<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SDQ</journal-id><journal-title-group><journal-title>Security &amp; Defence Quarterly</journal-title><abbrev-journal-title>SDQ</abbrev-journal-title></journal-title-group><issn pub-type="epub">2544-994X</issn><issn pub-type="ppub">2300-8741</issn><publisher><publisher-name>Akademia Sztuki Wojennej</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SDQ-47-00348</article-id><article-id pub-id-type="doi">10.35467/sdq/190350</article-id><article-categories><subj-group subj-group-type="heading"><subject>RESEARCH PAPER</subject></subj-group></article-categories><title-group><article-title>Estimating the vulnerability of industrial network infrastructure in Central and Eastern Europe</article-title></title-group><contrib-group content-type="authors"><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-0661-0128</contrib-id><name><surname>Twardawa</surname><given-names>Mateusz Grzegorz</given-names></name><xref ref-type="aff" rid="aff1">1</xref><xref ref-type="aff" rid="aff2">2</xref><email>mtwardawa@man.poznan.pl</email></contrib><contrib contrib-type="author"><name><surname>Smolik</surname><given-names>Marek</given-names></name><xref ref-type="aff" rid="aff3">3</xref></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-6133-8900</contrib-id><name><surname>Rakowski</surname><given-names>Franciszek</given-names></name><xref ref-type="aff" rid="aff4">4</xref></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-7000-3862</contrib-id><name><surname>Kwiatkowski</surname><given-names>Jakub</given-names></name><xref ref-type="aff" rid="aff1">1</xref><xref ref-type="aff" rid="aff2">2</xref></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-4020-5329</contrib-id><name><surname>Meyer</surname><given-names>Norbert</given-names></name><xref ref-type="aff" rid="aff5">5</xref></contrib><aff id="aff1"><label>1</label>ICT Security Department, Poznan Supercomputing and Networking Center (PSNC), affiliated to the Institute of Bioorganic Chemistry of the Polish Academy of Sciences, Jana Pawła II 10, 61-139, Poznań, Poland</aff><aff id="aff2"><label>2</label>Institute of Computing Science, Poznań University of Technology, Piotrowo 2, 60-965, Poznań, Poland</aff><aff id="aff3"><label>3</label>Chief Technology Officer, ICsec S.A., Wichrowa 1A, 60-449, Poznań, Poland</aff><aff id="aff4"><label>4</label>Research and Development, Department, ICsec S.A., Wichrowa 1A, 60-449, Poznań, Poland</aff><aff id="aff5"><label>5</label>Data Processing Technologies Division, Poznań Supercomputing and Networking Center (PSNC), affiliated to the Institute of Bioorganic Chemistry of the Polish Academy of Sciences, Zygmunta Noskowskiego 12/14, 61-704, Poznań, Poland</aff></contrib-group><pub-date pub-type="epub"><day>03</day><month>08</month><year>2024</year></pub-date><volume>47</volume><issue>1</issue><fpage>1</fpage><lpage>21</lpage><history><date date-type="received"><day>28</day><month>12</month><year>2023</year></date><date date-type="rev-recd"><day>14</day><month>06</month><year>2024</year></date><date date-type="accepted"><day>21</day><month>06</month><year>2024</year></date></history><permissions><copyright-statement>© 2024 M.G. Twardawa, M. Smolik, F. Rakowski, J. Kwiatkowki, N. Meyer published by War Studies University, Poland.</copyright-statement><copyright-year>2024</copyright-year><license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0"><license-p>This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">http://creativecommons.org/licenses/by/4.0/</ext-link>).</license-p></license></permissions><abstract><p>Industrial infrastructure has suffered an unprecedented number of attacks in Central and Eastern Europe (CEE). This situation can be attributed to many geopolitical factors, including hybrid military conflicts and criminal activity. Industrial networks belonging to the countries that were once under Soviet influence suffer from an elevated risk of cyberattacks. The goal of this work is to propose an easy way to estimate the vulnerabilities of industrial networks to cyber threats on a national level. Since analysis of the industrial vulnerability landscape is difficult, this study proposes an assessment based on the popularity of vulnerable technologies—VP<sub>c</sub>. This metric is composed of search volume data on keywords related to industrial network technologies and reported security vulnerabilities associated with these words. Data on 116 keywords was analysed and a country-specific VP<sub>c</sub> index was calculated for twenty states in CEE. The analysis of the popularity of industrial technologies and vendors in CEE reveals interesting information about the industrial security and vulnerability landscape. The results show that some countries (e.g. Estonia) have more resilient industrial infrastructure than others (e.g. Belarus). The results presented in this study are not in conflict with other data and estimation attempts, including the National Cyber Security Index (NCSI). As new vulnerabilities are noted every day, the industrial security landscape changes rapidly. Therefore, a new easy-to-use metric (VP<sub>c</sub>) can be successfully used for general estimations. This work shows that the VP<sub>c</sub> score agrees with other estimates and analyses, but as with any other general estimation tool, it must be used with caution.</p></abstract><kwd-group><kwd>critical infrastructure</kwd><kwd>network security</kwd><kwd>cyberattack</kwd><kwd>industrial control systems</kwd><kwd>national vulnerability</kwd></kwd-group></article-meta></front><body><sec id="S1" sec-type="intro"><title>Introduction</title><p>Industrial Control Systems (ICSs) are essential for modern life, as they provide automation in manufacturing, healthcare, transportation, and many other economic and industrial sectors, including critical infrastructure. Cyberattacks on power stations, water treatment facilities, or chemical plants can cause major incidents, ranging from power outages to explosions and massive ecological disasters. Moreover, ICSs are important military targets, as they are part of critical and industrial infrastructure.</p><p>After the collapse of the Union of Soviet Socialist Republics (USSR), some Central and Eastern European (CEE) countries underwent fast investment programmes, while others suffered from slow periods of growth and recessions (for more details, see: <xref ref-type="bibr" rid="ref38">Stout and Williams, 1995</xref>; <xref ref-type="bibr" rid="ref41">Walker, 2019</xref>). Concurrently in the 1990s and 2000s, Internet-related technologies were on the rise, including advancements in ICS technology. Consequently, CEE was diversified as a region in terms of industrial digitalisation and overall economic progress (<xref ref-type="bibr" rid="ref8">Chataway, 1999</xref>; <xref ref-type="bibr" rid="ref15">Filippov, 2010</xref>; <xref ref-type="bibr" rid="ref21">Kelly <italic>et al</italic>., 2017</xref>).</p><p>The Internet dramatically transformed the threat landscape for industrial systems for the following reasons. Firstly, the knowledge that was previously limited to small groups of specialists and engineers could now be accessed and spread publicly, rendering the so-called ‘security by obscurity’ ineffective (<xref ref-type="bibr" rid="ref2">Alcaraz <italic>et al</italic>., 2012</xref>, pp. 120–149). Secondly, since more and more internal networks and computer stations were connected to the Internet, as a consequence some ICSs were no longer operating in isolation (<xref ref-type="bibr" rid="ref3">Alexopoulos <italic>et al</italic>., 2018</xref>). For example, the Iranian attack on the New York Dam in 2013 was executed remotely, because the floodgate control system was accessible from the hacked computer (<xref ref-type="bibr" rid="ref40">United States District Court, Southern District of New York, 2016</xref>). Thirdly, if a vulnerability of industrial standard, device, or protocol is discovered, this knowledge spreads rapidly (<xref ref-type="bibr" rid="ref36">Stellios <italic>et al</italic>., 2019</xref>). This creates an enormous advantage for the attackers, as updates of industrial systems often require planning and maintenance breaks. Moreover, device replacement in industrial systems is expensive, so it rarely occurs. It is estimated that a typical device in ICS is exploited for 20 years (controllers), but the security of industrial devices is thought to be obsolete after several years (<xref ref-type="bibr" rid="ref6">Bryes, 2013</xref>).</p><p>There are many threats that can harm CEE industrial infrastructure. The most notable are insiders, cyber gangs, and state-sponsored groups. Insiders are familiar with industrial processes and infrastructure and are able to obtain authorised access to an industrial system. It can be a present or former employee that uses his or her knowledge and privileges to spy, sabotage, or damage an industrial system. Such incidents may be severe and seem to be the most difficult ones to prevent. Nonetheless, being aware of vulnerabilities and eliminating them should make insider threats mitigate the impact (<xref ref-type="bibr" rid="ref26">Marco <italic>et al</italic>., 2021</xref>). Ransomware attacks are common acts of cybercrime performed by financially motivated criminal groups that concern critical and industrial infrastructure without exception (<xref ref-type="bibr" rid="ref16">Gazzan and Sheldon, 2023</xref>). Cyber gangs, however, rarely attack the ICS itself; instead, their attention is focused on related enterprise Information technology (IT) networks. For example, in 2022, incidents involving new ransomware called “Prestige” were reported in Ukraine and Poland, which targeted logistics industries and transportation, including railways (<xref ref-type="bibr" rid="ref28">Microsoft, 2022</xref>). This malicious cyber activity was likely linked to Russia, since it was focused on important objectives from a military perspective. In fact, state-sponsored attacks in CEE are the most dangerous threats for industrial infrastructure (<xref ref-type="bibr" rid="ref13">European Union Agency for Cybersecurity [ENISA], 2022</xref>). One of the most notorious acts of cyber terrorism happened on 23 December 2015 in Ukraine and was prepared and executed by the Sandworm Team, a Russian cyber military GRU unit. The attack was sophisticated, and disabled a power grid in numerous stages. The incident resulted in a blackout lasting 6 h, affecting more than 230 thousand people (<xref ref-type="bibr" rid="ref24">Lee <italic>et al</italic>., 2016</xref>).</p><p>Tracking the state of industrial cybersecurity is a crucial task that could help to supervise and facilitate the elimination of old and vulnerable technology from use. However, the general vulnerability of industrial systems in each country is difficult to assess. Industrial infrastructure is diversified between regions, varies in industrial sectors, and applies multiple standards. Nonetheless, some information can be gathered to create a general estimation. It can be assumed that popular and widespread technologies are visible in online search data, since many people learn how to operate and maintain them. Moreover, it seems reasonable for malicious actors to target known and existing vulnerabilities, especially if affected technology is popular (<xref ref-type="bibr" rid="ref25">Li and Liu, 2021</xref>). Due to many aspects, such as market shares of companies, historical background, geography, activity in specific industrial sectors, standards and technological solutions, the popularity of specific elements of industrial infrastructure, may differ from region to region.</p><p>The main goal of this work is to develop and test an indirect and objective metric that is able to accurately estimate the state of national industrial cybersecurity. The metric should also be easy to calculate and do not rely on additional extensive data collection, such as field studies or surveys. Therefore, it can be easily deployed to measure, monitor, and compare national vulnerability to cyberattacks on industrial infrastructure.