Vulnerabilities of control systems in Internet of Things applications

V Radisavljevic-Gajic, S Park… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
In this paper, we present some initial results about vulnerability of control systems that can
be used in Internet of Things (IoT) applications. Up to our best knowledge, this paper is the …

Cyber physical security for industrial control systems and IoT

K Kobara - IEICE TRANSACTIONS on Information and Systems, 2016 - search.ieice.org
Cyber-attacks and cybersecurity used to be the issues for those who use Internet and
computers. The issues, however, are expanding to anyone who does not even use them …

Detection and mitigation of time delay injection attacks on industrial control systems with PLCs

E Korkmaz, M Davis, A Dolgikh, V Skormin - Computer Network Security …, 2017 - Springer
National security agencies are increasingly concerned about cyber threats to Industrial
Control Systems (ICS). For this reason, the detection and mitigation of cyber-attacks on ICS …

A mathematical framework for the analysis of cyber-resilient control systems

AM Melin, EM Ferragut, JA Laska… - … on Resilient Control …, 2013 - ieeexplore.ieee.org
The increasingly recognized vulnerability of industrial control systems to cyber-attacks has
inspired a considerable amount of research into techniques for cyber-resilient control …

[PDF][PDF] Digital industrial control systems: vulnerabilities and security technologies

IA Adeyanju, ED Emake, OM Olaniyan… - … Applied Science and …, 2021 - thaiscience.info
Abstract Digital Industrial Control Systems (ICS) are complex electromechanical systems
composed of components such as sensors, actuators, programmable logic controllers and …

An Attack Model of Autonomous Systems of Systems

D Hanic, A Surkovic - 2018 - diva-portal.org
Context: In order to provide more functionalities and services, systems collaborate with each
other creating more complex systems called Systems of Systems. Exploiting security …

Cyber security and vulnerability analysis of networked control system subject to false-data injection

B Gerard, SB Rebaï, H Voos… - 2018 Annual American …, 2018 - ieeexplore.ieee.org
In the present paper, the problem of networked control system (NCS) cyber security is
considered. The geometric approach is used to evaluate the security and vulnerability level …

Cyber security threats in industrial control systems and protection

M Marali, SD Sudarsan… - … Conference on Advances …, 2019 - ieeexplore.ieee.org
Industrial automation and control systems are increasingly based on open communication
protocols and platforms that are also commonly used in corporate IT environments and …

Vulnerabilities with internet of things

K Zunnurhain - … of the International Conference on Security …, 2016 - search.proquest.com
With the rapid growth of the Internet and rapid growth of smart device usage in our daily
lives, we are submerged in an interconnected, ubiquitous and pervasive network, also …

[图书][B] Secure control systems: A control-theoretic approach to cyber-physical security

F Pasqualetti - 2012 - search.proquest.com
Cyber-physical systems and networks form a ubiquitous computing substrate that underlies
much of modern technological society. Examples include embedded systems, such as …