Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Insider threat detection in cyber-physical systems: a systematic literature review
The rapid expansion of cyber-physical systems (CPSs) has introduced new security
challenges, leading to the emergence of various threats, attacks, and controls aimed at …
challenges, leading to the emergence of various threats, attacks, and controls aimed at …
{SAVIOR}: Securing autonomous vehicles with robust physical invariants
Autonomous Vehicles (AVs), including aerial, sea, and ground vehicles, assess their
environment with a variety of sensors and actuators that allow them to perform specific tasks …
environment with a variety of sensors and actuators that allow them to perform specific tasks …
TABOR: A graphical model-based approach for anomaly detection in industrial control systems
Industrial Control Systems (ICS) such as water and power are critical to any society. Process
anomaly detection mechanisms have been proposed to protect such systems to minimize …
anomaly detection mechanisms have been proposed to protect such systems to minimize …
Distributed attack detection in a water treatment plant: Method and case study
The rise in attempted and successful attacks on critical infrastructure, such as power grid
and water treatment plants, has led to an urgent need for the creation and adoption of …
and water treatment plants, has led to an urgent need for the creation and adoption of …
[PDF][PDF] A Systematic Map** Study on Security in Configurable Safety-Critical Systems Based on Product-Line Concepts.
Safety-critical systems are becoming increasingly configurable. However, as the number of
features and configurations grows, the systems' complexity also increases, making cyber …
features and configurations grows, the systems' complexity also increases, making cyber …
A lightweight privacy-preserving communication protocol for heterogeneous IoT environment
While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life,
the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing …
the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing …
Learning-guided network fuzzing for testing cyber-physical system defences
The threat of attack faced by cyber-physical systems (CPSs), especially when they play a
critical role in automating public infrastructure, has motivated research into a wide variety of …
critical role in automating public infrastructure, has motivated research into a wide variety of …
Mini-me, you complete me! data-driven drone security via dnn-based approximate computing
The safe operation of robotic aerial vehicles (RAV) requires effective security protection of
their controllers against cyber-physical attacks. The frequency and sophistication of past …
their controllers against cyber-physical attacks. The frequency and sophistication of past …
Temporal execution behavior for host anomaly detection in programmable logic controllers
Programmable logic controllers (PLCs) make up the majority of endpoints on industrial
control system (ICS) networks and are the vital bridge between the cyber and physical …
control system (ICS) networks and are the vital bridge between the cyber and physical …
Recommendations for smart grid security risk management
Smart grids (SGs) represent a paradigm shift for the traditional electric power infrastructure
in terms of generation, transmission, and distribution of electricity in real time. The vast use …
in terms of generation, transmission, and distribution of electricity in real time. The vast use …