</p><p>The idea presented in this paper shows that it is possible to estimate the state of national industrial cybersecurity based on combined analysis of online search data and an industrial vulnerability database. The new metric proposed in this work assesses national interest in vulnerable technologies and can be calculated based on publicly available information. The analysis was performed for search terms that are divided into three categories: Programmable Logic Controllers (PLCs), vendors, and industrial communication protocols. Since data for the Russian Federation was inaccessible, 20 CEE countries were examined during this study. In order to validate the estimations obtained, the results were compared with the National Cyber Security Index (<xref ref-type="bibr" rid="ref29">NCSI, n.d.</xref>) and Global Cybersecurity Index (GCI) (<xref ref-type="bibr" rid="ref18">International Telecommunication Union, 2020</xref>), which served as a reference.</p></sec><sec id="S2" sec-type="methods"><title>Methods</title><p>This study attempts to estimate the industrial vulnerability landscape in CEE by a new proposed metric, that is, the popularity of vulnerable technologies. This metric describes national interest in technologies that have known security concerns. Calculations were carried out for 20 countries that are commonly known to be a part of CEE: Albania, Belarus, Bosnia and Herzegovina, Bulgaria, Croatia, Czech Republic, Estonia, Germany, Hungary, Latvia, Lithuania, North Macedonia, Moldova, Montenegro, Poland, Romania, Serbia, Slovakia, Slovenia, and Ukraine. The popularity of vulnerable technologies was estimated based on the Google Keyword Planner (<xref ref-type="bibr" rid="ref17">Google Ads, n.d.</xref>) and the National Vulnerability Database (NVD) (National Institute of Standards and Technology <xref ref-type="bibr" rid="ref30">[NIST], n.d.)</xref>. Since Google does not provide data about the volume of the searched terms for Russia, this country was omitted from the analysis.</p><p>The estimation of national interest in vulnerable technologies was performed by juxtaposing the popularity (volume) of search terms obtained from Google Keyword Planner (<xref ref-type="bibr" rid="ref17">Google Ads, n.d.</xref>) with a number of vulnerabilities associated with the term or search phrase listed in the NVD provided by the <xref ref-type="bibr" rid="ref30">NIST (n.d.)</xref>. The analysis was based on 116 search phrases divided into three categories: companies (i.e. industrial vendors and manufacturers) with fifty-nine search terms, PLCs and related equipment with forty-four entries, and industrial communication protocols with thirteen phrases. The keywords included in the study were selected based on two types of sources, the external reports on the ICS market in Europe (<xref ref-type="bibr" rid="ref12">European Cybersecurity Organisation, 2018</xref>; <xref ref-type="bibr" rid="ref23">Ladder Logic World, n.d.)</xref> and online product catalogues from private vendors (<xref ref-type="bibr" rid="ref4">Aserto Sp. z o.o, n.d</xref>; <xref ref-type="bibr" rid="ref5">ASTOR, n.d.</xref>; <xref ref-type="bibr" rid="ref37">Sterowniki-PLC.net, n.d.</xref>). The selection procedure was supervised by industrial automation practitioners that were checking whether products mentioned in the reports were available to buy in CEE based on online catalogues. Data on search volume was collected in Google Keyword Planner for every country defined above for CEE. Since this work is focused on the present industrial vulnerability landscape, the search volume data is limited to 2022 (1 complete year). However, the number of vulnerabilities was recorded for all database entries recorded in NVD before January 2023.</p><p>The proposed metric is country-specific and can be explained as the search popularity of terms related to industrial technologies weighted by the associated number of vulnerabilities. For each country, search volume data on terms of interest was collected from Google Keyword Planner. The values obtained were later transformed with a decimal logarithm and normalised according to the highest search volume value observed for each individual country. The data obtained from NVD on the number of vulnerabilities also underwent transformation with a common logarithm and was later normalised to a range of [0,1]. The final values for every search term were calculated for all analysed countries separately as a sum of derived logarithmised search volumes multiplied by their respective logarithmised and normalised vulnerabilities count. The procedure is expressed by the following <xref ref-type="disp-formula" rid="eq1">Equation 1</xref>:</p><disp-formula id="eq1"><mml:math id="eqn1"><mml:mrow><mml:mi>V</mml:mi><mml:msub><mml:mi>P</mml:mi><mml:mi>c</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mstyle displaystyle="true"><mml:munderover><mml:mo>∑</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>n</mml:mi></mml:munderover><mml:mrow><mml:mfenced><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mrow><mml:mi>log</mml:mi></mml:mrow><mml:mrow><mml:mn>10</mml:mn></mml:mrow></mml:msub><mml:mfenced><mml:mrow><mml:msub><mml:mi>p</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mfenced></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>log</mml:mi></mml:mrow><mml:mrow><mml:mn>10</mml:mn></mml:mrow></mml:msub><mml:mfenced><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>max</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:mfenced></mml:mrow></mml:mfrac><mml:mo>×</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mrow><mml:mi>log</mml:mi></mml:mrow><mml:mrow><mml:mn>10</mml:mn></mml:mrow></mml:msub><mml:mfenced><mml:mrow><mml:msub><mml:mi>v</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mfenced></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>log</mml:mi></mml:mrow><mml:mrow><mml:mn>10</mml:mn></mml:mrow></mml:msub><mml:mfenced><mml:mrow><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>max</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfenced></mml:mrow></mml:mfrac></mml:mrow></mml:mfenced></mml:mrow></mml:mstyle></mml:mrow></mml:math></disp-formula><p>where <italic>VP<sub>c</sub></italic> stands for summed term popularity weighed by the associated number of vulnerabilities for a given country <italic>c, n</italic> is the total number of analysed terms, <italic>p<sub>i</sub></italic> is the popularity of <italic>i</italic>th term, relates to the highest country-specific search volume, <italic>v<sub>i</sub></italic> represents the number of vulnerabilities associated with the <italic>i</italic>th term, and <italic>v</italic><sub>max</sub> is the highest number of vulnerabilities seen in the whole dataset.</p><p>Results for all terms, as well as for distinguished categories, have been visualised on maps. The first visualisation takes all the data into account (<xref ref-type="fig" rid="F1">Figure 1</xref>), the second is created for companies (<xref ref-type="fig" rid="F2">Figure 2</xref>), the third for PLC-related terms (<xref ref-type="fig" rid="F3">Figure 3</xref>), and the last one for industrial protocols (<xref ref-type="fig" rid="F4">Figure 4</xref>). The detailed values of summed search term popularity multiplied by the number of known vulnerabilities, that is, <italic>VP<sub>c</sub></italic>, are also included in <xref ref-type="table" rid="T1">Table 1</xref> for clarity. Additionally, <xref ref-type="table" rid="T1">Table 1</xref> contains reference values obtained from the <xref ref-type="bibr" rid="ref29">NCSI (n.d.)</xref> project website and GCI (<xref ref-type="bibr" rid="ref18">International Telecommunication Union, 2020</xref>). Data used to calculate <italic>VP<sub>c</sub></italic> scores (exact keywords with national search volume and associated number of vulnerabilities for each country) was added to the supplementary file (<xref ref-type="table" rid="T2">Table S1</xref>).</p><fig id="F1" orientation="portrait" position="float"><label>Figure 1</label><caption><p>Visualisation of total estimated vulnerability to cyberattacks on industrial systems in CEE. The values represented on the map are summed search term popularity multiplied by the number of known vulnerabilities found in NVD database for the same term (more details in the text).</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/190350/SDQ-47-00348-g001_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/190350/SDQ-47-00348-g001.jpg"/></fig><fig id="F2" orientation="portrait" position="float"><label>Figure 2</label><caption><p>Visualisation of estimated vulnerability to cyberattacks on industrial systems related to vendors and specialised companies in CEE. The values represented on the map are summed search term popularities multiplied by the number of known vulnerabilities in the NVD database for the same term (more details in the text).</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/190350/SDQ-47-00348-g002_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/190350/SDQ-47-00348-g002.jpg"/></fig><fig id="F3" orientation="portrait" position="float"><label>Figure 3</label><caption><p>Visualisation of estimated vulnerability to cyberattacks on industrial systems in CEE related to PLCs and industrial equipment. The values represented on the map are summed search term popularities multiplied by number of known vulnerabilities in the NVD database for the same term (more details in text).</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/190350/SDQ-47-00348-g003_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/190350/SDQ-47-00348-g003.jpg"/></fig><fig id="F4" orientation="portrait" position="float"><label>Figure 4</label><caption><p>Visualisation of estimated vulnerability to cyberattacks on industrial systems in CEE related to industrial network protocols. The values represented on the map are summed search term popularities multiplied by the number of known vulnerabilities in the NVD database for the same term (more details in text).</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/190350/SDQ-47-00348-g004_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/190350/SDQ-47-00348-g004.jpg"/></fig><table-wrap id="T1" orientation="portrait" position="float"><label>Table 1</label><caption><p>Summed logarithmised term popularity weighed by logarithmised number of vulnerabilities (calculated according to Equation 1) for each country in CEE.</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th align="left" rowspan="2">Country</th><th colspan="4" align="center">Summed term popularity weighed by number of vulnerabilities (<italic>VP<sub>c</sub></italic>)</th><th align="center" rowspan="2">National Cyber Security Index (NCSI)</th><th align="center" rowspan="2">Digital Development Level (DDL)</th><th align="center" rowspan="2">NCSI and DDL Difference</th><th align="center" rowspan="2">GCI</th></tr><tr><th align="center">Vendors and Companies</th><th align="center">PLCs</th><th align="center">Industrial Protocols</th><th align="center">Total</th></tr></thead><tbody valign="top"><tr><td align="left">Albania</td><td align="center">17.66</td><td align="center">2.38</td><td align="center">2.91</td><td align="center">22.95</td><td align="center">62.34</td><td align="center">48.74</td><td align="center">13.6</td><td align="center">64.32</td></tr><tr><td align="left">Belarus</td><td align="center">19.46</td><td align="center">2.77</td><td align="center">3.35</td><td align="center">25.58</td><td align="center">53.25</td><td align="center">62.33</td><td align="center">-9.08</td><td align="center">50.57</td></tr><tr><td align="left">Bosnia and Herzegovina</td><td align="center">18.28</td><td align="center">2.40</td><td align="center">2.91</td><td align="center">23.59</td><td align="center">28.53</td><td align="center">49.31</td><td align="center">-20.78</td><td align="center">29.44</td></tr><tr><td align="left">Bulgaria</td><td align="center">15.81</td><td align="center">2.12</td><td align="center">2.36</td><td align="center">20.30</td><td align="center">74.03</td><td align="center">62.06</td><td align="center">11.97</td><td align="center">67.38</td></tr><tr><td align="left">Croatia</td><td align="center">16.31</td><td align="center">2.14</td><td align="center">2.51</td><td align="center">20.96</td><td align="center">83.12</td><td align="center">64.63</td><td align="center">18.49</td><td