[HTML][HTML] Industrial cyber-physical systems protection: A methodological review

R Canonico, G Sperlì - Computers & Security, 2023 - Elsevier
Ubiquitous utilization of Information and Communication Technologies in modern
manufacturing plants has transformed them into Cyber-Physical Systems (CPSs), making …

A practical physical watermarking approach to detect replay attacks in a CPS

CM Ahmed, VR Palleti, VK Mishra - Journal of Process Control, 2022 - Elsevier
Abstract Cyber Physical Systems (CPSs) are considered as an integration of computing,
networking, and physical processes. In such systems physical processes are monitored and …

A secure strategy for a cyber physical system with multi-sensor under linear deception attack

C Wang, J Huang, D Wang, F Li - Journal of the Franklin Institute, 2021 - Elsevier
Linear deception attacks can bypass the χ 2 detector by tampering with data. In this paper,
we provide a secure strategy for a cyber physical system (CPS) against such attacks. In …

NoiSense Print Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints

CM Ahmed, AP Mathur, M Ochoa - ACM Transactions on Privacy and …, 2020 - dl.acm.org
Fingerprinting of various physical and logical devices has been proposed for uniquely
identifying users or devices of mainstream IT systems such as PCs, laptops, and smart …

A tale of two testbeds: a comparative study of attack detection techniques in cps

S Athalye, CM Ahmed, J Zhou - … , CRITIS 2020, Bristol, UK, September 2–3 …, 2020 - Springer
Attack detection in cyber-physical systems (CPS) has been approached in several ways due
to the complex interactions among the physical and cyber components. A comprehensive …

工业控制系统关键组件安全风险综述

唐士杰, 袁方, 李俊, 丁勇, 王会勇 - 网络与信息安全学报, 2022 - infocomm-journal.com
随着现代信息技术与通信技术的快速发展, 工业控制(简称“工控”) 系统已经成为国家关键基础
设施的重要组成部分, 其安全性关系到国家的战略安全和社会稳定. 现代工控系统与互联网越来 …

Building a Unified Data Falsification Threat Landscape for Internet of Things/Cyberphysical Systems Applications

S Bhattacharjee, SK Das - Computer, 2023 - ieeexplore.ieee.org
We lay out a blueprint of a complete and parameterized threat landscape for data
falsification/false data injection attacks on telemetry data collected from Internet of …

Unsafe Events Detection in Smart Water Meter Infrastructure via Noise-Resilient Learning

A Oluyomi, S Abedzadeh… - 2024 ACM/IEEE 15th …, 2024 - ieeexplore.ieee.org
Residential smart water meters (SWMs) collect real-time water consumption data, enabling
automated billing and peak period forecasting. The presence of unsafe events is typically …

Evaluation of Cyber-Attacks in Networked Control Systems

T Kedar Vadde Hulgesh - 2023 - diva-portal.org
Abstract Networked Control Systems (NCS) form an essential role in numerous critical
infrastructures, including water distribution plants, water treatment plants, electric power …