Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

[PDF][PDF] Automated analysis approach for the detection of high survivable ransomware

YA Ahmed, B Kocer, BAS Al-rimy - … on Internet and Information Systems (TIIS …, 2020 - itiis.org
Ransomware is malicious software that encrypts the user-related files and data and holds
them to ransom. Such attacks have become one of the serious threats to cyberspace. The …

Towards IT Peace Research

C Reuter - Sicherheit und Frieden (S+ F)/Security and Peace, 2020 - JSTOR
Advances in science and technology, including information technology (IT), play a crucial
role in the context of peace and security. However, research on the intersection of peace …

A software upgrade security analysis method on network traffic classification using deep learning

B Zhang - 2020 International Conference on Urban Engineering …, 2020 - ieeexplore.ieee.org
Nowadays, the vulnerability in the software upgrade process are extremely harmful to
network security. However, the detection of upgrade vulnerability is facing serious difficulties …

SoK: Cyber-Attack Taxonomy of Distributed Ledger-and Legacy Systems-based Financial Infrastructures

R Ankele, K Nahrgang, B Stojanovic… - Cryptology ePrint …, 2020 - eprint.iacr.org
Nowadays, virtually all products and services offered by financial institutions are backed by
technology. While the frontend banking services seem to be simple, the core-banking …

Toward the Detection and Mitigation of Ransomware Attacks in Medical Cyber-Physical Systems (MCPSs)

AH Celdrán, FJG Clemente… - Recent Advances in …, 2020 - taylorfrancis.com
Hospitals are incorporating Medical Cyber-Physical Systems (MCPSs), which combine the
physical world, in which interoperable medical devices monitor a patient, with the cyber …

Towards a Hybrid Model for the Evaluation of Critical IT Systems

D Maček, I Magdalenie… - … European Conference on …, 2020 - search.proquest.com
Given that today's very complex and interconnected business processes meaningly rely on
Internet communication with other business entities, organizations are increasingly exposed …

Robust Review on Privacy and Security Issues in Present Day Attacks of Data Mining

PSS Nitin, T Sudha - … Conference on Intelligent Systems Design and …, 2020 - Springer
The Advancements in technology leads to various developments in both positive and
negative way. In data mining domain privacy and security are main concerns as they have …