align="center">92.53</td></tr><tr><td align="left">Czechia</td><td align="center">15.07</td><td align="center">2.22</td><td align="center">2.23</td><td align="center">19.52</td><td align="center">92.21</td><td align="center">69.21</td><td align="center">23</td><td align="center">74.37</td></tr><tr><td align="left">Estonia</td><td align="center">14.84</td><td align="center">1.91</td><td align="center">2.51</td><td align="center">19.26</td><td align="center">93.51</td><td align="center">75.59</td><td align="center">17.92</td><td align="center">99.48</td></tr><tr><td align="left">Germany</td><td align="center">15.89</td><td align="center">2.23</td><td align="center">2.48</td><td align="center">20.60</td><td align="center">90.91</td><td align="center">80.01</td><td align="center">10.9</td><td align="center">97.41</td></tr><tr><td align="left">Hungary</td><td align="center">18.09</td><td align="center">2.23</td><td align="center">2.79</td><td align="center">23.11</td><td align="center">67.53</td><td align="center">64.25</td><td align="center">3.28</td><td align="center">91.28</td></tr><tr><td align="left">Latvia</td><td align="center">14.46</td><td align="center">1.86</td><td align="center">2.34</td><td align="center">18.66</td><td align="center">75.32</td><td align="center">66.23</td><td align="center">9.09</td><td align="center">97.28</td></tr><tr><td align="left">Lithuania</td><td align="center">14.94</td><td align="center">1.95</td><td align="center">2.60</td><td align="center">19.49</td><td align="center">93.51</td><td align="center">67.34</td><td align="center">26.17</td><td align="center">97.93</td></tr><tr><td align="left">Moldova</td><td align="center">17.12</td><td align="center">2.53</td><td align="center">2.38</td><td align="center">22.03</td><td align="center">50.65</td><td align="center">56.79</td><td align="center">-6.14</td><td align="center">75.78</td></tr><tr><td align="left">Montenegro</td><td align="center">15.65</td><td align="center">2.13</td><td align="center">2.94</td><td align="center">20.72</td><td align="center">35.06</td><td align="center">57.79</td><td align="center">-22.73</td><td align="center">53.23</td></tr><tr><td align="left">North Macedonia</td><td align="center">17.78</td><td align="center">2.38</td><td align="center">2.91</td><td align="center">23.07</td><td align="center">55.84</td><td align="center">55.36</td><td align="center">0.48</td><td align="center">89.92</td></tr><tr><td align="left">Poland</td><td align="center">17.75</td><td align="center">2.74</td><td align="center">3.32</td><td align="center">23.81</td><td align="center">87.01</td><td align="center">65.03</td><td align="center">21.98</td><td align="center">93.86</td></tr><tr><td align="left">Romania</td><td align="center">18.38</td><td align="center">2.73</td><td align="center">2.75</td><td align="center">23.86</td><td align="center">89.61</td><td align="center">59.84</td><td align="center">29.77</td><td align="center">76.29</td></tr><tr><td align="left">Russia</td><td align="center">-</td><td align="center">-</td><td align="center">-</td><td align="center">-</td><td align="center">71.43</td><td align="center">65.12</td><td align="center">6.31</td><td align="center">98.06</td></tr><tr><td align="left">Serbia</td><td align="center">15.35</td><td align="center">1.99</td><td align="center">2.34</td><td align="center">19.67</td><td align="center">80.52</td><td align="center">59.81</td><td align="center">20.71</td><td align="center">89.8</td></tr><tr><td align="left">Slovakia</td><td align="center">16.65</td><td align="center">1.97</td><td align="center">2.66</td><td align="center">21.28</td><td align="center">83.12</td><td align="center">65.44</td><td align="center">17.68</td><td align="center">92.36</td></tr><tr><td align="left">Slovenia</td><td align="center">19.92</td><td align="center">3.07</td><td align="center">3.35</td><td align="center">26.34</td><td align="center">59.74</td><td align="center">69.74</td><td align="center">-10</td><td align="center">74.93</td></tr><tr><td align="left">Ukraine</td><td align="center">18.06</td><td align="center">2.57</td><td align="center">2.60</td><td align="center">23.23</td><td align="center">75.32</td><td align="center">55.96</td><td align="center">19.36</td><td align="center">65.93</td></tr></tbody></table></table-wrap><p>In order to compare <italic>VP<sub>c</sub></italic> results with a reference, three values from the NCSI project were used: NCSI, Digital Development Level (DDL), and the difference between the NCSI and DDL for every country analysed in this work. For the same reason, the main GCI score was analysed. <italic>VP<sub>c</sub></italic> scores were compared with values provided by the NCSI project and GCI by Spearman correlation on ranks.</p></sec><sec id="S3" sec-type="results"><title>Results</title><p>The analysis performed in this study shows that the <italic>VP<sub>c</sub></italic> score agrees with expectations and external reference indexes (NCSI and GCI). The results presented in this work point out the relevancy of the <italic>VP<sub>c</sub></italic> score, although the metric is not flawless and the least expected cases are described in detail below.</p><p>As for all terms, the highest total <italic>VP<sub>c</sub></italic> score was detected for Slovenia and Belarus (see <xref ref-type="fig" rid="F1">Figure 1</xref>). A little lower, but high values, nevertheless, were calculated for Albania, Bosnia and Herzegovina, Hungary, North Macedonia, Poland, Romania, and Ukraine. On the other side, Czech Republic, Estonia, Latvia, Lithuania, and Serbia had the lowest total <italic>VP<sub>c</sub></italic> scores. Since terms related to vendors and companies dominated the keyword dataset, similar results were observed for this category. All details are seen in <xref ref-type="fig" rid="F2">Figure 2</xref> and <xref ref-type="table" rid="T1">Table 1</xref>. According to <xref ref-type="table" rid="T1">Table 1</xref> and the visualisation on <xref ref-type="fig" rid="F3">Figure 3</xref>, for PLC and related equipment, the most vulnerable infrastructure seems to be in Slovenia, Belarus, Poland, and Romania. In addition to that, Moldova and Ukraine also have scores that can be classified as elevated. Some countries score low in the PLC category, that are, Estonia, Latvia, Lithuania, Serbia, and Slovakia. The last analysed group contained terms related to industrial communication protocols and are given in <xref ref-type="fig" rid="F4">Figure 4</xref>. The highest scores in this category were calculated for Belarus, Poland, and Slovenia. High values for industrial protocols were also observed for Albania, Bosnia and Herzegovina, Montenegro, and North Macedonia. In contrast, Bulgaria, Czech Republic, Latvia, Moldova, and Serbia have the lowest <italic>VP<sub>c</sub></italic> score values for terms related to industrial protocols.</p><p>Estimation is split into three search term categories: vendors and companies, PLCs and industrial equipment, and industrial network protocols. A column with respective total values (the sum of all categories) is also included. The NCSI, DDL, and the difference between them, as well as GCI in the last column, serve as reference values for <italic>VP<sub>c</sub></italic> and originate from the <xref ref-type="bibr" rid="ref29">NCSI (n.d.)</xref> project website and <xref ref-type="bibr" rid="ref18">International Telecommunication Union (2020)</xref> report. Colours are used to show the similarities of <italic>VP<sub>c</sub></italic> scores to NCSI and GCI reference. Red represents the presence of insecure infrastructure in a given country. Red is associated with high <italic>VP<sub>c</sub></italic> scores and low values of NCSI parameters. Low <italic>VP<sub>c</sub></italic> scores and high values from NCSI are marked in blue and correspond to national cybersecurity being in a good state.</p><p>The results of Spearman correlation show that a significant relationship exists between total <italic>VP<sub>c</sub></italic> and NCSI (<italic><italic>r</italic></italic> = –0.4712 and <italic>p</italic>-value = 0.036). DDL (<italic><italic>r</italic></italic> = –0.3669 and <italic>p</italic>-value = 0.1115), and the difference between NCSI and DDL (<italic><italic>r</italic></italic> = –0.2706 and <italic>p</italic>-value = 0.2484) do not possess detectable correlations with the total <italic>VP<sub>c</sub></italic> score. The correlation between NCSI and total <italic>VP<sub>c</sub></italic> is moderate but clear. The case for GCI seems to be similar. The correlation between GCI and <italic>VP<sub>c</sub></italic> is comparable to the results obtained for the NSCI scores (<italic><italic>r</italic></italic> = –0.4827 and <italic>p</italic>-value = 0.0311). It is worth noting that NCSI scores and GCI are more correlated with each other than with <italic>VP<sub>c</sub></italic>. The relationship between NCSI and GCI is strongest in this data (<italic><italic>r</italic></italic> = 0.7196 and <italic>p</italic>-value = 0.0003). Nevertheless, it was not expected that industrial cybersecurity would reflect the IT one. In conclusion, the <italic>VP<sub>c</sub></italic> score seems to be a promising estimation for the national industrial vulnerability landscape and could be adopted by security monitoring agencies.</p></sec><sec id="S4" sec-type="discussion"><title>Discussion</title><p>There are many general measures and indicators for assessment of regional cybersecurity conditions. Such measures are used by various institutions, such as public agencies and private companies. In general, three main types of indicators commonly used in cybersecurity are distinguished, that is, marker-, survey- and expert-based, each with its own set of advantages and disadvantages.</p><p>Marker-based indicators rely on specific measurable events or artefacts within the system, such as the number of instances of detected malware, frequency of unauthorised access attempts, and patch management statistics. In fact, the <italic>VP<sub>c</sub></italic> score is another marker-based indicator, since it relies on statistical data of a number of vulnerabilities and keyword search popularity, all of which is assumed to be correlated with the state of industrial cybersecurity. There are some advantages associated with these types of indicators. One of the most important advantages is that marker-based measures are easily deployed objective methods for assessing cybersecurity situations. These indicators provide quantifiable data that allows comparison and tracking over time, which is important for bias elimination. Marker-based indicators are also easy to automate. For the <italic>VP<sub>c</sub></italic> score, it is possible to create a simple online data analyser that presents current and past values without any additional manual work. Another good trait of marker-based indicators is that they can be tuned or redesigned to track very specific security aspects, for example, the <italic>VP<sub>c</sub></italic> score can be easily adapted to focus on different regions or sets of technologies. Nonetheless, there are some major disadvantages to the metric-based approach. One of the most important drawbacks is issues related to interpretation struggles. It is a common case that a high number of independent variables may influence a marker value, the case for <italic>VP<sub>c</sub></italic> is no different. In addition to this, markers are data-dependent, so their focus is limited, based on information they encompass. Finally, although markers are usually correlated with cybersecurity state, they can become unreliable over time, especially due to new technological breakthroughs (<xref ref-type="bibr" rid="ref27">Meland <italic>et al</italic>., 2021</xref>).