- Full text PDF available (2)
In this paper we consider the security aspects of Internet of Things (IoT) devices, which bridge the physical and virtual worlds. We propose a new taxonomy of attacks, which classifies them into four broad categories. The most interesting category (which we call functionality extension attacks) uses the designed functionality of the IoT device to achieve a… (More)
In this paper we introduce the new problem of finding the best way to protect a computer system against cyber and ransomware attacks by choosing an optimal backup scheme using k storage devices. While in standard backup schemes it is beneficial to backup as frequently as possible, in the case of sophisticated cyber attacks any attempt to connect a backup… (More)
We present systems of two coupled lasers and show experimentally and theoretically that they self-adjust their exchanged power to the minimal power required to phase-lock them, even when loss is inserted between them.