Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

An experimental security analysis of an industrial robot controller

D Quarta, M Pogliani, M Polino, F Maggi… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Industrial robots, automated manufacturing, and efficient logistics processes are at the heart
of the upcoming fourth industrial revolution. While there are seminal studies on the …

Security of SCADA systems against cyber–physical attacks

L Fillatre, I Nikiforov, P Willett - IEEE Aerospace and …, 2017 - ieeexplore.ieee.org
Supervisory control and data acquisition (SCADA) systems are highly distributed systems
used to control and monitor geographically dispersed assets-often scattered over thousands …

Security of controlled manufacturing systems in the connected factory: The case of industrial robots

M Pogliani, D Quarta, M Polino, M Vittone… - Journal of Computer …, 2019 - Springer
In modern factories,“controlled” manufacturing systems, such as industrial robots, CNC
machines, or 3D printers, are often connected in a control network, together with a plethora …

Fault tolerant web service

D Liang, CL Fang, C Chen, F Lin - Tenth Asia-Pacific Software …, 2003 - ieeexplore.ieee.org
Zwass (1996) suggested that middleware and message service is one of the five
fundamental technologies used to realize electronic commerce (EC). The simple object …

[PDF][PDF] Stuxnet: Cyberwar revolution in military affairs

P Shakarian - 2011 - Citeseer
On June 17th, 2010, security researchers at a small Belarusian firm known as
VirusBlockAda identified malicious software (malware) that infected USB memory sticks. 1 In …

A statistical method for detecting cyber/physical attacks on SCADA systems

L Fillatre, I Nikiforov - 2014 IEEE Conference on Control …, 2014 - ieeexplore.ieee.org
This paper addresses the problem of detecting cyber/physical attacks on Supervisory
Control And Data Acquisition (SCADA) systems. The detection of cyber/physical attacks is …

Trade-offs in social and behavioral modeling in mobile networks

Y Altshuler, M Fire, N Aharony, Z Volkovich… - … DC, USA, April 2-5, 2013 …, 2013 - Springer
Mobile phones are quickly becoming the primary source for social, behavioral, and
environmental sensing and data collection. Today's smartphones are equipped with …

Sequential monitoring of SCADA systems against cyber/physical attacks

DO Van Long, L FILLATRE, I NIKIFOROV - IFAC-PapersOnLine, 2015 - Elsevier
The sequential monitoring of SCADA systems against cyber/physical attacks is considered
in this paper. The SCADA systems are described by the discrete-time state space models in …

[图书][B] Stealing reality: when criminals become data scientists (or vice versa)

Y Altshuler, N Aharony, Y Elovici, A Pentland… - 2013 - Springer
In this paper, we discuss the threat of malware targeted at extracting information about the
relationships in a real-world social network as well as characteristic information about the …