A survey on network security for cyber–physical systems: From threats to resilient design
Cyber-physical systems (CPS) are considered the integration of physical systems in the real
world and control software in computing systems. In CPS, the real world and the computing …
world and control software in computing systems. In CPS, the real world and the computing …
A survey on machine-learning based security design for cyber-physical systems
A cyber-physical system (CPS) is the integration of a physical system into the real world and
control applications in a computing system, interacting through a communications network …
control applications in a computing system, interacting through a communications network …
Cross-layer defense methods for jamming-resistant CBTC systems
Communication-based Train Control (CBTC) systems are the burgeoning directions for
develo** future train control systems. With the adoption of wireless communication and …
develo** future train control systems. With the adoption of wireless communication and …
A cross-layer defense method for blockchain empowered CBTC systems against data tampering attacks
Due to the high integration of wireless communication and networking technologies, the
communication-based train control (CBTC) systems are exposed to additional cyber-attack …
communication-based train control (CBTC) systems are exposed to additional cyber-attack …
Taxonomy and challenges of out-of-band signal injection attacks and defenses
Recent research has shown that the integrity of sensor measurements can be violated
through out-of-band signal injection attacks. These attacks target the conversion process …
through out-of-band signal injection attacks. These attacks target the conversion process …
Cyber-physical vulnerability analysis of communication-based train control
A cyber-physical system (CPS) is an entanglement of physical and computing systems by
real-time information exchange through networking, which can be considered as real-time …
real-time information exchange through networking, which can be considered as real-time …
A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities
B Alotaibi - Sensors, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things
The always-on, always-connected nature of smart home devices complicates Internet-of-
Things (IoT) security and privacy. Unlike traditional hosts, IoT devices constantly send …
Things (IoT) security and privacy. Unlike traditional hosts, IoT devices constantly send …
Data‐driven detection and identification of IoT‐enabled load‐altering attacks in power grids
Advances in edge computing are powering the development and deployment of Internet of
Things (IoT) systems to provide advanced services and resource efficiency. However, large …
Things (IoT) systems to provide advanced services and resource efficiency. However, large …
Fast IP hop** randomization to secure hop-by-hop access in SDN
Moving target defense (MTD) is useful for thwarting network reconnaissance and preventing
unauthorized access. While previous research in MTD focuses on protecting the endnodes …
unauthorized access. While previous research in MTD focuses on protecting the endnodes …