Cyber-physical energy systems security: Threat modeling, risk assessment, resources, metrics, and case studies

I Zografopoulos, J Ospina, X Liu, C Konstantinou - IEEE Access, 2021 - ieeexplore.ieee.org
… Specifically, we demonstrate a threat modeling methodologyattack entry points and system
vulnerabilities. Leveraging the … cyber-attacks in CPS, we develop a holistic threat model that …

[HTML][HTML] A method for assigning probability distributions in attack simulation languages

W Xiong, S Hacks, R Lagerström - … Informatics and Modeling …, 2021 - diva-portal.org
security experts to model attackers’ efforts. To address this gap, we propose a method to assign
probability distributions to the attack … We demonstrate the proposed method by assigning …

Cyber-physical power system (CPPS): A review on modeling, simulation, and analysis with cyber security applications

RV Yohanandhan, RM Elavarasan, P Manoharan… - IEEE …, 2020 - ieeexplore.ieee.org
… of physical and cyber systems. A comprehensive review of different modelling, simulation,
and analysis methods and different types of cyber-attacks, cybersecurity measures for modern …

Machine learning models for secure data analytics: A taxonomy and threat model

R Gupta, S Tanwar, S Tyagi, N Kumar - Computer Communications, 2020 - Elsevier
… And how to detect such security attacks on the designed ML models? Motivated from … models
usage for attack models and mitigation techniques used. Some examples of security attacks

Security analysis of drones systems: Attacks, limitations, and recommendations

JP Yaacoub, H Noura, O Salman, A Chehab - Internet of Things, 2020 - Elsevier
security threats was addressed, attacks on drones. The existing countermeasures need to be
analyzed, and new techniques … to overcome the limitations of the existing security solutions. …

A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future

M Ghiasi, T Niknam, Z Wang, M Mehrandezh… - Electric Power Systems …, 2023 - Elsevier
… summarize different methods and techniques and to review … of cyber-security; then, their
modeling and mechanisms are … cyber-attack models are technically discussed and analyzed. …

A survey on security and privacy issues in modern healthcare systems: Attacks and defenses

AKMI Newaz, AK Sikder, MA Rahman… - ACM Transactions on …, 2021 - dl.acm.org
… explore various security and privacy threats to healthcare systems and … and discuss potential
adversarial models. … Additionally, in this section, we explain the attack methods and discuss …

Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review

N Mishra, S Pandya - IEEE Access, 2021 - ieeexplore.ieee.org
models for mitigating DDoS attacks and focuses on Intrusion Detection … IoT security, DDoS
attack discussion, Intrusion Detection System, analysis of IDS datasets, and IDS techniques

A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
… Open Systems Interconnection (OSI) model and how network … Then, we classify network
protocols and security threats with … wireless network attacks, then provides methods to secure

A survey of cyber attacks on cyber physical systems: Recent advances and challenges

W Duo, MC Zhou, A Abusorrah - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
… neural network [37]−[40], which is beyond the scope of this paper. We only discuss secure
control methods against DoS attacksprocess to model systems and DoS attacks to realize risk