Cyber-physical power system (CPPS): A review on modeling, simulation, and analysis with cyber security applications

RV Yohanandhan, RM Elavarasan, P Manoharan… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber-Physical System (CPS) is a new kind of digital technology that increases its attention
across academia, government, and industry sectors and covers a wide range of applications …

A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Risk assessment methodologies for the internet of medical things: A survey and comparative appraisal

V Malamas, F Chantzis, TK Dasaklis… - IEEE …, 2021 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) has revolutionized health care services by providing
significant benefits in terms of patient well being and relevant costs. Traditional risk …

A survey: To govern, protect, and detect security principles on internet of medical things (iomt)

TA Alhaj, SM Abdulla, MAE Iderss, AAA Ali… - IEEE …, 2022 - ieeexplore.ieee.org
The integration of medical equipment into the Internet of Things (IoT) led to the introduction
of Internet of Medical Things (IoMT). Variation of IoT devices have been equipped in medical …

Medical cyber-physical systems development: A forensics-driven approach

G Grispos, WB Glisson… - 2017 IEEE/ACM …, 2017 - ieeexplore.ieee.org
The synthesis of technology and the medical industry has partly contributed to the increasing
interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to …

" There are rabbit holes I want to go down that I'm not allowed to go down": An Investigation of Security Expert Threat Modeling Practices for Medical Devices

RE Thompson, M McLaughlin, C Powers… - 33rd USENIX Security …, 2024 - usenix.org
Threat modeling is considered an essential first step for" secure by design" development.
Significant prior work and industry efforts have created novel methods for this type of threat …

Threat assessment and risk analysis (TARA) for interoperable medical devices in the operating room inspired by the automotive industry

A Puder, J Henle, E Sax - Healthcare, 2023 - mdpi.com
Prevailing trends in the automotive and medical device industry, such as life cycle
overarching configurability, connectivity, and automation, require an adaption of …

[PDF][PDF] 攻击图技术应用研究综述

叶子维, 郭渊博, 王宸东, 琚安康 - Journal on Communications, 2017 - cww.cww.net.cn
攻击图是一种预判攻击者对目标网络发动攻击的方式和过程, 指导防御方对网络中的节点采取
针对性防御措施, 提高网络安全性的技术. 首先介绍了攻击图的基本构成, 列举了攻击图的几种 …

Attack graph implementation and visualization for cyber physical systems

M Ibrahim, Q Al-Hindawi, R Elhafiz, A Alsheikh… - Processes, 2019 - mdpi.com
Cyber-attacks threaten the safety of cyber physical systems (CPSs) as a result of the
existence of weaknesses in the multiple structural units constituting them. In this paper, three …

Cybersecurity threat intelligence augmentation and embedding improvement-a healthcare usecase

M Sills, P Ranade, S Mittal - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The implementation of Internet of Things (IoT) devices in medical environments, has
introduced a growing list of security vulnerabilities and threats. The lack of an extensible big …