[HTML][HTML] A systematic literature review on wireless security testbeds in the cyber-physical realm

V Kampourakis, V Gkioulos, S Katsikas - Computers & Security, 2023 - Elsevier
Abstract The Cyber-Physical System (CPS) lies in the core of Industry 4.0, accelerating the
convergence of formerly barricaded operational technology systems with modern …

A systematic review of the state of cyber-security in water systems

N Tuptuk, P Hazell, J Watson, S Hailes - Water, 2021 - mdpi.com
Critical infrastructure systems are evolving from isolated bespoke systems to those that use
general-purpose computing hosts, IoT sensors, edge computing, wireless networks and …

An overview on denial-of-service attacks in control systems: Attack models and security analyses

A Cetinkaya, H Ishii, T Hayakawa - Entropy, 2019 - mdpi.com
In this paper, we provide an overview of recent research efforts on networked control
systems under denial-of-service attacks. Our goal is to discuss the utility of different attack …

Threat Modeling for Communication Security of IoT-Enabled Digital Logistics

AK Junejo, M Breza, JA McCann - Sensors, 2023 - mdpi.com
The modernization of logistics through the use of Wireless Sensor Network (WSN) Internet of
Things (IoT) devices promises great efficiencies. Sensor devices can provide real-time or …

Learning-based attacks in cyber-physical systems

MJ Khojasteh, A Khina… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We introduce the problem of learning-based attacks in a simple abstraction of cyber-physical
systems—the case of a discrete-time, linear, time-invariant plant that may be subject to an …

[PDF][PDF] Upgrading of legacy systems to cyber-physical systems

V Kutscher, J Olbort, O Anokhin… - Proceedings of TMCE …, 2020 - researchgate.net
In times of globalization of industrial production and increasing individualization of products,
there is a demand for flexible production systems that combine the virtual and the physical …

Detection of man-in-the-middle attacks in model-free reinforcement learning

R Rani, M Franceschetti - Learning for Dynamics and Control …, 2023 - proceedings.mlr.press
This paper proposes a Bellman Deviation algorithm for the detection of man-in-the-middle
(MITM) attacks occurring when an agent controls a Markov Decision Process (MDP) system …

XPC: Fast and reliable synchronous transmission protocols for 2-phase commit and 3-phase commit

A Spina, M Breza, N Dulay, J McCann - arXiv preprint arXiv:1910.09941, 2019 - arxiv.org
One of the major challenges for the engineering of wireless sensing systems is to improve
the software abstractions and frameworks that are available to programmers while ensuring …

Jamming-resilient control and communication framework for cyber physical systems

I Tomic, M Breza, JA McCann - 2019 - IET
The control and monitoring of large infrastructure installations is becoming smarter, cheaper
to run and easier to manage through the use of wireless sensor and actuator networks …

[PDF][PDF] A Systematic Review of the State of Cyber-Security in Water Systems. Water 2021, 13, 81

N Tuptuk, P Hazell, J Watson, S Hailes - 2021 - pdfs.semanticscholar.org
Critical infrastructure systems are evolving from isolated bespoke systems to those that use
general-purpose computing hosts, IoT sensors, edge computing, wireless networks and …