Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks
With widespread use of common-off-the-shelf components and the drive towards connection
with external environments, the real-time systems are facing more and more security …
with external environments, the real-time systems are facing more and more security …
Sensor anomaly detection in the industrial internet of things based on edge computing
In the industrial internet of things (IIoT), because thousands of pieces of hardware,
instruments, and various controllers are involved, the core problem is the sensors. Detection …
instruments, and various controllers are involved, the core problem is the sensors. Detection …
Developing and experimenting simulation model of DDoS attacks in IIoT networks using Python
A Hristov, G Pavlova, K Raynova - 2023 31st National …, 2023 - ieeexplore.ieee.org
The DDOS attack vector on a PLC in an automated process control system is investigated
and a simulation model for determining the DDOS attack vector on a PLC in an IIoT network …
and a simulation model for determining the DDOS attack vector on a PLC in an IIoT network …
Multicore resource isolation for deterministic, resilient and secure concurrent execution of safety-critical applications
Multicores increasingly deploy spatial execution of safety-critical applications that demand a
deterministic, resilient, and secure environment to meet the safety standards. However …
deterministic, resilient, and secure environment to meet the safety standards. However …
Securing Real-Time Systems using Schedule Reconfiguration
ZAH Hammadeh, M Hasan… - 2024 IEEE 27th …, 2024 - ieeexplore.ieee.org
Modern real-time systems are susceptible to cyber-attacks. The growing adoption of multi-
core platforms, where safety and non-safety critical tasks coexist, further introduces new …
core platforms, where safety and non-safety critical tasks coexist, further introduces new …
Optimizing Smart City Virtual Power Plants with V2G Integration for Improved Grid Resilience
Virtual Power Plant (VPP) is coming as the must need option for the modern-day electricity
grid to build a robust smart city framework, where electric vehicles (EV) will play a crucial …
grid to build a robust smart city framework, where electric vehicles (EV) will play a crucial …
You Can't Always Check What You Wanted: Selective Checking and Trusted Execution to Prevent False Actuations in Cyber-Physical Systems
Cyber-physical systems (CPS) are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. The limited resources in such systems …
commands that modify their physical behaviors. The limited resources in such systems …
A Hardware-Aware Application Execution Model in Mixed-Criticality Internet of Things
The Real-Time Internet of Things is an emerging technology intended to enable real-time
information communication and processing over a global network of devices at the edge …
information communication and processing over a global network of devices at the edge …
[PDF][PDF] Dominance of hardware firewalls and denial of firewall attacks (case study blacknurse attack)
TV Krishna, P Karthik - … Journal of Science and Research (IJSR), 2022 - researchgate.net
Network security is the most important aspect which concerns with protection of the data of
an organization and firewalls play a crucial role in this. The main goal of this paper is to …
an organization and firewalls play a crucial role in this. The main goal of this paper is to …
On scheduler side-channels in dynamic-priority real-time systems
While the existence of scheduler side-channels has been demonstrated recently for fixed-
priority real-time systems (RTS), there have been no similar explorations for dynamic-priority …
priority real-time systems (RTS), there have been no similar explorations for dynamic-priority …