Filters








47,653 Hits in 4.8 sec

Limitations on Observability of Effects in Cyber-Physical Systems [article]

Suresh K. Damodaran, Paul D. Rowe
2019 arXiv   pre-print
Observing the effects of these attacks is helpful in detecting them.  ...  Increased interconnectivity of Cyber-Physical Systems, by design or otherwise, increases the cyber attack surface and attack vectors.  ...  ACKNOWLEDGMENTS We thank Gabriel Pascualy for his work on the elevator. We are grateful to Hasan Cam for comments on an earlier version, and to the anonymous reviewers for their detailed comments.  ... 
arXiv:1903.09482v1 fatcat:twebcrxs5fhlbp3nmzo2hzkqe4

Effects of centralized and local PV plant control for voltage regulation in LV feeder based on cyber-physical simulations

Theis Bo RASMUSSEN, Guangya YANG, Arne Hejde NIELSEN, Zhaoyang DONG
2018 Journal of Modern Power Systems and Clean Energy  
Effects of centralized and local PV plant control for voltage regulation in LV feeder based on cyber-physical simulations.  ...  tion part of the cyber system, the immediate effect will be The second observation is based on the analysis of the on the performance  ... 
doi:10.1007/s40565-018-0445-x fatcat:kap5k2oyarfjxhbg3tv7d5yyrm

Cyberattacks: Does Physical Boundry Matter?

Qiu-Hong Wang, Seung-Hyun Kim
2009 International Conference on Information Systems  
Through an empirical study of cyber attacks across 62 countries during the period 2003-2007, we find little evidence on the spatial autocorrelation of cyber attacks at any week.  ...  The policy and managerial implication is that physical boundary should be an important factor in addressing strategic cyber attacks and their potential risks.  ...  Air Force Asian Office of Aerospace R&D (award FA4869-07-1-4046), the National University of Singapore Academic Research Fund (grant R-313-000-076-112 & R-253-000-067-133), and NUS School of Computing.  ... 
dblp:conf/icis/WangK09 fatcat:orbpkbusdfer5jadkkixtqgabm

Report of the Fourth International Workshop on Design Automation for Cyber-Physical Systems (DACPS) 2019

Mohammad Abdullah Al Faruque, Chung-Wei Lin
2019 IEEE design & test  
This is essen tial to observe the physical effects on chips and aid designers in designing powerefficient chips that are desired in cyberphysical systems. Prof.  ...  In this Fourth International Workshop on Design Automation for Cyber Physical Systems (DACPS), participants present stateoftheart research in the domain of design automation of cyberphysical systems and  ...  His research interests include the system-level design of Internet-of-Things (IoT), embedded systems, and cyber-physical systems (CPS), especially design automation methodologies, data-driven modeling  ... 
doi:10.1109/mdat.2019.2934361 fatcat:i5pmy5xxsneqbif6npzlzcvjwa

Physical indicators of cyber attacks against a rescue robot

Tuan Vuong, Avgoustinos Filippoupolitis, George Loukas, Diane Gan
2014 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS)  
The results show that the cyber attack's effects have physical features that can be used in order to improve the robot's robustness against this type of threat.  ...  The focus is on identifying physical indicators of an ongoing cyber attack, which can help to design more efficient detection and defense mechanisms.  ...  CONCLUSIONS AND FUTURE WORK In this paper we have presented our experimental results regarding the physical effects of a cyber attack on a rescue robot.  ... 
doi:10.1109/percomw.2014.6815228 dblp:conf/percom/VuongFLG14 fatcat:jn5egi7hlbb5phtczesweeygqy

A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures

Béla Genge, István Kiss, Piroska Haller
2015 International Journal of Critical Infrastructure Protection  
To address these challenges, this paper proposes a novel methodology for assessing the impact of cyber attacks on critical infrastructures.  ...  To address these challenges, this paper proposes a novel methodology for assessing the impact of cyber attacks on critical infrastructures.  ...  A cyber attack that causes substation-level bus faults in the IEEE 14-bus model is used to illustrate the effects of weighted observed variables on the impact rankings.  ... 
doi:10.1016/j.ijcip.2015.04.001 fatcat:6sjhlyumavdanp7g3h3gbwq2ra

Key terrain in cyberspace: Seeking the high ground

David Raymond, Tom Cross, Gregory Conti, Michael Nowatkowski
2014 2014 6th International Conference On Cyber Conflict (CyCon 2014)  
In this paper we deconstruct and analyze cyber key terrain, provide a generalized framework for critical analysis, and draw parallels between cyber and physical key terrain while providing examples of  ...  We will argue that key terrain in cyberspace exists at all of the cyberspace planes, which include the geographic, physical, logical, cyber persona, and supervisory planes [1].  ...  The idea of observing cyber terrain, while different from physical terrain, is still meaningful.  ... 
doi:10.1109/cycon.2014.6916409 dblp:conf/cycon/RaymondCCN14 fatcat:6ctm44aebreo7gdycqzlsc7d34

Anomaly Detection Methods for IIoT Networks

Luying Zhou, Huaqun Guo
2018 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)  
anomalies in the observed data of digital world.  ...  The paper further presents other anomaly detection methods that are specifically applicable to IIoT networks, as those methods exploit the deterministic features of the physical world in detecting the  ...  Cyber information anomaly detection algorithms generally do not concern the physical aspects of systems, while mainly focus on the collected data analysis to detect the deviations from earlier observations  ... 
doi:10.1109/soli.2018.8476769 fatcat:mmoyuzeb7vd67igmrhwlgjmtvu

