In this position paper we investigate the security of cyber-physical systems. We (1) identify and define the problem of secure control,(2) investigate the defenses that information …
We discuss three key challenges for securing cyberphysical systems:(1) understanding the threats, and possible consequences of attacks,(2) identifying the unique properties of cyber …
H Radhappa, L Pan, J Xi Zheng… - International journal of …, 2018 - Taylor & Francis
Wireless sensor networks are widely used in applications to monitor and communicate data. Even though the wireless sensor networks have been broadly used in critical applications …
A Borji, L Itti - 2012 IEEE conference on computer vision and …, 2012 - ieeexplore.ieee.org
We introduce a saliency model based on two key ideas. The first one is considering local and global image patch rarities as two complementary processes. The second one is based …
S Ruj, MA Cavenaghi, Z Huang… - 2011 IEEE Vehicular …, 2011 - ieeexplore.ieee.org
Detecting misbehavior (such as transmissions of false information) in vehicular ad hoc networks (VANETs) is a very important problem with wide range of implications, including …
D He, C Chen, S Chan, J Bu… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust …
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can physically capture some of the nodes, first can reprogram, and then, can …
M Momani, S Challa - arXiv preprint arXiv:1010.0168, 2010 - arxiv.org
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used …
The increasing autonomy and connectivity have been transitioning automobiles to complex and open architectures that are vulnerable to malicious attacks beyond conventional cyber …