A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Limitations on Observability of Effects in Cyber-Physical Systems
[article]
2019
arXiv
pre-print
Observing the effects of these attacks is helpful in detecting them. ...
Increased interconnectivity of Cyber-Physical Systems, by design or otherwise, increases the cyber attack surface and attack vectors. ...
ACKNOWLEDGMENTS We thank Gabriel Pascualy for his work on the elevator. We are grateful to Hasan Cam for comments on an earlier version, and to the anonymous reviewers for their detailed comments. ...
arXiv:1903.09482v1
fatcat:twebcrxs5fhlbp3nmzo2hzkqe4
Effects of centralized and local PV plant control for voltage regulation in LV feeder based on cyber-physical simulations
2018
Journal of Modern Power Systems and Clean Energy
Effects of centralized and local PV plant control
for voltage regulation in LV feeder based on cyber-physical simulations. ...
tion part of the cyber system, the immediate effect will be
The second observation is based on the analysis of the
on the performance ...
doi:10.1007/s40565-018-0445-x
fatcat:kap5k2oyarfjxhbg3tv7d5yyrm
Cyberattacks: Does Physical Boundry Matter?
2009
International Conference on Information Systems
Through an empirical study of cyber attacks across 62 countries during the period 2003-2007, we find little evidence on the spatial autocorrelation of cyber attacks at any week. ...
The policy and managerial implication is that physical boundary should be an important factor in addressing strategic cyber attacks and their potential risks. ...
Air Force Asian Office of Aerospace R&D (award FA4869-07-1-4046), the National University of Singapore Academic Research Fund (grant R-313-000-076-112 & R-253-000-067-133), and NUS School of Computing. ...
dblp:conf/icis/WangK09
fatcat:orbpkbusdfer5jadkkixtqgabm
Report of the Fourth International Workshop on Design Automation for Cyber-Physical Systems (DACPS) 2019
2019
IEEE design & test
This is essen tial to observe the physical effects on chips and aid designers in designing powerefficient chips that are desired in cyberphysical systems. Prof. ...
In this Fourth International Workshop on Design Automation for Cyber Physical Systems (DACPS), participants present stateoftheart research in the domain of design automation of cyberphysical systems and ...
His research interests include the system-level design of Internet-of-Things (IoT), embedded systems, and cyber-physical systems (CPS), especially design automation methodologies, data-driven modeling ...
doi:10.1109/mdat.2019.2934361
fatcat:i5pmy5xxsneqbif6npzlzcvjwa
Physical indicators of cyber attacks against a rescue robot
2014
2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS)
The results show that the cyber attack's effects have physical features that can be used in order to improve the robot's robustness against this type of threat. ...
The focus is on identifying physical indicators of an ongoing cyber attack, which can help to design more efficient detection and defense mechanisms. ...
CONCLUSIONS AND FUTURE WORK In this paper we have presented our experimental results regarding the physical effects of a cyber attack on a rescue robot. ...
doi:10.1109/percomw.2014.6815228
dblp:conf/percom/VuongFLG14
fatcat:jn5egi7hlbb5phtczesweeygqy
A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures
2015
International Journal of Critical Infrastructure Protection
To address these challenges, this paper proposes a novel methodology for assessing the impact of cyber attacks on critical infrastructures. ...
To address these challenges, this paper proposes a novel methodology for assessing the impact of cyber attacks on critical infrastructures. ...
A cyber attack that causes substation-level bus faults in the IEEE 14-bus model is used to illustrate the effects of weighted observed variables on the impact rankings. ...
doi:10.1016/j.ijcip.2015.04.001
fatcat:6sjhlyumavdanp7g3h3gbwq2ra
Key terrain in cyberspace: Seeking the high ground
2014
2014 6th International Conference On Cyber Conflict (CyCon 2014)
In this paper we deconstruct and analyze cyber key terrain, provide a generalized framework for critical analysis, and draw parallels between cyber and physical key terrain while providing examples of ...
We will argue that key terrain in cyberspace exists at all of the cyberspace planes, which include the geographic, physical, logical, cyber persona, and supervisory planes [1]. ...
The idea of observing cyber terrain, while different from physical terrain, is still meaningful. ...
doi:10.1109/cycon.2014.6916409
dblp:conf/cycon/RaymondCCN14
fatcat:6ctm44aebreo7gdycqzlsc7d34
Anomaly Detection Methods for IIoT Networks
2018
2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)
anomalies in the observed data of digital world. ...
The paper further presents other anomaly detection methods that are specifically applicable to IIoT networks, as those methods exploit the deterministic features of the physical world in detecting the ...
