[HTML][HTML] Insider threat detection in cyber-physical systems: a systematic literature review

MN Al-Mhiqani, T Alsboui, T Al-Shehari… - Computers and …, 2024 - Elsevier
The rapid expansion of cyber-physical systems (CPSs) has introduced new security
challenges, leading to the emergence of various threats, attacks, and controls aimed at …

{SAVIOR}: Securing autonomous vehicles with robust physical invariants

R Quinonez, J Giraldo, L Salazar, E Bauman… - 29th USENIX security …, 2020 - usenix.org
Autonomous Vehicles (AVs), including aerial, sea, and ground vehicles, assess their
environment with a variety of sensors and actuators that allow them to perform specific tasks …

TABOR: A graphical model-based approach for anomaly detection in industrial control systems

Q Lin, S Adepu, S Verwer, A Mathur - Proceedings of the 2018 on asia …, 2018 - dl.acm.org
Industrial Control Systems (ICS) such as water and power are critical to any society. Process
anomaly detection mechanisms have been proposed to protect such systems to minimize …

Distributed attack detection in a water treatment plant: Method and case study

S Adepu, A Mathur - IEEE Transactions on Dependable and …, 2018 - ieeexplore.ieee.org
The rise in attempted and successful attacks on critical infrastructure, such as power grid
and water treatment plants, has led to an urgent need for the creation and adoption of …

[PDF][PDF] A Systematic Map** Study on Security in Configurable Safety-Critical Systems Based on Product-Line Concepts.

R May, J Gautam, C Sharma, C Biermann, T Leich - ICSOFT, 2023 - researchgate.net
Safety-critical systems are becoming increasingly configurable. However, as the number of
features and configurations grows, the systems' complexity also increases, making cyber …

A lightweight privacy-preserving communication protocol for heterogeneous IoT environment

X Luo, L Yin, C Li, C Wang, F Fang, C Zhu… - IEEE Access, 2020 - ieeexplore.ieee.org
While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life,
the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing …

Learning-guided network fuzzing for testing cyber-physical system defences

Y Chen, CM Poskitt, J Sun, S Adepu… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
The threat of attack faced by cyber-physical systems (CPSs), especially when they play a
critical role in automating public infrastructure, has motivated research into a wide variety of …

Mini-me, you complete me! data-driven drone security via dnn-based approximate computing

A Ding, P Murthy, L Garcia, P Sun, M Chan… - Proceedings of the 24th …, 2021 - dl.acm.org
The safe operation of robotic aerial vehicles (RAV) requires effective security protection of
their controllers against cyber-physical attacks. The frequency and sophistication of past …

Temporal execution behavior for host anomaly detection in programmable logic controllers

D Formby, R Beyah - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Programmable logic controllers (PLCs) make up the majority of endpoints on industrial
control system (ICS) networks and are the vital bridge between the cyber and physical …

Recommendations for smart grid security risk management

V Lamba, N Šimková, B Rossi - Cyber-Physical Systems, 2019 - Taylor & Francis
Smart grids (SGs) represent a paradigm shift for the traditional electric power infrastructure
in terms of generation, transmission, and distribution of electricity in real time. The vast use …