Kinetic and Cyber [article]

Alexander Kott, Norbou Buchler, Kristin E. Schaefer
2015 arXiv   pre-print
As an example of differences, KSA often relies on commonly accepted, widely used organizing representation - map of the physical terrain of the battlefield.  ...  Far more is known about the SA in conventional military conflicts, or adversarial engagements, than in cyber ones.  ...  However, concerns about the difficulties of enabling effective collaboration are common in the world of cyber defense. On one hand, collaboration in cyber security teams can be very effective.  ... 
arXiv:1511.03531v1 fatcat:mcrlfzczhjenhbcp2cpm5ou5sq

Interfaces in Evolving Cyber-Physical Systems-of-Systems [chapter]

Bernhard Frömel, Hermann Kopetz
2016 Lecture Notes in Computer Science  
These legacy systems became cooperating Constituent Systems (CSs) of evolving Cyber-Physical Systems-of-Systems (CPSoSs) andby their physical and cyber interactiongive rise to new emergent services that  ...  In the past twenty years the view on how we engineer, operate and evolve independently owned and managed Cyber-Physical Systems (CPSs) in order to realize and optimize complex economical processes has  ...  Interfaces in Cyber-Physical Systems-of-Systems This section introduces interfaces in the architectural context of time-aware Cyber-Physical Systems-of-Systems (CPSoSs), discusses interface abstraction  ... 
doi:10.1007/978-3-319-47590-5_2 fatcat:tleiw7txlbhflgoo65ybxsrn2m

Modeling Data Flows with Network Calculus in Cyber-Physical Systems: Enabling Feature Analysis for Anomaly Detection Applications

Nicholas Jacobs, Shamina Hossain-McKenzie, Adam Summers
2021 Information  
Because of this, it is no longer sufficient to only study the physical system dynamics, but the cyber system must also be monitored as well to examine cyber-physical interactions and effects on the overall  ...  In this paper, we examine and develop models of data flows in communication networks of cyber-physical systems (CPSs) and explore how network calculus can be utilized to develop those models for CPSs,  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results  ... 
doi:10.3390/info12060255 fatcat:xmjs2eerbrh6lppvyybvwdbbe4

Cyber-Physical Security for Ongoing Smart Grid Initiatives: A survey

Chen Peng, Md Musabbir Hossain
2020 IET Cyber-Physical Systems  
state of component j in the one-time stage.  ...  Cyber-physical interdependency Cyber-physical interdependence of the modern power grid is a bidirectional connection between physical and cyber components in which the cyber component status affects or  ...  Acknowledgments This work was supported in part by the National Natural Science  ... 
doi:10.1049/iet-cps.2019.0039 fatcat:buj3j6zirfhuvpdkvok5kddg3q

Reliability Modeling for the Advanced Electric Power Grid: A Proposal for Doctoral Research

Ayman Z. Faza, Sahra Sedigh, Bruce M. McMillin
2009 2009 33rd Annual IEEE International Computer Software and Applications Conference  
We investigate several failure modes for devices that carry out cyber control of the grid, and examine the effect of their failure in terms of physical power flow in the grid.  ...  The advanced electric power grid is a cyber-physical system comprised of physical components such as power generators and transmission lines, and cyber components that control the operation of the grid  ...  Acknowledgment The authors wish to acknowledge the support of the Missouri S&T Intelligent Systems Center.  ... 
doi:10.1109/compsac.2009.104 dblp:conf/compsac/FazaSM09 fatcat:e7f2qabl7bc27hvyycgnwibkyq

BUILDING INDONESIA'S NATIONAL CYBER DEFENSE AND SECURITY TO FACE THE GLOBAL CYBER THREATS THROUGH INDONESIA SECURITY INCIDENT RESPONSE TEAM ON INTERNET INFRASTRUCTURE (ID-SIRTII)

Adi Rio Arianto, Gesti Anggraini
2019 Jurnal Pertahanan & Bela Negara  
regional and global cyber institutions; and (4) considering of the two "functionalism of cyber" also to form a structuralism of Indonesian National Defense and Security system in the cyber sector, nowdays  ...  "; and "the use of cyber for low-politics purposes (civil)"by the protection of civil activities in cyberspace; (2) in order to prevent the spread of national cyber crime, the implementation of the ID-SIRTII  ...  We could see the geometric effect and no limitation of the cyber world, hence become difficult to be handled. needed the limitation in Information Minister Number. 26/PER/M.Kominf, o/5/2007 in regards  ... 
doi:10.33172/jpbh.v9i1.515 fatcat:rv2xggu4wzc4pp6agy3sypzqyy

Modeling cascading failures and mitigation strategies in PMU based cyber-physical power systems

Yuqi HAN, Chuangxin GUO, Shiying MA, Dunwen SONG
2018 Journal of Modern Power Systems and Clean Energy  
This paper presents a model of cascading failures in cyber-physical power systems (CPPSs) based on an improved percolation theory, and then proposes failure mitigation strategies.  ...  The interdependencies and gap between the observable and controllable parts of the physical layer with the actual physical network are two fundamental reasons for first-order transition failures.  ...  , and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s40565-018-0407-3 fatcat:yuz3dutsajefdcbmkwoxto5er4
« Previous Showing results 1 — 15 out of 47,653 results