Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations

JPA Yaacoub, HN Noura, O Salman, A Chehab - Internet of Things, 2022 - Elsevier
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …

[图书][B] Cyber war versus cyber realities: Cyber conflict in the international system

B Valeriano, RC Maness - 2015 - books.google.com
In 2011, the United States government declared a cyber attack as equal to an act of war,
punishable with conventional military means. Cyber operations, cyber crime, and other …

Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective

M Asiri, N Saxena, R Gjomemo, P Burnap - ACM transactions on cyber …, 2023 - dl.acm.org
Numerous sophisticated and nation-state attacks on Industrial Control Systems (ICSs) have
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …

Cyber attacks in cyber-physical microgrid systems: A comprehensive review

S Suprabhath Koduru, VSP Machina, S Madichetty - Energies, 2023 - mdpi.com
The importance of and need for cyber security have increased in the last decade. The critical
infrastructure of the country, modeled with cyber-physical systems (CPS), is becoming …

A stealthy false command injection attack on modbus based scada systems

W Alsabbagh, S Amogbonjaye… - 2023 IEEE 20th …, 2023 - ieeexplore.ieee.org
Modbus is a widely-used industrial protocol in Supervisory Control and Data Acquisition
(SCADA) systems for different purposes such as controlling remote devices, monitoring …

Detection of cyber attacks in grid-tied PV systems using dynamic watermarking

HAJ Ibrahim, J Kim, JA Ramos-Ruiz… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
In this article an active defense mechanism for detecting cyber-attacks on a grid-tied PV
system is discussed. The proposed defense mechanism introduces a unique random signal …

Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations

JPA Yaacoub, HN Noura, O Salman… - arXiv preprint arXiv …, 2021 - arxiv.org
The number of cyber attacks has increased tremendously in the last few years. This resulted
into both human and financial losses at the individual and organization levels. Recently …

The role of malware in reported cyber espionage: a review of the impact and mechanism

G Wangen - Information, 2015 - mdpi.com
The recent emergence of the targeted use of malware in cyber espionage versus industry
requires a systematic review for better understanding of its impact and mechanism. This …

[PDF][PDF] Vulnerabilities and cyberspace: A new kind of crises

B Van den Berg, S Kuipers - Oxford Research Encyclopedia of …, 2022 - researchgate.net
While cyberspace has become central to all vital processes in the global economy and
people's social lives, it also carries a wide variety of risks. Framing these risks is no easy …