</p><p>Survey-based indicators are most popular in the cybersecurity domain. On the one hand, surveys are able to provide more holistic views, measuring multiple security aspects. This is a highly flexible security estimation technique, since a survey can be designed to address chosen security issues. Moreover, there are aspects where surveys are the best source of information, and this is especially true for behaviour-related security assessments (<xref ref-type="bibr" rid="ref9">Chaudhary <italic>et al</italic>., 2022</xref>). On the other hand, survey accuracy suffers from badly designed forms that may lead to misinterpretation and bias. In some cases, a low number or false responses may strongly influence an indicator. In fact, response rates may be subject to manipulation and artificially augmented, which can lead to misinformation. On top of that, surveys are resource-consuming, requiring time to be designed, distributed, and -analysed (<xref ref-type="bibr" rid="ref7">Cadena <italic>et al</italic>., 2020</xref>).</p><p>Lastly, there are expert-based indicators that are usually presented in the form of articles or reports. Experts can provide a deep, nuanced understanding of cybersecurity risks, incorporating both technical and strategic perspectives. Their experience allows potential future threats and vulnerabilities to be identified, offering predictive insights that can guide proactive measures. Experts can also consider the unique context of the organisation, including industry-specific threats and the specific operational environment. However, expert-based indicators can be affected by personal bias and subjective judgements, which undermine objectivity. Engaging experts for assessments can be expensive and time--consuming, limiting the frequency of evaluations. Finally, relying on expert assessments may not be scalable for large organisations with extensive and diverse operations, where continuous monitoring is required (<xref ref-type="bibr" rid="ref22">Krisper <italic>et al</italic>., 2020</xref>).</p><p>In the report published by the European Union (EU) on cybersecurity indexes, there are at least sixty different indicators used to monitor the security state in member countries (<xref ref-type="bibr" rid="ref14">ENISA, 2024</xref>) and all of them are marker- or survey-based. These indicators are designed to measure investment project impact based on normalised statistical data (EUROSTAT), the number of reported incidents (ENISA), legislative data (Council of Europe), and surveys filled in by companies and public institutions (MS Survey). Unfortunately, none of the indicators published in the report was strictly dedicated to industrial cybersecurity. The EU also suggested a specification based on twenty-two quality features that all reliable indicators should have. The traits of a good indicator include precision, validity, ability to systematically collect data, neutrality, and transparency (<xref ref-type="bibr" rid="ref14">ENISA, 2024</xref>).</p><p>It is important to mention that the EU uses online device scans and statistics provided by <xref ref-type="bibr" rid="ref32">Shodan (no date)</xref>. Although this commercially available portal is valuable for regular IT cybersecurity, it is not the case for the industrial sector. Shodan scans devices connected to the Internet and reports back on non-secure entities based on defined features. Most industrial devices are, in general, isolated from the Internet and therefore unreachable for Shodan. Nonetheless, there are attackers, such as the currently common Russian hacktivists, that target industrial devices reachable online (<xref ref-type="bibr" rid="ref10">Cybersecurity and Infrastructure Security Agency [CISA], 2024</xref>). In fact, professional hackers are able to access industrial networks by other means, for example, supply chain compromise and infected removal media.</p><p>The presented estimation of the vulnerability landscape for industrial systems in CEE is not difficult to perform, but the results rely on markers and should be interpreted with caution for the following reasons. Firstly, there are multiple causes for which certain terms are searched, even if the phrase is very specific for ICSs (e.g. RX3i). For example, the term may be googled by students, because certain technology is simply popular in educational laboratories and textbooks (<xref ref-type="bibr" rid="ref1">Adamo <italic>et al</italic>., 2007</xref>). It is possible that foreign entities may be interested in devices used in other countries. Terms may also be googled in a different context that is not related to ICSs at all. Secondly, it shall be noted that the analysis was performed using the assumption that all terms were searched in English. This may not be true in Europe, where the popularity of English language varies (<xref ref-type="bibr" rid="ref33">Sim, 2008</xref>). Moreover, countries, such as Serbia and Ukraine, use Cyrillic script, which can cause the results to be biased. Another major issue may be the choice of search engine; this analysis assumes that Google is equally popular in complete CEE (<xref ref-type="bibr" rid="ref35">StatCounter, n.d.</xref>). In addition to that, Google Keyword Planner is actually one of many tools used for advert placement and trend monitoring and it will never replace accuracy that can be achieved by incorporation of sales data and on-site asset stocktaking. Furthermore, it is worth noting that <italic>VP<sub>c</sub></italic> has a statistical character, that is, it gains accuracy and reliability when calculated on massive and diverse datasets. Therefore, relying solely on NVD may introduce additional biases. A proper index should operate on multiple data sources, especially if they originate from an area under investigation. Lastly, it is possible to carefully pick a set of terms that are capable of supporting any narrative. In fact, it would be extremely difficult to eliminate bias in any of general indexes and matrices that estimate properties of infrastructure, and <italic>VP<sub>c</sub></italic> is not an exemption. Nonetheless, large sets of search phases ought to be less easily manipulated (<xref ref-type="bibr" rid="ref34">Skelly <italic>et al</italic>., 2012</xref>). All the reasons listed above should be kept in mind while interpreting the <italic>VP<sub>c</sub></italic> score.</p><p>In general, the values of <italic>VP<sub>c</sub></italic> indicate national interest in vulnerable industrial technologies and may be useful for industrial security state estimation. Although the proposed <italic>VP<sub>c</sub></italic> metric may have some drawbacks, the obtained values of <italic>VP<sub>c</sub></italic> seem to be reasonable in most cases. In order to create a reference for <italic>VP<sub>c</sub></italic>, three additional columns are placed in <xref ref-type="table" rid="T1">Table 1</xref>, that is, the NCSI, DDL, and the difference between them. These security parameters were taken from the <xref ref-type="bibr" rid="ref29">NCSI (n.d.)</xref> project website. NCSI data, in general, agrees with the proposed metric; however, there is a possible normalisation issue that must be mentioned. Although Slovenia was assigned a low NCSI, it has the highest <italic>VP<sub>c</sub></italic> score. The reason for this may be the chosen normalisation scheme that made the <italic>VP<sub>c</sub></italic> values strongly dependent on the highest normalised search volume of the most popular keyword. If search terms are not properly chosen, then the results can be biased. Hopefully, the risk is minimised for larger sets of search phases; nonetheless, this issue is the weakest element of the <italic>VP<sub>c</sub></italic> score.</p><p>The <xref ref-type="bibr" rid="ref18">International Telecommunication Union (2020)</xref> publishes GCI, which is composed of the following five domains: legal, technical, organisational, capacity development, and cooperative. The Index is designed to measure the commitment of countries to cybersecurity at a global level based on replies to a questionnaire prepared by experts. Information on GCI values for analysed countries are mentioned in <xref ref-type="table" rid="T1">Table 1</xref>. Correlation between the <italic>VP<sub>c</sub></italic> and GCI values revealed the same degree of correlation between these metrics as was detected for <italic>VP<sub>c</sub></italic> and NCSI. This may be explained by the strong correlation between NCSI and GCI. Both of these metrics are used to assess cybersecurity states of countries suffering cyberattacks from Russia (Ukraine, Georgia, and Estonia), showing their importance as estimators of digital development (<xref ref-type="bibr" rid="ref42">Yerina <italic>et al</italic>., 2021</xref>), which can also partly be reflected in the level of cyber defence ICSs.</p><p>Industrial cybersecurity assessments are dominated by expert opinions. The reports are often prepared by industrial cyber intelligence teams associated with major industrial cybersecurity solutions. Companies such as Dragos or Kaspersky prepare periodical and specialised reports that address current threats for industrial networks and major regional security issues. Unlike marker- and survey-based assessments, experts are known to express predictions and anticipations of changes in technology. For example, the operational technology (OT) cybersecurity review of 2023 published by <xref ref-type="bibr" rid="ref11">Dragos Inc. (2024)</xref> is focused on current conflicts and new threats, rather than vulnerability assessment. Similarly, periodical expert reports on industrial cybersecurity developed by Kaspersky mainly cover new threats to ICSs (<xref ref-type="bibr" rid="ref19">Kaspersky ICS CERT, 2024</xref>).</p><p>Finally, there are reports related to vulnerability of indusial automation technologies in CEE that can be comparted with <italic>VP<sub>c</sub></italic> results. According to the report about the readiness of central and eastern EU countries for Industry 4.0 (<xref ref-type="bibr" rid="ref31">Naudé <italic>et al</italic>., 2019</xref>), the Czech Republic, Lithuania, Hungary, and Slovenia have the highest potential for adoption and deployment of new industrial technologies. However, Bulgaria, Slovakia, Romania, and Poland are least prepared for adoption of technologies related to Industry 4.0. These conclusions are obtained by combining the most crucial aspects of industrial transformation capacity (i.e. technological, entrepreneurial, and governance competencies). In general, the <italic>VP<sub>c</sub></italic> scores reflect conclusions presented in the report for six out of eight analysed countries. Not in line with the report, the <italic>VP<sub>c</sub></italic> values obtained for Hungary and Slovenia are higher than average. A similar argument may be made for NCSI. As mentioned before, the <italic>VP<sub>c</sub></italic> score for Slovenia might be biased by normalisation, but this is less likely for Hungary. Despite these differences, the conclusions in the report match with most <italic>VP<sub>c</sub></italic> scores, especially in the case of Poland and Romania. These countries have been estimated by <italic>VP<sub>c</sub></italic> as more vulnerable to cyberattacks on ICSs which was in disagreement with NCSI.</p></sec><sec id="S5" sec-type="conclusions"><title>Conclusions</title><p>Many different industrial technologies exist in CEE. Regions differ in their deployment of novel technologies and there are many facilities that still operate on vulnerable devices and systems. As described in this work, the <italic>VP<sub>c</sub></italic> score shows the industrial vulnerability landscape for multiple countries in CEE. The <italic>VP<sub>c</sub></italic> score aligns with expectations and correlates with external benchmarks, such as NCSI, GCI, and EU reports. It highlights Slovenia and Belarus as having the highest/worst <italic>VP<sub>c</sub></italic> scores overall, with several other countries in Eastern Europe also showing elevated scores. Conversely, countries such as Czech Republic, Estonia, Latvia, Lithuania, and Serbia had the lowest <italic>VP<sub>c</sub></italic> scores, which can be interpreted as high cyberattack resilience in the industrial automation sector. Vulnerabilities related to PLC and industrial communication protocols were particularly notable in Slovenia, Belarus, Poland, and Romania. Statistical analysis revealed a moderate correlation between the <italic>VP<sub>c</sub></italic> and reference scores (NCSI and GCI), which was anticipated, since industrial cybersecurity does not have to perfectly mirror the IT one.