standards, which offer flexibility but can lead to inconsistent implementation, and compliance-based approaches, which provide clear measures but may struggle to adapt to evolving threats. Additionally, the research recognises significant barriers to achieving cyber resilience, including insider threats, the complexity of testing and validation, and budget constraints. Effective stakeholder engagement and innovative funding models are crucial for fostering a culture of cybersecurity awareness and investment in necessary technologies. This study highlights the need for a comprehensive cyber resilience framework that integrates diverse engineering methodologies and proactive security measures, ensuring the resilience of space infrastructure against emerging cyber threats. Full article
(This article belongs to the Special Issue Cyber Security Challenges in Complex Systems)
Show Figures

Figure 1

15 pages, 970 KiB  
Article
Cybersecurity Risks Analysis in the Hospitality Industry: A Stakeholder Perspective on Sustainable Service Systems
by Saliha Karadayi-Usta
Systems 2024, 12(10), 397; https://doi.org/10.3390/systems12100397 - 26 Sep 2024
Viewed by 3263
Abstract
The digital transformation age introduces cybersecurity threats into the hospitality industry by increasing the exposure and vulnerability of hospitality firms’ data and systems to hackers. The hospitality industry is a diverse segment of the service sector dedicated to the provision of services in [...] Read more.
The digital transformation age introduces cybersecurity threats into the hospitality industry by increasing the exposure and vulnerability of hospitality firms’ data and systems to hackers. The hospitality industry is a diverse segment of the service sector dedicated to the provision of services in areas such as accommodation, food and beverage, travel and tourism, and recreation, including hotels, restaurants, bars, travel agencies, and theme parks. Cybersecurity risks in the hospitality industry affect the data and systems of businesses such as accommodation, food, travel, and entertainment, primarily enabled by the industry’s increasing digitization. This study aims to map the principal cybersecurity risks to the main stakeholders by proposing a novel Picture Fuzzy Sets (PFSs)-based Matrix of Alliances and Conflicts: Tactics, Objectives, and Recommendations (MACTOR) approach. The purpose here is to examine each stakeholder’s position towards handling cybersecurity attacks and estimate the uncertain nature of personal judgments of industry representatives when stating their point of view. The research aimed to extract the triggering positions of the defined cybercrime risks to reach the root cause of these risks, as the point to try to mitigate first. Thus, this paper contributes to the literature in both theoretical and practical ways by proposing a new approach and by providing real industry officials’ perspectives to solve the challenges. A hospitality practitioner can easily understand their position in this service network and take action to prevent such cybercrimes. Full article
(This article belongs to the Special Issue Cyber Security Challenges in Complex Systems)
Show Figures

Figure 1

27 pages, 1893 KiB  
Article
Transforming Cybersecurity into Critical Energy Infrastructure: A Study on the Effectiveness of Artificial Intelligence
by Jaime Govea, Walter Gaibor-Naranjo and William Villegas-Ch
Systems 2024, 12(5), 165; https://doi.org/10.3390/systems12050165 - 5 May 2024
Cited by 5 | Viewed by 3510
Abstract
This work explores the integration and effectiveness of artificial intelligence in improving the security of critical energy infrastructure, highlighting its potential to transform cybersecurity practices in the sector. The ability of artificial intelligence solutions to detect and respond to cyber threats in critical [...] Read more.
This work explores the integration and effectiveness of artificial intelligence in improving the security of critical energy infrastructure, highlighting its potential to transform cybersecurity practices in the sector. The ability of artificial intelligence solutions to detect and respond to cyber threats in critical energy infrastructure environments was evaluated through a methodology that combines empirical analysis and artificial intelligence modeling. The results indicate a significant increase in the threat detection rate, reaching 98%, and a reduction in incident response time by more than 70%, demonstrating the effectiveness of artificial intelligence in identifying and mitigating cyber risks quickly and accurately. In addition, implementing machine learning algorithms has allowed for the early prediction of failures and cyber-attacks, significantly improving proactivity and security management in energy infrastructure. This study highlights the importance of integrating artificial intelligence into energy infrastructure security strategies, proposing a paradigmatic change in cybersecurity management that increases operational efficiency and strengthens the resilience and sustainability of the energy sector against cyber threats. Full article
(This article belongs to the Special Issue Cyber Security Challenges in Complex Systems)
Show Figures

Figure 1

Back to TopTop