S Choi, JH Yun, BG Min - Proceedings of the 14th Cyber Security …, 2021 - dl.acm.org
To practically leverage a dataset, various attack situations should be created according to the user's objective and how realistic the generated attack sequence is should be …
Exchanging data between different systems enables us to build new smart services and digitise various areas of our daily life. This digitalisation leads to more efficient usage of …
YR Kirschner, M Walter, F Bossert… - 2023 IEEE 20th …, 2023 - ieeexplore.ieee.org
Software architectures consist of more and more connections to different components or elements. With the increased connection and exchange between different elements also the …
T Serru, N Nguyen, M Batteux, A Rauzy… - 23e Congrès de …, 2022 - hal.science
Cyber-Physical Systems (CPS) are safety critical as they can be at risk for their users and environment. It is thus paramount to assess all risks related to their use, including the risks of …
We present a taxonomy and a comprehensive attack tree model for Modbus/TCP protocol. The model includes Reconnaissance attacks, Man-In-The-Middle attacks, Denial of Service …
The COVID-19 emergency has seen a significant rise in cyber threats. Throughout the world, there has been a marked growth in ransomware, fake COVID-19 apps (FCA), and targeted …
In recent days, cyber-physical systems (CPS) have become a new wave generation of human life, exploiting various smart and intelligent uses of automotive systems. In these …
M Rosso, L Allodi, E Zambon… - 2024 IEEE European …, 2024 - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) are (connected) computer systems used to monitor and control physical processes using digital control programs. Cyberattacks targeting CPS can …
M Walter, R Reussner - European Conference on Software Architecture, 2022 - Springer
With the increase of connected systems and the ongoing digitalization of various aspects of our life, the security demands for software increase. Software architects should design a …