</p><p>Based on the findings of this study, several recommendations for policymakers and investors can be derived. Firstly, there is a clear need for increased investment in industrial control and automation systems in Romania, Bosnia and Herzegovina, Albania, Bulgaria, Poland, Belarus, and Slovakia. These countries appear to rely on outdated and vulnerable technologies that require modernisation. Secondly, the Baltic states, namely Estonia, Latvia, and Lithuania, exhibit high resilience to potential cyberattacks, indicating that their defence strategies are effective and should be maintained and supported. Lastly, the <italic>VP<sub>c</sub></italic> measure provides insights into vendor market shares in Romania, Belarus, and Bosnia and Hercegovina, where companies with a greater number of vulnerabilities are common. <italic>VP<sub>c</sub></italic> can serve as a valuable tool in reports aimed at informing political decisions and guiding investment strategies. In this case, both legal and commercial actions are needed to promote trustworthy industrial vendors and standards.</p><p>Tracking general security trends in industrial infrastructure is difficult and time--consuming. <italic>VP<sub>c</sub></italic> is able to overcome these limitations, but at a cost associated with susceptibility to bias. Firstly, search term popularity is influenced by various non-industrial factors, such as academic or educational interest in specific technologies. Secondly, English-language dominance in search queries may overlook regional preferences, such as the use of Cyrillic script in countries such as Serbia or Ukraine, potentially skewing results. Additionally, relying solely on Google Keyword Planner may not capture the full spectrum of data, as it primarily serves advertising. Moreover, the <italic>VP<sub>c</sub></italic> score's statistical nature implies greater accuracy with larger and more diverse datasets, suggesting that exclusive reliance on sources such as NVD could introduce biases. To mitigate these issues, a robust index should integrate multiple data sources relevant to the specific area of investigation. Finally, careful selection of search terms is crucial to avoid bias and ensure the <italic>VP<sub>c</sub></italic> score's reliability in reflecting infrastructure properties. Although <italic>VP<sub>c</sub></italic> has many drawbacks, it can be useful as a general metric and help to track changes in national industrial cybersecurity.</p><p>Industrial infrastructure is one of the main targets in modern hybrid warfare. European countries are already suffering from intense cyberattacks from both foreign state agencies and criminal organisations. Therefore, multidimensional and complex analysis of the industrial cyber vulnerability landscape, as well as monitoring its development, is important to prepare and deploy proper defence plans (<xref ref-type="bibr" rid="ref20">Kayan <italic>et al</italic>., 2022</xref>). The <italic>VP<sub>c</sub></italic> score can only be a part of realistic infrastructure security assessment; however, it reveals information about general interest in vulnerable technologies. The interest itself may also point out which attacks are more (or less) likely or signal that more investments are needed to modernise and secure industrial infrastructure. In addition, the score may trigger changes in the education of skilled personnel that is essential in specific industrial sectors. It is worth noting that the <italic>VP<sub>c</sub></italic> score can be used by security researchers to identify and predict spreading across different countries. The <italic>VP<sub>c</sub></italic> score may also be deployed to plan and coordinate investments in industrial security at international (EU) level as well as regulate usage of vulnerable industrial technology and standards by law, enforcing cybersecurity standards.</p><p>Finally, the <italic>VP<sub>c</sub></italic> score introduced in this work should be validated by regional infrastructure studies. Vulnerability analysis of industrial technologies and equipment based on real inventory lists may be a better source of data. This can be achieved by modern security systems for industrial networks that are capable of inventory analysis and vulnerability detection, such as the SCADvanceXP (<xref ref-type="bibr" rid="ref39">Twardawa <italic>et al</italic>., 2024</xref>). Future work on the <italic>VP<sub>c</sub></italic> score should also improve scaling and the normalisation procedure. For example, creating a list of referential and validated search terms may to a large extent eliminate the problem of wrong scaling of search volume. Additional effort should also be made to take into account search phrases in the official language of each analysed country. Nevertheless, the <italic>VP<sub>c</sub></italic> score has a great potential for studying regional industrial infrastructure vulnerability to cyberattacks.</p></sec></body><back><sec id="S6" sec-type="financial-disclosure"><title>Funding</title><p>This research received no external funding.</p></sec><sec id="S7"><title>Author Contributions</title><p>Conceptualization, M.G.T. and M.S.; methodology, M.G.T., F.R., and J.K.; software, M.G.T. and M.S; validation, M.G.T, M.S., F.R., and N.M.; formal analysis, M.G.T., M.S., and F.R.; investigation, M.G.T.; resources, J.K.; data curation, F.R. and J.K.; writing—original draft preparation, M.G.T., M.S., and F.R.; writing—review and editing, M.G.T. and N.M.; visualization, J.K.; supervision, M.S., F.R., and N.M.; project administration, N.M.; funding acquisition, M.S. and N.M. All authors read and agreed to the published version of the manuscript.</p></sec><sec id="S8"><title>Data Availability Statement</title><p>Data is contained in supplementary materials.</p></sec><sec id="S9"><title>Disclosure statement</title><p>Marek Smolik reports a relationship with ICsec S.A. that includes board membership and employment. Franciszek Rakowski reports a B2B cooperation with ICsec S.A. ICsec S.A. offers the SCADvanceXP system, which is an IDS for industrial control systems. The authors obtained copyright permission for the maps and images published in the paper. All images and maps were created by the authors based on publicly available data.</p></sec><ref-list><ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Adamo</surname>, <given-names>F</given-names></string-name>., <string-name><surname>Attivissimo</surname>, <given-names>F</given-names></string-name>., <string-name><surname>Cavone</surname>, <given-names>G</given-names></string-name>. and <string-name><surname>Giaquinto</surname>, <given-names>N</given-names></string-name></person-group>. (<year>2007</year>) <article-title>‘SCADA/HMI systems in advanced educational courses’</article-title>, <source><italic>IEEE Transactions on Instrumentation and Measurement</italic></source>, <volume>56</volume>(<issue>1</issue>), pp. <fpage>4</fpage>–<lpage>10</lpage>. doi: <pub-id pub-id-type="doi">10.1109/TIM.2006.887216</pub-id>.</mixed-citation></ref><ref id="ref2"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Alcaraz</surname>, <given-names>C</given-names></string-name>., <string-name><surname>Fernandez</surname>, <given-names>G</given-names></string-name>. and <string-name><surname>Carvajal</surname>, <given-names>F</given-names></string-name></person-group>. (<year>2012</year>) <chapter-title>‘Security aspects of SCADA and DCS environments’</chapter-title>, in <person-group person-group-type="editor"><string-name><surname>Lopez</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Setola</surname>, <given-names>R</given-names></string-name>. and <string-name><surname>Wolthusen</surname>, <given-names>S</given-names></string-name></person-group>. (eds.) <source><italic>Critical infrastructure protection: Information infrastructure models, analysis, and defense</italic></source>. <publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>, pp. <fpage>120</fpage>–<lpage>149</lpage>. doi: <pub-id pub-id-type="doi">10.1007/978-3-642-28920-0_7</pub-id>.</mixed-citation></ref><ref id="ref3"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alexopoulos</surname>, <given-names>K</given-names></string-name>., <string-name><surname>Koukas</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Boli</surname>, <given-names>N</given-names></string-name>. and <string-name><surname>Mourtzis</surname><given-names>D</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Architecture and development of an industrial internet of things framework for realizing services in industrial product service systems’</article-title>, <source>Procedia CIRP</source>, <volume>72</volume>, pp. <fpage>880</fpage>–<lpage>885</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.procir.2018.03.152</pub-id>.</mixed-citation></ref><ref id="ref4"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Aserto Sp. z o.o</collab></person-group>. (n.d.) <article-title><italic>Optiba – sklep online</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://optiba.com/automatyka-przemyslowa-i-elektrotechnika">https://optiba.com/automatyka-przemyslowa-i-elektrotechnika</ext-link> (Accessed : 21 March 2023).</mixed-citation></ref><ref id="ref5"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>ASTOR</collab></person-group> (n.d.) <article-title><italic>ASTOR online shop</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.astor.com.pl/sklep/">https://www.astor.com.pl/sklep/</ext-link> (Accessed: 21 March 2023).</mixed-citation></ref><ref id="ref6"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Bryes</surname>, <given-names>E</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘<italic>Rip and replace</italic>’ <italic>approach to SCADA security is unrealistic</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.tofinosecurity.com/blog/%E2%80%9Crip-and-replace%E2%80%9D-approach-scada-security-unrealistic">https://www.tofinosecurity.com/blog/%E2%80%9Crip-and-replace%E2%80%9D-approach-scada-security-unrealistic</ext-link> (Accessed: 27 September 2023).</mixed-citation></ref><ref id="ref7"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Cadena</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Gualoto</surname>, <given-names>F</given-names></string-name>., <string-name><surname>Fuertes</surname>, <given-names>W</given-names></string-name>., <string-name><surname>Tello-Oquendo</surname>, <given-names>L</given-names></string-name>., <string-name><surname>Andrade</surname>, <given-names>R</given-names></string-name>., <string-name><surname>Tapia Leon</surname>, <given-names>F</given-names></string-name>. and <string-name><surname>Torres</surname><given-names>J</given-names></string-name></person-group>. (<year>2020</year>) <chapter-title>‘Metrics and indicators of information security incident management: A systematic mapping study’</chapter-title>, in <person-group person-group-type="editor"><string-name><surname>Rocha</surname><given-names>A</given-names></string-name>. and <string-name><surname>Pacheco Pereira</surname><given-names>R</given-names></string-name></person-group>. (eds.) <source><italic>Smart innovation, systems and technologies</italic></source>. <publisher-loc>Singapore</publisher-loc>: <publisher-name>Springer Nature</publisher-name>, pp. <fpage>507</fpage>–<lpage>519</lpage>. doi: <pub-id pub-id-type="doi">10.1007/978-981-13-9155-2_40</pub-id>.</mixed-citation></ref><ref id="ref8"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chataway</surname>, <given-names>J</given-names></string-name></person-group>. (<year>1999</year>) <article-title>‘Technology transfer and the restructuring of science and technology in central and eastern Europe’</article-title>, <source>Technovation</source>, <volume>19</volume>(<issue>6–7</issue>), pp. <fpage>355</fpage>–<lpage>364</lpage>. doi: <pub-id pub-id-type="doi">10.1016/S0166-4972(99)00029-2</pub-id>.</mixed-citation></ref><ref id="ref9"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chaudhary</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Gkioulos</surname>, <given-names>V</given-names></string-name>. and <string-name><surname>Katsikas</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2022</year>) <article-title>‘Developing metrics to assess the effectiveness of cybersecurity awareness program’</article-title>, <source>Journal of Cybersecurity</source>, <volume>8</volume>(<issue>1</issue>), <fpage>tyac006</fpage>. doi: <pub-id pub-id-type="doi">10.1093/cybsec/tyac006</pub-id>.