Cyber information anomaly detection algorithms generally do not concern the physical aspects of systems, while mainly focus on the collected data analysis to detect the deviations from earlier observations ...
doi:10.1109/soli.2018.8476769
fatcat:mmoyuzeb7vd67igmrhwlgjmtvu
Kinetic and Cyber
[article]
2015
arXiv
pre-print
As an example of differences, KSA often relies on commonly accepted, widely used organizing representation - map of the physical terrain of the battlefield. ...
Far more is known about the SA in conventional military conflicts, or adversarial engagements, than in cyber ones. ...
However, concerns about the difficulties of enabling effective collaboration are common in the world of cyber defense. On one hand, collaboration in cyber security teams can be very effective. ...
arXiv:1511.03531v1
fatcat:mcrlfzczhjenhbcp2cpm5ou5sq
Interfaces in Evolving Cyber-Physical Systems-of-Systems
[chapter]
2016
Lecture Notes in Computer Science
These legacy systems became cooperating Constituent Systems (CSs) of evolving Cyber-Physical Systems-of-Systems (CPSoSs) andby their physical and cyber interactiongive rise to new emergent services that ...
In the past twenty years the view on how we engineer, operate and evolve independently owned and managed Cyber-Physical Systems (CPSs) in order to realize and optimize complex economical processes has ...
Interfaces in Cyber-Physical Systems-of-Systems This section introduces interfaces in the architectural context of time-aware Cyber-Physical Systems-of-Systems (CPSoSs), discusses interface abstraction ...
doi:10.1007/978-3-319-47590-5_2
fatcat:tleiw7txlbhflgoo65ybxsrn2m
Modeling Data Flows with Network Calculus in Cyber-Physical Systems: Enabling Feature Analysis for Anomaly Detection Applications
2021
Information
Because of this, it is no longer sufficient to only study the physical system dynamics, but the cyber system must also be monitored as well to examine cyber-physical interactions and effects on the overall ...
In this paper, we examine and develop models of data flows in communication networks of cyber-physical systems (CPSs) and explore how network calculus can be utilized to develop those models for CPSs, ...
The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results ...
doi:10.3390/info12060255
fatcat:xmjs2eerbrh6lppvyybvwdbbe4
Cyber-Physical Security for Ongoing Smart Grid Initiatives: A survey
2020
IET Cyber-Physical Systems
state of component j in the one-time stage. ...
Cyber-physical interdependency Cyber-physical interdependence of the modern power grid is a bidirectional connection between physical and cyber components in which the cyber component status affects or ...
Acknowledgments This work was supported in part by the National Natural Science ...
doi:10.1049/iet-cps.2019.0039
fatcat:buj3j6zirfhuvpdkvok5kddg3q
Reliability Modeling for the Advanced Electric Power Grid: A Proposal for Doctoral Research
2009
2009 33rd Annual IEEE International Computer Software and Applications Conference
We investigate several failure modes for devices that carry out cyber control of the grid, and examine the effect of their failure in terms of physical power flow in the grid. ...
The advanced electric power grid is a cyber-physical system comprised of physical components such as power generators and transmission lines, and cyber components that control the operation of the grid ...
Acknowledgment The authors wish to acknowledge the support of the Missouri S&T Intelligent Systems Center. ...
doi:10.1109/compsac.2009.104
dblp:conf/compsac/FazaSM09
fatcat:e7f2qabl7bc27hvyycgnwibkyq
BUILDING INDONESIA'S NATIONAL CYBER DEFENSE AND SECURITY TO FACE THE GLOBAL CYBER THREATS THROUGH INDONESIA SECURITY INCIDENT RESPONSE TEAM ON INTERNET INFRASTRUCTURE (ID-SIRTII)
2019
Jurnal Pertahanan & Bela Negara
regional and global cyber institutions; and (4) considering of the two "functionalism of cyber" also to form a structuralism of Indonesian National Defense and Security system in the cyber sector, nowdays ...
"; and "the use of cyber for low-politics purposes (civil)"by the protection of civil activities in cyberspace; (2) in order to prevent the spread of national cyber crime, the implementation of the ID-SIRTII ...
We could see the geometric effect and no limitation of the cyber world, hence become difficult to be handled. needed the limitation in Information Minister Number. 26/PER/M.Kominf, o/5/2007 in regards ...
doi:10.33172/jpbh.v9i1.515
fatcat:rv2xggu4wzc4pp6agy3sypzqyy
Modeling cascading failures and mitigation strategies in PMU based cyber-physical power systems
2018
Journal of Modern Power Systems and Clean Energy
This paper presents a model of cascading failures in cyber-physical power systems (CPPSs) based on an improved percolation theory, and then proposes failure mitigation strategies. ...
The interdependencies and gap between the observable and controllable parts of the physical layer with the actual physical network are two fundamental reasons for first-order transition failures. ...
, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. ...
doi:10.1007/s40565-018-0407-3
fatcat:yuz3dutsajefdcbmkwoxto5er4
« Previous
Showing results 1 — 15 out of 47,653 results