Model-based security engineering for cyber-physical systems: A systematic mapping study

PH Nguyen, S Ali, T Yue - Information and Software Technology, 2017 - Elsevier
Abstract Context Cyber-physical systems (CPSs) have emerged to be the next generation of
engineered systems driving the so-called fourth industrial revolution. CPSs are becoming …

Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network

S Sengan, V Subramaniyaswamy, SK Nair… - Future generation …, 2020 - Elsevier
Smart City (SC) is an upcoming concept incorporating 'Digitalized Associated City'and city
organization with the help of Information and Communication Technology (ICT). This novel …

Data security and threat modeling for smart city infrastructure

P Wang, A Ali, W Kelly - … conference on cyber security of smart …, 2015 - ieeexplore.ieee.org
Smart city opens up data with a wealth of information that brings innovation and connects
government, industry and citizens. Cyber insecurity, on the other hand has raised concerns …

Комплексный подход к обеспечению безопасности киберфизических систем на основе микроконтроллеров

ИВ Котенко, ДС Левшун, АА Чечулин… - Вопросы …, 2018 - cyberleninka.ru
Цель статьи заключается в разработке комплексного подхода к обеспечению
безопасности киберфизических систем на основе микроконтроллеров. Метод …

Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities

I Kotenko, K Izrailov, M Buinevich, I Saenko, R Shorey - Energies, 2023 - mdpi.com
This paper solves the problem of modeling the scheme for developing software systems,
which can be used in building solutions for secure energy networks. A development scheme …

[PDF][PDF] Design technique for secure embedded devices: Application for creation of integrated cyber-physical security system.

V Desnitsky, D Levshun, A Chechulin… - J. Wirel. Mob. Networks …, 2016 - isyou.info
As elements of complex information systems, embedded devices define informational and
physical connections between the level of software control of the system on the one hand …

Исследование открытых баз уязвимостей и оценка возможности их применения в системах анализа защищенности компьютерных сетей

АВ Федорченко, АА Чечулин… - Информационно …, 2014 - cyberleninka.ru
Постановка проблемы: ежегодно количество обнаруживаемых уязвимостей в
программных и аппаратных продуктах остается на высоком уровне. Вместе с этим …

Создание новых систем мониторинга и управления кибербезопасностью

ИВ Котенко, ИБ Саенко - Вестник Российской академии наук, 2014 - elibrary.ru
Научно-технический прогресс порождает две взаимосвязанные тенденции: с одной
стороны, новые техника и технологии открывают перед человеком небывалые …

Threat modeling in cyber-physical systems

EB Fernandez - 2016 IEEE 14th Intl Conf on Dependable …, 2016 - ieeexplore.ieee.org
To design a secure system we need to understand its possible threats, more specifically we
need to understand how the components of the architecture are compromised and used by …

[PDF][PDF] Integrated Repository of Security Information for Network Security Evaluation.

A Fedorchenko, IV Kotenko… - J. Wirel. Mob. Networks …, 2015 - scholar.archive.org
Security evaluation systems usually use various information sources to estimate computer
network security. One of the important tasks in these systems is integration and storage of …