{"id":"https://openalex.org/W7151443388","doi":"https://doi.org/10.48550/arxiv.2604.03994","title":"Assessing Cyber Risks in Hydropower Systems Through HAZOP and Bow-Tie Analysis","display_name":"Assessing Cyber Risks in Hydropower Systems Through HAZOP and Bow-Tie Analysis","publication_year":2026,"publication_date":"2026-04-05","ids":{"openalex":"https://openalex.org/W7151443388","doi":"https://doi.org/10.48550/arxiv.2604.03994"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.03994","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.03994","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.03994","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120482211","display_name":"Kwabena Opoku Frempong-Kore","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Frempong-Kore, Kwabena Opoku","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133120455","display_name":"Rishikesh Sahay","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sahay, Rishikesh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029405967","display_name":"Md Rasel Al Mamun","orcid":"https://orcid.org/0000-0002-2710-6599"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mamun, Md Rasel Al","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5119998464","display_name":"Bell Eapen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Eapen, Bell","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5120482211"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.8596000075340271,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.8596000075340271,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.041999999433755875,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.025100000202655792,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hazard-and-operability-study","display_name":"Hazard and operability study","score":0.9688000082969666},{"id":"https://openalex.org/keywords/hazard","display_name":"Hazard","score":0.5196999907493591},{"id":"https://openalex.org/keywords/operability","display_name":"Operability","score":0.5095999836921692},{"id":"https://openalex.org/keywords/hydropower","display_name":"Hydropower","score":0.44749999046325684},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.43560001254081726},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4268999993801117},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.4196999967098236},{"id":"https://openalex.org/keywords/hazard-analysis","display_name":"Hazard analysis","score":0.41119998693466187}],"concepts":[{"id":"https://openalex.org/C125174871","wikidata":"https://www.wikidata.org/wiki/Q1683210","display_name":"Hazard and operability study","level":3,"score":0.9688000082969666},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.748199999332428},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6414999961853027},{"id":"https://openalex.org/C49261128","wikidata":"https://www.wikidata.org/wiki/Q1132455","display_name":"Hazard","level":2,"score":0.5196999907493591},{"id":"https://openalex.org/C126231374","wikidata":"https://www.wikidata.org/wiki/Q1061298","display_name":"Operability","level":2,"score":0.5095999836921692},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47429999709129333},{"id":"https://openalex.org/C40675005","wikidata":"https://www.wikidata.org/wiki/Q170196","display_name":"Hydropower","level":2,"score":0.44749999046325684},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.43560001254081726},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4268999993801117},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.4196999967098236},{"id":"https://openalex.org/C206355099","wikidata":"https://www.wikidata.org/wiki/Q3614972","display_name":"Hazard analysis","level":2,"score":0.41119998693466187},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.39969998598098755},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.36239999532699585},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.35899999737739563},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.3492000102996826},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.33709999918937683},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.32010000944137573},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.30820000171661377},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.30090001225471497},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.28679999709129333},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.2678000032901764},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.26649999618530273},{"id":"https://openalex.org/C130631938","wikidata":"https://www.wikidata.org/wiki/Q144894","display_name":"Intellectualization","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.25859999656677246},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.2547999918460846}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.03994","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.03994","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.03994","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.03994","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.6277297139167786,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,50,126,157,175,179],"widespread":[2],"use":[3],"of":[4,228,255,261],"software":[5],"systems":[6,23,41],"in":[7,69,92,210,215,247],"critical":[8],"infrastructures":[9],"such":[10],"as":[11],"hydropower":[12,70,248],"plants":[13],"has":[14,20],"brought":[15],"many":[16],"advantages,":[17],"yet":[18],"it":[19],"exposed":[21],"these":[22,40,74,256],"to":[24,34,95,108,137,204,238,243],"cyber":[25,36,66,127,158,201],"threats.":[26],"Cyber":[27],"risk":[28,52,85],"assessment":[29,53],"&amp;":[30],"mitigation":[31,151],"is":[32,89],"important":[33],"identify":[35,96,244],"threats":[37,68],"and":[38,48,57,61,99,150,212,253,258],"protect":[39],"from":[42,103],"unwanted":[43],"incidents.":[44],"This":[45],"paper":[46,232],"evaluates":[47],"compares":[49],"two":[51,75,180],"methodologies":[54,76],"namely":[55],"Hazard":[56],"Operability":[58],"Study":[59],"(HAZOP)":[60],"BowTie":[62,146,193],"analysis":[63,147],"for":[64,83],"identifying":[65],"induced":[67],"systems.":[71],"We":[72],"selected":[73],"because":[77],"they":[78],"offer":[79],"a":[80,154,169,222,226,234],"complementary":[81,183],"perspective":[82],"cyber-safety":[84],"assessment.":[86],"Each":[87],"method":[88],"first":[90],"applied":[91,203],"traditional":[93,117],"form":[94],"hazards,":[97],"barriers,":[98],"threat":[100],"scenarios":[101],"arising":[102],"accidental":[104],"causes,":[105],"then":[106],"extended":[107],"examine":[109],"how":[110,130,195],"findings":[111],"change":[112],"under":[113],"cyber-induced":[114],"causation.":[115],"The":[116,145,200],"HAZOP":[118,185,211],"identifies":[119],"18":[120],"deviations":[121,136],"across":[122],"five":[123],"control":[124,249],"parameters;":[125],"extension":[128,159,202],"shows":[129,194,259],"an":[131],"adversary":[132],"can":[133,165,189],"coordinate":[134],"multiple":[135],"produce":[138],"outcomes":[139],"that":[140,161,217],"conventional":[141],"safeguards":[142],"cannot":[143],"detect.":[144],"maps":[148],"preventive":[149],"barriers":[152,162,196,214],"around":[153],"top":[155],"event;":[156],"reveals":[160],"appearing":[163],"independently":[164],"share":[166],"network":[167],"infrastructure":[168],"single":[170],"attacker":[171],"could":[172],"compromise,":[173],"challenging":[174],"defense-in-depth":[176],"assumption.":[177],"Together,":[178],"methods":[181,242],"provide":[182,197],"coverage:":[184],"systematically":[186],"enumerates":[187],"what":[188],"go":[190],"wrong,":[191],"while":[192],"layered":[198],"protection.":[199],"both":[205],"exposes":[206],"assumptions,":[207],"independent":[208,213],"causes":[209],"BowTie,":[216],"do":[218],"not":[219],"hold":[220],"against":[221],"coordinated":[223],"adversary.":[224],"As":[225],"result":[227],"this":[229,231],"study,":[230],"highlights":[233],"practical":[235],"two-stage":[236],"approach":[237],"adapt":[239],"established":[240],"safety":[241],"cybersecurity":[245],"challenges":[246],"systems,":[250],"provides":[251],"pros":[252],"cons":[254],"methodologies,":[257],"area":[260],"applicability.":[262]},"counts_by_year":[],"updated_date":"2026-04-08T06:07:18.267832","created_date":"2026-04-08T00:00:00"}