</mixed-citation></ref><ref id="ref10"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Cybersecurity and Infrastructure Security Agency (CISA)</collab></person-group> (<year>2024</year>) <article-title><italic>Defending OT operations against ongoing pro-Russia hacktivist activity</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.cisa.gov/resources-tools/resources/defending-ot-operations-against-ongoing-pro-russia-hacktivist-activity">https://www.cisa.gov/resources-tools/resources/defending-ot-operations-against-ongoing-pro-russia-hacktivist-activity</ext-link> (Accessed: 13 June 2024).</mixed-citation></ref><ref id="ref11"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Dragos Inc</collab></person-group>. (<year>2024</year>) <article-title><italic>OT cybersecurity – the 2023 year in review</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.dragos.com/ot-cybersecurity-year-in-review/">https://www.dragos.com/ot-cybersecurity-year-in-review/</ext-link> (Accessed : 14 June 2024).</mixed-citation></ref><ref id="ref12"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>European Cybersecurity Organisation</collab></person-group> (<year>2018</year>) <article-title><italic>Industry 4.0 and ICS sector report: Cyber security for the industry 4.0 and ICS sector, WG3 I sectoral demand</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://ecs-org.eu/ecso-uploads/2022/10/5fdb2628a0318.pdf">https://ecs-org.eu/ecso-uploads/2022/10/5fdb2628a0318.pdf</ext-link> (Accessed: 21 March 2023).</mixed-citation></ref><ref id="ref13"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>European Union Agency for Cybersecurity (ENISA)</collab></person-group> (<year>2022</year>) <article-title><italic>ENISA threat landscape</italic> 2022</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022">https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022</ext-link> (Accessed: 28 September 2023).</mixed-citation></ref><ref id="ref14"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>European Union Agency for Cybersecurity (ENISA)</collab></person-group> (<year>2024</year>) <article-title><italic>EU cybersecurity index – Framework and methodological note</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.enisa.europa.eu/topics/cybersecurity-policy/nis-directive-new/eu-cybersecurity-index/eu_csi_methodological_note_v1-0.pdf">https://www.enisa.europa.eu/topics/cybersecurity-policy/nis-directive-new/eu-cybersecurity-index/eu_csi_methodological_note_v1-0.pdf</ext-link> (Accessed: 13 June 2024).</mixed-citation></ref><ref id="ref15"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Filippov</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2010</year>) <article-title>‘Central and Eastern Europe: Innovation-led transition’</article-title>, <source>Problemy Eksploatacji</source>, <volume>3</volume>, pp. <fpage>139</fpage>–<lpage>148</lpage>.</mixed-citation></ref><ref id="ref16"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gazzan</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Sheldon</surname>, <given-names>F.T</given-names></string-name></person-group>. (<year>2023</year>) <article-title>‘Opportunities for early detection and prediction of ransomware attacks against industrial control systems’</article-title>, <source>Future Internet</source>, <volume>15</volume>, p. <fpage>144</fpage>. doi: <pub-id pub-id-type="doi">10.3390/fi15040144</pub-id>.</mixed-citation></ref><ref id="ref17"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Google Ads</collab></person-group> (n.d.) <article-title><italic>Keyword planner</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://ads.google.com/home/tools/keyword-planner/">https://ads.google.com/home/tools/keyword-planner/</ext-link> (Accessed: 21 March 2023).</mixed-citation></ref><ref id="ref18"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>International Telecommunication Union</collab></person-group> (<year>2020</year>) <article-title><italic>Global cybersecurity index</italic>—<italic>Measuring commitment to cybersecurity</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.1-2021-PDF-E.pdf">https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.1-2021-PDF-E.pdf</ext-link> (Accessed: 13 June 2024).</mixed-citation></ref><ref id="ref19"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Kaspersky ICS CERT</collab></person-group> (<year>2024</year>) <article-title><italic>Threat landscape for industrial automation systems. Q1</italic> 2024</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://ics-cert.kaspersky.com/publications/reports/2024/05/27/threat-landscape-for-industrial-automation-systems-q1-2024/">https://ics-cert.kaspersky.com/publications/reports/2024/05/27/threat-landscape-for-industrial-automation-systems-q1-2024/</ext-link> (Accessed: 14 June 2024).</mixed-citation></ref><ref id="ref20"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kayan</surname>, <given-names>H</given-names></string-name>., <string-name><surname>Nunes</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Rana</surname>, <given-names>O</given-names></string-name>., <string-name><surname>Burnap</surname>, <given-names>P</given-names></string-name>. and <string-name><surname>Perera</surname><given-names>C</given-names></string-name></person-group>. (<year>2022</year>) <article-title>‘Cybersecurity of industrial cyber-physical systems: A review’</article-title>, <source>ACM Computing Surveys (CSUR)</source>, <volume>54</volume>(11s), Article No. 229, pp. <fpage>1</fpage>–<lpage>35</lpage>. doi: <pub-id pub-id-type="doi">10.1145/351041</pub-id>.</mixed-citation></ref><ref id="ref21"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Kelly</surname>, <given-names>T</given-names></string-name>., <string-name><surname>Liaplina</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Tan</surname>, <given-names>S.W</given-names></string-name>. and <string-name><surname>Winkler</surname>, <given-names>H.J</given-names></string-name></person-group>. (<year>2017</year>) <article-title><italic>Reaping digital dividends: Leveraging the internet for development in Europe and Central Asia</italic></article-title>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>World Bank</publisher-name>. doi: <pub-id pub-id-type="doi">10.1596/978-1-4648-1025-1</pub-id>.</mixed-citation></ref><ref id="ref22"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Krisper</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Dobaj</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Macher</surname>, <given-names>G</given-names></string-name></person-group>. (<year>2020</year>) <chapter-title>‘Assessing risk estimations for cyber-security using expert judgment’</chapter-title>, in <person-group person-group-type="editor"><string-name><surname>Yilmaz</surname><given-names>M</given-names></string-name>., <string-name><surname>Niemann</surname><given-names>J</given-names></string-name>., <string-name><surname>Clarke</surname><given-names>P</given-names></string-name>. and <string-name><surname>Messnarz</surname><given-names>R</given-names></string-name></person-group>. (eds.) <source><italic>European conference on software process improvement</italic></source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Springer</publisher-name>, pp. <fpage>120</fpage>–<lpage>134</lpage>. doi: <pub-id pub-id-type="doi">10.1007/978-3-030-56441-4_9</pub-id>.</mixed-citation></ref><ref id="ref23"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Ladder Logic World</collab></person-group> (n.d.) <article-title><italic>PLC manufacturers: The latest PLC brands, rankings &amp; revenues</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://ladderlogicworld.com/plc-manufacturers/">https://ladderlogicworld.com/plc-manufacturers/</ext-link> (Accessed: 21 March 2023).</mixed-citation></ref><ref id="ref24"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Lee</surname>, <given-names>R.M</given-names></string-name>., <string-name><surname>Assante</surname>, <given-names>M.J</given-names></string-name>. and <string-name><surname>Conway</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2016</year>) <article-title><italic>Analysis of the cyber attack on the Ukrainian power grid: Defense use case</italic></article-title>, <source>SANS Industrial Control Systems</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2016/05/20081514/E-ISAC_SANS_Ukraine_DUC_5.pdf">https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2016/05/20081514/E-ISAC_SANS_Ukraine_DUC_5.pdf</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref25"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Li</surname>, <given-names>Y</given-names></string-name>. and <string-name><surname>Liu</surname>, <given-names>Q</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘A comprehensive review study of cyber-attacks and cyber security, emerging trends and recent developments’</article-title>, <source>Energy Reports</source>, <volume>7</volume>, pp. <fpage>8176</fpage>–<lpage>8186</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.egyr.2021.08.126</pub-id>.</mixed-citation></ref><ref id="ref26"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Marco</surname>, <given-names>G.D</given-names></string-name>., <string-name><surname>Loia</surname>, <given-names>V</given-names></string-name>., <string-name><surname>Karimipour</surname>, <given-names>H</given-names></string-name>. and <string-name><surname>Siano</surname>, <given-names>P</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Assessing insider attacks and privacy leakage in managed IoT systems for residential prosumers’</article-title>, <source>Energies</source>, <volume>14</volume>(<issue>9</issue>), <fpage>2385</fpage>. doi: <pub-id pub-id-type="doi">10.3390/en14092385</pub-id>.</mixed-citation></ref><ref id="ref27"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Meland</surname>, <given-names>P.H</given-names></string-name>., <string-name><surname>Tokas</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Erdogan</surname>, <given-names>G</given-names></string-name>., <string-name><surname>Bernsmed</surname>, <given-names>K</given-names></string-name>. and <string-name><surname>Omerovic</surname>, <given-names>A.A</given-names></string-name></person-group> (<year>2021</year>) <article-title>‘Systematic mapping study on cyber security indicator data’</article-title>, <source>Electronics</source>, <volume>10</volume>(<issue>9</issue>), <fpage>1092</fpage>. doi: <pub-id pub-id-type="doi">10.3390/electronics10091092</pub-id>.</mixed-citation></ref><ref id="ref28"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Microsoft</collab></person-group> (<year>2022</year>) <article-title><italic>New ‘Prestige’ ransomware impacts organizations in Ukraine and Poland</italic></article-title>. <source>Microsoft Threat Intelligence</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.microsoft.com/en-us/security/blog/2022/10/14/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland/">https://www.microsoft.com/en-us/security/blog/2022/10/14/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland/</ext-link> (Accessed: 28 September 2023).</mixed-citation></ref><ref id="ref29"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>National Cyber Security Index (NCSI)</collab></person-group> (n.d.) <article-title><italic>National Cyber Security Index</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://ncsi.ega.ee/ncsi-index/">https://ncsi.ega.ee/ncsi-index/</ext-link> (Accessed: 28 September 2023).</mixed-citation></ref><ref id="ref30"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>National Institute of Standards and Technology (NIST)</collab></person-group> (n.d.) <article-title><italic>National vulnerability database</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://nvd.nist.gov/vuln">https://nvd.nist.gov/vuln</ext-link> (Accessed: 21 March 2023).</mixed-citation></ref><ref id="ref31"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Naudé</surname>, <given-names>W</given-names></string-name>., <string-name><surname>Surdej</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Cameron</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2019</year>) <chapter-title><italic>The past and future of manufacturing in Central and Eastern Europe: Ready for Industry 4.0?