Cyber-physical systems security: Limitations, issues and future trends
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …
which can monitor and manipulate real objects and processes. They are closely related to …
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …
This resulted into both human and financial losses at all IoT levels especially individual and …
[图书][B] Cyber war versus cyber realities: Cyber conflict in the international system
B Valeriano, RC Maness - 2015 - books.google.com
In 2011, the United States government declared a cyber attack as equal to an act of war,
punishable with conventional military means. Cyber operations, cyber crime, and other …
punishable with conventional military means. Cyber operations, cyber crime, and other …
Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective
Numerous sophisticated and nation-state attacks on Industrial Control Systems (ICSs) have
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …
Cyber attacks in cyber-physical microgrid systems: A comprehensive review
S Suprabhath Koduru, VSP Machina, S Madichetty - Energies, 2023 - mdpi.com
The importance of and need for cyber security have increased in the last decade. The critical
infrastructure of the country, modeled with cyber-physical systems (CPS), is becoming …
infrastructure of the country, modeled with cyber-physical systems (CPS), is becoming …
A stealthy false command injection attack on modbus based scada systems
W Alsabbagh, S Amogbonjaye… - 2023 IEEE 20th …, 2023 - ieeexplore.ieee.org
Modbus is a widely-used industrial protocol in Supervisory Control and Data Acquisition
(SCADA) systems for different purposes such as controlling remote devices, monitoring …
(SCADA) systems for different purposes such as controlling remote devices, monitoring …
Detection of cyber attacks in grid-tied PV systems using dynamic watermarking
In this article an active defense mechanism for detecting cyber-attacks on a grid-tied PV
system is discussed. The proposed defense mechanism introduces a unique random signal …
system is discussed. The proposed defense mechanism introduces a unique random signal …
Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations
The number of cyber attacks has increased tremendously in the last few years. This resulted
into both human and financial losses at the individual and organization levels. Recently …
into both human and financial losses at the individual and organization levels. Recently …
The role of malware in reported cyber espionage: a review of the impact and mechanism
G Wangen - Information, 2015 - mdpi.com
The recent emergence of the targeted use of malware in cyber espionage versus industry
requires a systematic review for better understanding of its impact and mechanism. This …
requires a systematic review for better understanding of its impact and mechanism. This …
[PDF][PDF] Vulnerabilities and cyberspace: A new kind of crises
B Van den Berg, S Kuipers - Oxford Research Encyclopedia of …, 2022 - researchgate.net
While cyberspace has become central to all vital processes in the global economy and
people's social lives, it also carries a wide variety of risks. Framing these risks is no easy …
people's social lives, it also carries a wide variety of risks. Framing these risks is no easy …