Edge computing for cyber-physical systems: A systematic mapping study emphasizing trustworthiness

JMG Sánchez, N Jörgensen, M Törngren… - … -Physical Systems  …, 2022 - dl.acm.org
trustworthiness aspects including resilient fog system design (considering reliability and
availability and tradeoffs wrt latency, throughput, and security), fog systeminfrastructure or used …

Security and Trust in the 6G Era

V Ziegler, P Schneider, H Viswanathan, M Montag… - Ieee …, 2021 - ieeexplore.ieee.org
… architecture [2] in conjunction with softwarization and IT-based infrastructure operations as …
the ultimate goal of trustworthy 6G networks. We consider resilience against all kinds of cyber-…

[PDF][PDF] Developing cyber resilient systems: a systems security engineering approach

R Ross, V Pillitteri, R Graubart, D Bodeau, R McQuaid - 2019 - csrc.nist.gov
trustworthy, secure systems that are cyber resilient. Cyber resilient systems are systems that
… • An example of how cyber resiliency could be applied in the critical infrastructure based on …

Resilience estimation of critical infrastructure systems: Application of expert judgment

A Mottahedi, F Sereshki, M Ataei… - … Engineering & System …, 2021 - Elsevier
… Generally, when historical data are inadequate or unavailable, most developed resilience
assessments will not provide high reliable analysis. In such cases, the expert can provide …

Hardware-based solutions for trusted cloud computing

O Demigha, R Larguet - Computers & Security, 2021 - Elsevier
… access to the trusted cloud infrastructure, bypasses the trusted system software protection
mechanisms… They give the requirements of a tamper-resistant TEE for data in all their lifecycle. …

Cloud based intrusion detection and prevention system for industrial control systems using software defined networking

J Brugman, M Khan, S Kasera… - 2019 Resilience Week …, 2019 - ieeexplore.ieee.org
… With a programmable infrastructure it is easier to adapt to changes in cloud as solutions require
… ” (BYOD) threats where devices in the network are trusted. All traffic is forwarded through …

Cyber resilience protection for industrial internet of things: A software-defined networking approach

RF Babiceanu, R Seker - Computers in industry, 2019 - Elsevier
dependable services. This work follows the framework defined in [3] and brings together the
resilience and (cyber) security characteristics of a system … cyber-infrastructure. Towards that …

[HTML][HTML] Digital Twin conceptual framework for improving critical infrastructure resilience

E Brucherseifer, H Winter, A Mentges… - at …, 2021 - degruyter.com
… Requirement C3 requests the Digital Twin to be a reliable and resilient tool. As the core …
a challenge due to privacy concerns of surveillance systems and the complexity of the matter. …

A framework to define the relationship between cyber security and cloud performance

A Bhardwaj, S Goundar - Computer Fraud & Security, 2019 - Elsevier
… Performance monitoring systems usually process and … cloud infrastructure but has control
over operating systems, storage … enterprise risk and resilience for various global multinationals. …

Isolation in cloud computing infrastructures: new security challenges

MM Bazm, M Lacoste, M Südholt… - Annals of …, 2019 - Springer
… One of the major challenges in cloud infrastructures is trusted execution of software on …
in decentralized cloud infrastructures like Fog systems which aim to extend cloud services by …