Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of cyber attacks on cyber physical systems: Recent advances and challenges
A cyber physical system (CPS) is a complex system that integrates sensing, computation,
control and networking into physical processes and objects over Internet. It plays a key role …
control and networking into physical processes and objects over Internet. It plays a key role …
On the history of diagnosability and opacity in discrete event systems
This paper presents historical remarks on key projects and papers that led to the
development of a theory of event diagnosis for discrete event systems modeled by finite …
development of a theory of event diagnosis for discrete event systems modeled by finite …
Verification of state-based opacity using Petri nets
A system is said to be opaque if a given secret behavior remains opaque (uncertain) to an
intruder who can partially observe system activities. This work addresses the verification of …
intruder who can partially observe system activities. This work addresses the verification of …
Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations
R Su - Automatica, 2018 - Elsevier
One of the major challenges about cyber–physical systems is how to protect system integrity
from cyber attacks. There has been a large number of different types of attacks discussed in …
from cyber attacks. There has been a large number of different types of attacks discussed in …
Secure-by-construction synthesis of cyber-physical systems
Correct-by-construction synthesis is a cornerstone of the confluence of formal methods and
control theory towards designing safety-critical systems. Instead of following the time-tested …
control theory towards designing safety-critical systems. Instead of following the time-tested …
Analysis and control for resilience of discrete event systems: Fault diagnosis, opacity and cyber security
Abstract System resilience captures the ability of the system to withstand a major disruption
within acceptable performance degradation and to recover within an acceptable time frame …
within acceptable performance degradation and to recover within an acceptable time frame …
A new approach for the verification of infinite-step and K-step opacity using two-way observers
In the context of security analysis for information flow properties, where a potentially
malicious observer (intruder) tracks the observed behavior of a given system, infinite-step …
malicious observer (intruder) tracks the observed behavior of a given system, infinite-step …
A classification of cybersecurity strategies in the context of discrete event systems
In recent years, cybersecurity has received increasing attention due to the demand from a
large class of networked systems for resilience against cyberattacks that may compromise …
large class of networked systems for resilience against cyberattacks that may compromise …
Security of cyber-physical systems: Design of a security supervisor to thwart attacks
Cyber-physical systems (CPSs) integrate computing and communication capabilities to
monitor and control physical processes. In order to do so, communication networks are …
monitor and control physical processes. In order to do so, communication networks are …
Ensuring confidentiality of cyber-physical systems using event-based cryptography
One of the most important challenges for the application of cyber-physical systems (CPS) in
smart industries is ensuring its security against cyber attacks. In this paper, we consider that …
smart industries is ensuring its security against cyber attacks. In this paper, we consider that …