A systems and control perspective of CPS security
The comprehensive integration of instrumentation, communication, and control into physical
systems has led to the study of Cyber-Physical Systems (CPSs), a field that has recently …
systems has led to the study of Cyber-Physical Systems (CPSs), a field that has recently …
[PDF][PDF] Multi-factor authentication for secured financial transactions in cloud environment
D Prabakaran, S Ramachandran - CMC-Computers, Materials & …, 2022 - cdn.techscience.cn
The rise of the digital economy and the comfort of accessing by way of user mobile devices
expedite human endeavors in financial transactions over the Virtual Private Network (VPN) …
expedite human endeavors in financial transactions over the Virtual Private Network (VPN) …
5g and beyond private military communication: Trend, requirements, challenges and enablers
Communication networks are becoming increasingly important in military operations, with
task fields like time-critical targeting, covert special operations, command and control …
task fields like time-critical targeting, covert special operations, command and control …
Behavioral and game-theoretic security investments in interdependent systems modeled by attack graphs
In this article, we consider a system consisting of multiple interdependent assets, and a set
of defenders, each responsible for securing a subset of the assets against an attacker. The …
of defenders, each responsible for securing a subset of the assets against an attacker. The …
Data-driven resilient control for linear discrete-time multi-agent networks under unconfined cyber-attacks
In this paper, the resilient control for linear discrete-time multi-agent networks subjected to
unconfined cyber-attacks is investigated based on a data-driven method. Firstly, according …
unconfined cyber-attacks is investigated based on a data-driven method. Firstly, according …
Security of vehicle platooning: A game-theoretic approach
In this paper, we study the security of a vehicle platoon exposed to cyber attacks using a
game-theoretic approach. The platoon topologies under investigation are directed (called …
game-theoretic approach. The platoon topologies under investigation are directed (called …
A game-theoretic framework for security-aware sensor placement problem in networked control systems
This article studies the sensor placement problem in a leader–follower networked control
system for improving its security against cyber-physical attacks. In a zero-sum game, the …
system for improving its security against cyber-physical attacks. In a zero-sum game, the …
Learning-based attacks in cyber-physical systems
MJ Khojasteh, A Khina… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We introduce the problem of learning-based attacks in a simple abstraction of cyber-physical
systems—the case of a discrete-time, linear, time-invariant plant that may be subject to an …
systems—the case of a discrete-time, linear, time-invariant plant that may be subject to an …
Consensus of hybrid behavior for graphical coordination games
This brief is concerned with consensus of hybrid behavior for graphical coordination games.
We take into account a multi-agent system with two agent-unions that have various …
We take into account a multi-agent system with two agent-unions that have various …
Resilient cyberphysical systems and their application drivers: A technology roadmap
Cyberphysical systems (CPS) are ubiquitous in our personal and professional lives, and
they promise to dramatically improve micro-communities (eg, urban farms, hospitals), macro …
they promise to dramatically improve micro-communities (eg, urban farms, hospitals), macro …