</italic></chapter-title><source>Report IZA DP No. 12141</source>. <publisher-loc>Bonn</publisher-loc>: <publisher-name>Institute of Labor Economics (IZA)</publisher-name>.</mixed-citation></ref><ref id="ref32"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Shodan</collab></person-group> (n.d.) <article-title><italic>Search Engine for the Internet of Everything</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.shodan.io/">https://www.shodan.io/</ext-link> (Accessed: 13 June 2024).</mixed-citation></ref><ref id="ref33"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sim</surname>, <given-names>M.A</given-names></string-name></person-group>. (<year>2008</year>) <article-title>‘Teaching English in several Central and Eastern European countries’</article-title>, <source>Annals of Faculty of Economics</source>, <volume>1</volume>(<issue>1</issue>). pp. <fpage>644</fpage>–<lpage>648</lpage>.</mixed-citation></ref><ref id="ref34"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Skelly</surname>, <given-names>A.C</given-names></string-name>., <string-name><surname>Dettori</surname>, <given-names>J.R</given-names></string-name>. and <string-name><surname>Brodt</surname>, <given-names>E.D</given-names></string-name></person-group>. (<year>2012</year>) <article-title>‘Assessing bias: The importance of considering confounding’</article-title>, <source>Evidence-Based Spine-Care Journal</source>, <volume>3</volume>(<issue>1</issue>), pp. <fpage>9</fpage>–<lpage>12</lpage>. doi: <pub-id pub-id-type="doi">10.1055/s-0031-1298595</pub-id>.</mixed-citation></ref><ref id="ref35"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>StatCounter</collab></person-group> (n.d.) <article-title><italic>Search engine market share in Europe</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://gs.statcounter.com/search-engine-market-share/all/europe">https://gs.statcounter.com/search-engine-market-share/all/europe</ext-link> (Accessed: 29 September 2023).</mixed-citation></ref><ref id="ref36"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Stellios</surname>, <given-names>I</given-names></string-name>., <string-name><surname>Kotzanikolaou</surname>, <given-names>P</given-names></string-name>. and <string-name><surname>Psarakis</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2019</year>) <chapter-title>‘Advanced persistent threats and zero-day exploits in industrial Internet of things’</chapter-title>, in <person-group person-group-type="editor"><string-name><surname>Alcaraz</surname>, <given-names>C</given-names></string-name></person-group>. (ed.) <source><italic>Security and privacy trends in the industrial internet of things. Advanced sciences and technologies for security applications</italic></source>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name>. pp. <fpage>47</fpage>–<lpage>68</lpage>. doi: <pub-id pub-id-type="doi">10.1007/978-3-030-12330-7_3</pub-id>.</mixed-citation></ref><ref id="ref37"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Sterowniki-PLC.net</collab></person-group> (n.d.) <article-title><italic>Sterowniki-plc.net – sklepinternetowy</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://sterowniki-plc.net/">https://sterowniki-plc.net/</ext-link> (Accessed: 21 March 2023).</mixed-citation></ref><ref id="ref38"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Stout</surname>, <given-names>T.M</given-names></string-name>. and <string-name><surname>Williams</surname>, <given-names>T.J</given-names></string-name></person-group>. (<year>1995</year>) <article-title>‘Pioneering work in the field of computer process control’</article-title>, <source>IEEE Annals of the History of Computing</source>, <volume>17</volume>(<issue>1</issue>), pp. <fpage>6</fpage>–<lpage>18</lpage>. doi: <pub-id pub-id-type="doi">10.1109/85.366507</pub-id>.</mixed-citation></ref><ref id="ref39"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Twardawa</surname>, <given-names>M.G</given-names></string-name>., <string-name><surname>Smolik</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Rakowski</surname>, <given-names>F</given-names></string-name>., <string-name><surname>Kwiatkowski</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Meyer</surname>. <given-names>N</given-names></string-name></person-group>. (<year>2024</year>) <article-title>‘SCADvanceXP–an intelligent Polish system for threat detection and monitoring of industrial networks’</article-title>, <source>Security and Defence Quarterly</source>, <volume>48</volume>(<issue>4</issue>) Online first. doi: <pub-id pub-id-type="doi">10.35467/sdq/177655</pub-id>.</mixed-citation></ref><ref id="ref40"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>United States District Court, Southern District of New York</collab></person-group> (<year>2016</year>) <article-title><italic>United States of America v. Ahmad Fathi, Hamid Firoozi, Amin, Shokohi, Sadegh Ahmadzadegan a/k/a ‘Nitr0jen26’, Omid Ghaffarinia a/k/a ‘PLuS’, Sina Keissar, and Nader Saedi, a/k/a ‘Turk Server’</italic></article-title>. <source>Indictment</source>, <volume>24</volume> March, pp. <fpage>14</fpage>–<lpage>16</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.justice.gov/media/824691/dl?inline">https://www.justice.gov/media/824691/dl?inline</ext-link> (Accessed: 27 September 2023).</mixed-citation></ref><ref id="ref41"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Walker</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘“This is the golden age”: Eastern Europe’s extraordinary 30-year revival’</article-title>, <source><italic>The Guardian</italic></source>, 26 October. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.theguardian.com/world/2019/oct/26/this-is-the-golden-age-eastern-europes-extraordinary-30-year-revival">https://www.theguardian.com/world/2019/oct/26/this-is-the-golden-age-eastern-europes-extraordinary-30-year-revival</ext-link> (Accessed: 26 September 2023).</mixed-citation></ref><ref id="ref42"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Yerina</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Honchar</surname>, <given-names>I</given-names></string-name>. and <string-name><surname>Zaiets</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Statistical indicators of cybersecurity development in the context of digital transformation of economy and society’</article-title>, <source>Science and Innovation</source>, <volume>17</volume>(<issue>3</issue>), pp. <fpage>3</fpage>–<lpage>13</lpage>. doi: <pub-id pub-id-type="doi">10.15407/scine17.03.003</pub-id>.</mixed-citation></ref></ref-list><sec id="S10"><title>Supplementary</title><table-wrap id="T2" orientation="portrait" position="float"><label>Table S1.</label><caption><p>Data used to calculate VPc scores for each country. Search terms volume taken from Google Keyword Planner have been obtained for each country and transformed with decimal logaritm. Addictionaly number of vulnabilites associated with search term are provided in separated column. Information about type of keyword (company, protocol, plc) is also included.</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th align="left">Terms</th><th align="center">Albania</th><th align="center">Belarus</th><th align="center">Bosnia and Herze-govina</th><th align="center">Bulgaria</th><th align="center">Croatia</th><th align="center">Czechia</th><th align="center">Estonia</th><th align="center">Germany</th><th align="center">Hungary</th><th align="center">Latvia</th><th align="center">Lithuania</th><th align="center">North Mace-donia</th><th align="center">Moldova</th><th align="center">Montenegro</th><th align="center">Poland</th><th align="center">Romania</th><th align="center">Serbia</th><th align="center">Slovakia</th><th align="center">Slovenia</th><th align="center">Ukraine</th><th align="center">Vulner-abilities</th><th align="left">Type</th></tr></thead><tbody valign="top"><tr><td align="left">3s smart software solutions gmbh</td><td align="center">0</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">6</td><td align="left">company</td></tr><tr><td align="left">abb</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">4</td><td align="center">4</td><td align="center">4</td><td align="center">5</td><td align="center">4</td><td align="center">3</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">4</td><td align="center">3</td><td align="center">4</td><td align="center">921</td><td align="left">company</td></tr><tr><td align="left">ac500</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">7</td><td align="left">plc</td></tr><tr><td align="left">adcon</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">48</td><td align="left">company</td></tr><tr><td align="left">adcon telemetry</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">5</td><td align="left">company</td></tr><tr><td align="left">advantech</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">211</td><td align="left">company</td></tr><tr><td align="left">ah plc</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">3</td><td align="left">plc</td></tr><tr><td align="left">allen bradley</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">46</td><td align="left">company</td></tr><tr><td align="left">AS300</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">2</td><td align="center">1</td><td align="left">plc</td></tr><tr><td align="left">axc phoenix</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="left">plc</td></tr><tr><td align="left">b&amp;r automation</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">21</td><td align="left">company</td></tr><tr><td align="left">b1 b1z</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="left">plc</td></tr><tr><td align="left">bac net</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">37</td><td align="left">protocol</td></tr><tr><td align="left">beckhoff</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">5</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">17</td><td align="left">company</td></tr><tr><td align="left">canopen</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="left">protocol</td></tr><tr><td align="left">carel</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">27</td><td align="left">company</td></tr><tr><td align="left">cc link</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="left">protocol</td></tr><tr><td align="left">cutler hammer</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="left">company</td></tr><tr><td align="left">delta electronic</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">120</td><td align="left">company</td></tr><tr><td align="left">devicenet</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="left">protocol</td></tr><tr><td align="left">dnp3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">59</td><td align="left">protocol</td></tr><tr><td align="left">dvp eh3</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">1</td><td align="left">plc</td></tr><tr><td align="left">dvp es2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="left">plc</td></tr><tr><td align="left">dvp es3</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">dvp plc</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="left">plc</td></tr><tr><td align="left">easye4</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">eaton</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">3</td><td align="center">5</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">40</td><td align="left">company</td></tr><tr><td align="left">emerson</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">5</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">69</td><td align="left">company</td></tr><tr><td align="left">emerson electric co</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">6</td><td align="left">company</td></tr><tr><td align="left">ethercat</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="left">protocol</td></tr><tr><td align="left">ewon</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">24</td><td align="left">company</td></tr><tr><td