| ANNs | Artificial neural networks |
| CNN | Convolutional neural network |
| ECE | External Cybersecurity Experts |
| AI | Artificial intelligence |
| IoT | Internet of Things |
| IT/OT | Information Technology/Operational Technology |
| LSTM | Long Short-Term Memory |
| AUC-ROC | Area Under the Receiver Operating Characteristic Curve |
| CC BY | Creative Commons Attribution |
| ML | Machine learning |
| PdM | Predictive maintenance |
| RF | Random forest |
| SVM | Support Vector Machine |
| SCADA | Supervisory Control And Data Acquisition |
| SVR | Support Vector Regression |
| MFA | Multi-Factor Authentication |
| HAZOP | Hazard and Operability |
| FMEA | Failure modes and effects analysis |
| DL | Deep learning |
| IDS | Intrusion Detection Systems |
| OT | Operational Technology |
| TCP-IP | Transmission Control Protocol/Internet Protocol |
| TLS | Transport Layer Security |
| WI-FI | Wireless Fidelity |