- R. Akella, H. Tang, and B. McMillin. Analysis of information flow security in cyber-physical systems. International Journal of Critical Infrastructure Protection, 3-4:157-173, December 2010.Google ScholarCross Ref
- A. Faza, S. Sedigh, and B. McMillin. Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Failure. In Proc. of the Int'l Conf. on Computer Safety, Reliability and Security (SAFECOMP'09), pages 257-269, September 2009. Google ScholarDigital Library
- C. Gunter and et. al. Trustworthy cyber-infrastructure for power. In TAS 2006 Workshop on Research Directions for Security and Networking in Critical Real-Time and Embedded Systems (CRTES '06), San Jose, CA, USA, April 4 2006.Google Scholar
- A. Huang. Renewable energy system research and education at the NSF FREEDM systems center. In Power & Energy Society General Meeting, 2009. PES '09. IEEE, pages 1-6, July 2009.Google ScholarCross Ref
- E. A. Lee. Position Paper: Cyber-Physical Systems - Are Computing Foundations Adequate? In NSF Workshop On Cyber-Physical Systems: Research Motivation, Techniques and Roadmap, October 16 - 17, 2006.Google Scholar
- F. B. Schneider. Enforceable security policies. ACM Transactions on Information and System Security TISSEC, 3(1):30-50, 2000. Google ScholarDigital Library
- V. Srinivasan, J. Stankovic, and K. Whitehouse. Protecting your daily in-home activity information from a wireless snooping attack. In UbiComp '08: Proceedings of the 10th international conference on Ubiquitous computing, pages 202-211, New York, NY, USA, 2008. ACM. Google ScholarDigital Library
- Information flow security in cyber-physical systems
Recommendations
Security analysis for cyber-physical systems against stealthy cyber attacks
CERIAS '13: Proceedings of the 14th Annual Information Security SymposiumSecurity of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is difficult to describe them systematically. In this paper, instead of identifying a specific ...
Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
VLSID '16: Proceedings of the 2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID)Summary form only. Most critical infrastructures such as the power grid, railway or air traffic control, industrial automation in manufacturing, water/sewage infrastructure, banking system, etc., are cyber physical systems (CPS). Since continued ...
Modeling and control of Cyber-Physical Systems subject to cyber attacks: A survey of recent advances and challenges
Highlights- In general, the cyber-attacks in the literature can be classified into three main types: denial of service (DoS) attacks, deception attacks, and replay ...
AbstractCyber Physical Systems (CPS) are almost everywhere; they can be accessed and controlled remotely. These features make them more vulnerable to cyber attacks. Since these systems provide critical services, having them under attack would ...
Comments