align="left">exemys</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="left">company</td></tr><tr><td align="left">fatek</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">28</td><td align="left">company</td></tr><tr><td align="left">fbs plc</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">fd5 kinco</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">fd5 plc</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">fp panasonic</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">7</td><td align="left">plc</td></tr><tr><td align="left">fuji electric</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">47</td><td align="left">company</td></tr><tr><td align="left">g7ddt11</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">garrettcom</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">5</td><td align="left">company</td></tr><tr><td align="left">general industrial controls</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="left">company</td></tr><tr><td align="left">glc controls inc</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="left">company</td></tr><tr><td align="left">h hitachi</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">2</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">hb1 plc</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">hitachi</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">5</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">4</td><td align="center">3</td><td align="center">4</td><td align="center">268</td><td align="left">company</td></tr><tr><td align="left">hitachi eh</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">2</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="left">plc</td></tr><tr><td align="left">honeywell</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">3</td><td align="center">5</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">4</td><td align="center">3</td><td align="center">4</td><td align="center">56</td><td align="left">company</td></tr><tr><td align="left">hospira</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">17</td><td align="left">company</td></tr><tr><td align="left">ibc solar</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">14</td><td align="left">company</td></tr><tr><td align="left">iccp protocol</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">21</td><td align="left">protocol</td></tr><tr><td align="left">inductive automation</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">15</td><td align="left">company</td></tr><tr><td align="left">infinite automation systems</td><td align="center">1</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">10</td><td align="left">company</td></tr><tr><td align="left">ininet solution gmbh</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">9</td><td align="left">company</td></tr><tr><td align="left">juniper</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">3</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">928</td><td align="left">company</td></tr><tr><td align="left">juniper networks inc</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">515</td><td align="left">company</td></tr><tr><td align="left">k6 plc</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">kasa companies</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">1</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="left">company</td></tr><tr><td align="left">kasa companies inc</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="left">company</td></tr><tr><td align="left">kinco</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="left">company</td></tr><tr><td align="left">koyo</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">6</td><td align="left">company</td></tr><tr><td align="left">ks plc</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">16</td><td align="left">plc</td></tr><tr><td align="left">kv keyence</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">2</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">kw plc</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">4</td><td align="left">plc</td></tr><tr><td align="left">lx3v plc</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">lx5s plc</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">7</td><td align="left">plc</td></tr><tr><td align="left">lx5v plc</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">master k</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">30</td><td align="left">plc</td></tr><tr><td align="left">melsec</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">52</td><td align="left">plc</td></tr><tr><td align="left">micrex</td><td align="center">1</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">mitsubishi electric corporation</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">5</td><td align="left">company</td></tr><tr><td align="left">modbus</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">120</td><td align="left">protocol</td></tr><tr><td align="left">modicon</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">139</td><td align="left">company</td></tr><tr><td align="left">motorola</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">4</td><td align="center">5</td><td align="center">3</td><td align="center">5</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">4</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">4</td><td align="center">87</td><td align="left">company</td></tr><tr><td align="left">moxa</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">4</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">241</td><td align="left">company</td></tr><tr><td align="left">omron</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">3</td><td align="center">5</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">4</td><td align="center">3</td><td align="center">4</td><td align="center">50</td><td align="left">company</td></tr><tr><td align="left">omron corporation</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="left">company</td></tr><tr><td align="left">opc ua</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">110</td><td align="left">plc</td></tr><tr><td align="left">open automation software</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">24</td><td align="left">company</td></tr><tr><td align="left">pc10ac2</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">pc10bd14002d1</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">pc10bd14003d1</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">pc10bd16001d1</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">pc10ea04001n</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">pc10ed16003n</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">phoenix contact</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">3</td><td align="center">5</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">65</td><td align="left">company</td></tr><tr><td align="left">powerlink</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="left">protocol</td></tr><tr><td align="left">profibus</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">11</td><td align="left">protocol</td></tr><tr><td align="left">profinet</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">55</td><td align="left">protocol</td></tr><tr><td align="left">rexroth</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="left">company</td></tr><tr><td align="left">rexroth icl</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">company</td></tr><tr><td align="left">rockwell automation</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">131</td><td align="left">company</td></tr><tr><td align="left">rs enterprises</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">2</td><td align="center">20</td><td align="left">company</td></tr><tr><td align="left">rx3i</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="left">plc</td></tr><tr><td align="left">sauter</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">2</td><td align="center">5</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">6</td><td align="left">company</td></tr><tr><td align="left">scada engine</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">1</td><td align="center">0</td><td align="center">4</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">13</td><td align="left">plc</td></tr><tr><td align="left">schneider</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">5</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">4</td><td align="center">3</td><td align="center">4</td><td align="center">483</td><td align="left">company</td></tr><tr><td align="left">schneider electric</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">6</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">4</td><td align="center">4</td><td align="center">3</td><td align="center">4</td><td align="center">472</td><td align="left">company</td></tr><tr><td align="left">sercos iii</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">4</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="left">protocol</td></tr><tr><td align="left">simatic</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">239</td><td align="left">plc</td></tr><tr><td align="left">sma solar technology ag</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="left">company</td></tr><tr><td align="left">sourcefire inc</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">1</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">0</td><td align="center">1</td><td align="center">2</td><td align="center">3</td><td align="left">company</td></tr><tr><td align="left">sysmac</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">5</td><td align="left">company</td></tr><tr><td align="left">tase 2</td><td align="center">1</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">62</td><td align="left">protocol</td></tr><tr><td align="left">tofino security</td><td align="center">1</td><td align="center">1</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">0</td><td align="center">3</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">10</td><td align="left">company</td></tr><tr><td align="left">unitronics</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">5</td><td align="left">company</td></tr><tr><td align="left">v box</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">7</td><td align="left">plc</td></tr><tr><td align="left">v8000 keyence</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="left">plc</td></tr><tr><td align="left">versamax</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">4</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">wago</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">3</td><td align="center">5</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">4</td><td align="center">3</td><td align="center">3</td><td align="center">3</td><td align="center">4</td><td align="center">97</td><td align="left">company</td></tr><tr><td align="left">wecon</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">25</td><td align="left">company</td></tr><tr><td align="left">wecon technology</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">1</td><td align="center">2</td><td align="center">2</td><td align="center">6</td><td align="left">company</td></tr><tr><td align="left">westermo</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="center">1</td><td align="center">0</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">11</td><td align="left">company</td></tr><tr><td align="left">x20 abb</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">1</td><td align="left">plc</td></tr><tr><td align="left">x90 abb</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">2</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="center">0</td><td align="left">plc</td></tr><tr><td align="left">xg5000</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">1</td><td align="left">plc</td></tr><tr><td align="left">yokogawa</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">2</td><td align="center">4</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">0</td><td align="center">3</td><td align="center">2</td><td align="center">2</td><td align="center">2</td><td align="center">3</td><td align="center">41</td><td align="left">company</td></tr></tbody></table></table-wrap></sec></back></article>
