A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Taxonomy for description of cross-domain attacks on CPS
2013
Proceedings of the 2nd ACM international conference on High confidence networked systems - HiCoNS '13
In this paper, we propose a taxonomy for description of attacks on CPS. The proposed taxonomy is capable of representing both conventional cyber-attacks as well as cross-domain attacks. ...
The vulnerability of CPS to such cross-domain attacks has been practically proven by numerous examples, e.g., by the currently most famous Stuxnet attack. ...
The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the ...
doi:10.1145/2461446.2461465
dblp:conf/hicons/YampolskiyHKXS13
fatcat:y2mmg6nftjhahejhbqihpwtlfe
Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach
2012
2012 5th International Symposium on Resilient Control Systems
Finally, we outline the preliminary results of our work towards a Taxonomy of Cyber-Physical Attacks. ...
This creates multiple vectors for CPS-internal (i.e., within CPS) as well as for CPSexternal (i.e., between CPS itself and its environment) Cyber-Physical Attacks. ...
The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the ...
doi:10.1109/isrcs.2012.6309293
fatcat:5mmnygof2jeo3l5z3rqherto5q
Architecture and Its Vulnerabilities in Smart-Lighting Systems
[article]
2021
arXiv
pre-print
Industry 4.0 embodies one of the significant technological changes of this decade. ...
With the example of a Smart-lighting system, we create a dedicated unified taxonomy for the use case and analyze its distributed Smart-* architecture by multiple layer-based models. ...
ACKNOWLEDGMENTS We thank Systems S.r.l for the funding and support of this project under the "Industry 4.0 for the Smart-* (I4S)" project. ...
arXiv:2109.09171v1
fatcat:cqdcmpd27bgcjiv5zbszyprwjy
A review: towards practical attack taxonomy for industrial control systems
2018
International Journal of Engineering & Technology
This paper presents a comprehensive review of existing cyber-attack taxonomies available in the literature and evaluates these taxonomies based on defined criteria. ...
Therefore, there is a significant need to have a comprehensive understanding of various types of cyber-attacks and its classification associated with both Opera-tion Technology (OT) and Information Technology ...
Acknowledgement This research study is funded by TNB Seed Fund 2016 under a project 'R&D in Micro Cryptographic Engine for Protecting Data in SCADA Link'. ...
doi:10.14419/ijet.v7i2.14.12815
fatcat:wuqiungyhjhelchqcyy7stmkky
SecureCPS: Defending a nanosatellite cyber-physical system
2014
Sensors and Systems for Space Applications VII
Based on these assumptions, we have used Vanderbilt's Cyber Physical -Attack Description Language 1 (CP-ADL) to represent realistic attacks, analyze how these attacks propagate in the ARAPAIMA architecture ...
However, because a maneuvering nanosatellite can threaten high-value assets (HVA) on-orbit, it must provide a level of security typically reserved for HVAs. ...
Figure 3- 2 . 2 Mode-Specific Machine Learning Models
Figure 4 - 1 : 41 Taxonomy for description of cross-domain attacks on CPS (Based on [1])
Figure 4 - 2 : 42 Figure 4-2: Example of a machine-readable ...
doi:10.1117/12.2054162
fatcat:r4e4ehpoibaetjaqrwo7abpbbu
Embedded systems security: Threats, vulnerabilities, and attack taxonomy
2015
2015 13th Annual Conference on Privacy, Security and Trust (PST)
Moreover, based on the information, we derive an attack taxonomy for embedded systems. ...
Embedded systems are the driving force for technological development in many domains such as automotive, healthcare, and industrial control in the emerging post-PC era. ...
[21] placed their emphasis on how cyber attacks might influence the physical space and proposed a taxonomy that could be used to categorize cross-domain attacks as well. ...
doi:10.1109/pst.2015.7232966
dblp:conf/pst/PappMB15
fatcat:swgk42w5vnc7rduywvwfp6wlmi
Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities
[article]
2021
arXiv
pre-print
Further, we utilize this taxonomy to identify and highlight new characteristics and designs in each CPS domain. Also, we discuss the limitations and open problems of these methods. ...
However, due to the increasing complexity of CPSs and more sophisticated attacks, conventional anomaly detection methods, which face the growing volume of data and need domain-specific knowledge, cannot ...
