A survey on ethereum systems security: Vulnerabilities, attacks, and defenses

H Chen, M Pendleton, L Njilla, S Xu - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Blockchain technology is believed by many to be a game changer in many application
domains. While the first generation of blockchain technology (ie, Blockchain 1.0) is almost …

A systems and control perspective of CPS security

SM Dibaji, M Pirani, DB Flamholz… - Annual reviews in …, 2019 - Elsevier
The comprehensive integration of instrumentation, communication, and control into physical
systems has led to the study of Cyber-Physical Systems (CPSs), a field that has recently …

Selection of IoT service provider for sustainable transport using q-rung orthopair fuzzy CRADIS and unknown weights

R Krishankumar, F Ecer - Applied Soft Computing, 2023 - Elsevier
Abstract Internet-of-things (IoT) is a fast-growing technology and sustainable transportation
is a crucial application area of IoTs. Selecting an appropriate IoT service provider (IoTSP) is …

A survey on systems security metrics

M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …

Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines

JPG Sterbenz, D Hutchison, EK Çetinkaya, A Jabbar… - Computer …, 2010 - Elsevier
The Internet has become essential to all aspects of modern life, and thus the consequences
of network disruption have become increasingly severe. It is widely recognised that the …

Cybersecurity for critical infrastructures: Attack and defense modeling

CW Ten, G Manimaran, CC Liu - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Disruption of electric power operations can be catastrophic on national security and the
economy. Due to the complexity of widely dispersed assets and the interdependences …

Vulnerability assessment of cybersecurity for SCADA systems

CW Ten, CC Liu, G Manimaran - IEEE Transactions on Power …, 2008 - ieeexplore.ieee.org
Vulnerability assessment is a requirement of NERC's cybersecurity standards for electric
power systems. The purpose is to study the impact of a cyber attack on supervisory control …

Security of additive manufacturing: Attack taxonomy and survey

M Yampolskiy, WE King, J Gatlin, S Belikovetsky… - Additive …, 2018 - Elsevier
Additive manufacturing (AM) is a rapidly growing, multibillion dollar industry. AM is
increasingly being used to manufacture functional parts, including components of safety …

Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation

JPG Sterbenz, EK Çetinkaya, MA Hameed… - Telecommunication …, 2013 - Springer
As the Internet becomes increasingly important to all aspects of society, the consequences
of disruption become increasingly severe. Thus it is critical to increase the resilience and …

Quantified security is a weak hypothesis: a critical survey of results and assumptions

V Verendel - Proceedings of the 2009 workshop on New security …, 2009 - dl.acm.org
This paper critically surveys previous work on quantitative representation and analysis of
security. Such quantified security has been presented as a general approach to precisely …