by a cyber-physical system (CPS). The incorporation of embedded Internet of Things (IoT)
devices makes it tedious to identify vulnerability and difficult to control the service-
interruptions and manage the operations losses. Rule-based mechanisms have been
considered as a solution in the past. However, rule-based solutions operate on the goodwill
of the generated rules and perform assumption-based detection. Such a solution often is far …
The identification of vulnerabilities in a mission-critical system is one of the challenges faced
by a cyber-physical system (CPS). The incorporation of embedded Internet of Things (IoT)
devices makes it tedious to identify vulnerability and difficult to control the service-
interruptions and manage the operations losses. Rule-based mechanisms have been
considered as a solution in the past. However, rule-based solutions operate on the goodwill
of the generated rules and perform assumption-based detection. Such a solution often is far …