Differential privacy techniques for cyber physical systems: A survey

MU Hassan, MH Rehmani… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …

A survey of physics-based attack detection in cyber-physical systems

J Giraldo, D Urbina, A Cardenas, J Valente… - ACM Computing …, 2018 - dl.acm.org
Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of
research. In its basic form, a security monitor creates time-series models of sensor readings …

Survey in smart grid and smart home security: Issues, challenges and countermeasures

N Komninos, E Philippou… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
The electricity industry is now at the verge of a new era—an era that promises, through the
evolution of the existing electrical grids to smart grids, more efficient and effective power …

Security and privacy in cyber-physical systems: A survey of surveys

J Giraldo, E Sarkar, AA Cardenas… - IEEE Design & …, 2017 - ieeexplore.ieee.org
The following is a survey on surveys and may help the interested reader to find a way
through the jungle of literature on the security and CPS topics out there already. In order to …

Smart grid cyber-physical systems: Communication technologies, standards and challenges

AV Jha, B Appasani, AN Ghazali, P Pattanayak… - Wireless …, 2021 - Springer
The recent developments in embedded system design and communication technologies
popularized the adaption of the cyber-physical system (CPS) for practical applications. A …

Smart grid energy fraud detection using artificial neural networks

V Ford, A Siraj, W Eberle - 2014 IEEE symposium on …, 2014 - ieeexplore.ieee.org
Energy fraud detection is a critical aspect of smart grid security and privacy preservation.
Machine learning and data mining have been widely used by researchers for extensive …

M2M security: Challenges and solutions

A Barki, A Bouabdallah, S Gharout… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of
attention in both industrial and academic sectors, and which is expected to grow in the next …

Differential privacy for IoT-enabled critical infrastructure: A comprehensive survey

MA Husnoo, A Anwar, RK Chakrabortty, R Doss… - IEEE …, 2021 - ieeexplore.ieee.org
The rapid evolution of the Internet of Things (IoT) paradigm during the last decade has lead
to its adoption in critical infrastructure. However, the multitude of benefits that are derived …

A scalable scheme for privacy-preserving aggregation of time-series data

M Joye, B Libert - Financial Cryptography and Data Security: 17th …, 2013 - Springer
Suppose that a set of multiple users uploads in every time period encrypted values of some
data. The considered problem is how an untrusted data aggregator can compute the sum of …

On the performance of distributed and cloud-based demand response in smart grid

MH Yaghmaee, A Leon-Garcia… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
By locally solving an optimization problem and broadcasting an update message over the
underlying communication infrastructure, demand response program based on the …