., false data injection attacks) in different CPS domains (e.g., smart grid). ...
arXiv:2003.13213v2
fatcat:a43styztbrf5fjluknlcb6brxi
Towards a Framework for Assuring Cyber Physical System Security
2015
International Journal of Security and Its Applications
For the past few years, researchers are focusing their researches on different aspects of security of cyber physical systems. ...
Finally, a conclusion of this article is given. The prevalence and vulnerabilities of cyber physical systems draw the attention of both researchers and attackers. ...
ACKNOWLEDGEMENTS International Journal of Security and Its Applications Vol. 9, No. 3 (2015) ...
doi:10.14257/ijsia.2015.9.3.04
fatcat:asagegebibe43pnssbe6q7d42q
Active Learning: Using Bloom's Taxonomy to Support Critical Pedagogy
2017
International Journal for Cross-Disciplinary Subjects in Education
Critical pedagogy, on the other hand, focuses on empowering students to become agents of social change for greater equity and justice. ...
are necessary for critical pedagogy. ...
both attack and defend them. ...
doi:10.20533/ijcdse.2042.6364.2017.0429
fatcat:q46fci35jzegtazfabq4sz4qhy
A taxonomy and adversarial model for attacks against network log anonymization
2009
Proceedings of the 2009 ACM symposium on Applied Computing - SAC '09
In this paper, we present a taxonomy that relates similar kinds of attacks in a meaningful way. ...
We also present a new adversarial model which we can map into the taxonomy by the types of attacks that can be perpetrated by a particular adversary. ...
Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the NSF. ...
doi:10.1145/1529282.1529572
dblp:conf/sac/KingLS09
fatcat:sggjvtxeffebxdjnyzsmhvh45i
Artificial intelligence in cyber physical systems
2020
AI & Society: The Journal of Human-Centred Systems and Machine Intelligence
There is an increased attention on propositions on models, infrastructures and frameworks of IoT in both academic and technical papers. ...
The literature review is focused on identifying a conceptual framework for increasing resilience with AI through automation supporting both, a technical and human level. ...
In this study, we seek for improved understanding of CPS architecture and we seek that though a taxonomy of recent literature. ...
doi:10.1007/s00146-020-01049-0
pmid:32874020
pmcid:PMC7451704
fatcat:wxfbcnxiqjegvjomgtufglwfiu
Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey
2020
Future Internet
Despite the extent of the existing literature, several aspects of the subject still remain to be fully addressed. ...
Safeguarding both safety and cybersecurity is paramount to the smooth and trustworthy operation of contemporary cyber physical systems, many of which support critical functions and services. ...
Analysis In order to provide a comprehensive description of the current landscape of methods for the joint analysis of safety and security of CPSs, the following list of attributes is used. ...
doi:10.3390/fi12040065
fatcat:nvlmwxe75veszdkbguujuzbhhy
A Comprehensive Survey on Security and Privacy for Electronic Health Data
2021
International Journal of Environmental Research and Public Health
Based on the review, we obtained research taxonomy, security concerns, requirements, solutions, research trends, and open challenges for the components with strengths and weaknesses of the analyzed studies ...
Then, we reviewed recent security and privacy studies that focus on each component of the e-health systems. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/ijerph18189668
pmid:34574593
fatcat:nx7rjvy7tfczjbgmmpqgyiajuu
Cyber-attacks on the Oil & Gas sector: A survey on incident assessment and attack patterns
2020
IEEE Access
For each domain, we document and analyze verified attacks based on real-world reports and published demo attacks on systems. ...
In this paper, we survey cyber-attacks on all three domains of the oil and gas sector (upstream, midstream, downstream) starting from the early 90s up until 2020. ...
These generic surveys combine several domains when addressing CPS security. ...
doi:10.1109/access.2020.3007960
fatcat:6xjtbwigvnaplfjijtq7x45eyq
A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats
2022
Symmetry
Based on the given analysis, it can be concluded that the existing methodologies only relate superficially to the description of system models and threats, and it is necessary to develop a more complete ...
Information security is one of the most important attributes of distributed systems that often operate on unreliable networks. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/sym14030549
fatcat:s6vjpv6qonefjnx4egcmitvsoe
« Previous
Showing results 1 — 15 out of 1,466 results