Design Hands-on Lab Exercises for Cyber-physical Systems Security Education
- Computer ScienceJournal of The Colloquium for Information Systems Security Education
The execution of a free security testbed to replicate a vehicle’s network system and the implementation of this testbed via hands-on lab designed to introduce concepts of vehicle control systems are described.
The Powerful Use of AI in the Energy Sector: Intelligent Forecasting
This paper proposes a methodology to develop, deploy, and evaluate AI systems in the energy sector by understanding the power system measurements with physics, designing AI algorithms to forecast the need, developing robust and accountable AI methods, and creating reliable measures to evaluate the performance of the AI model.
Security for Emerging Miniaturized Wireless Biomedical Devices: Threat Modeling with Application to Case Studies
- Computer ScienceArXiv
A domain-specific qualitative-quantitative threat model dedicated to miniaturized wireless biomedical devices is introduced to help the architects and the manufacturers of MWBDs protect their emerging designs in a repeatable and structured manner.
ASiMOV: A self-protecting control application for the smart factory
- Computer Science, EngineeringFuture Gener. Comput. Syst.
Towards Secure Application Development: A Cyber Security Centred Holistic Approach
- Computer Science2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)
This paper considers whether the lack of automation, integration, and secure development approaches limit its adoption and a holistic approach to secure development is explored as a means to overcome the aforementioned challenges.
Process-Aware Model-based Intrusion Detection System on Filtering Approach: Further Investigations
- Computer Science, Engineering2020 IEEE International Conference on Industrial Technology (ICIT)
This paper proposes report filter modelling, optimization algorithms for speeding up the computation of the detection indicators and an implementation on a real testbed of the Security Approach based on Filter Execution IDS.
Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
- Computer Science2019 IEEE Conference on Information and Communication Technology
In this paper, a comprehensive overview, based on the main features of the systems including communication direction, control parameters, research target, scalability, security and safety, is presented and the computational complexity associated with the approaches presented is assessed.
A Physics-Based Attack Detection Technique in Cyber-Physical Systems: A Model Predictive Control Co-Design Approach
- Engineering, Mathematics2019 Australian & New Zealand Control Conference (ANZCC)
A novel approach to co-design controller and attack detector for nonlinear cyber-physical systems affected by false data injection (FDI) attack is proposed and an additional constraint requiring the future—in some steps ahead—trajectory of the system to remain in some time-invariant neighborhood of a properly designed reference trajectory is augmented.
SHOWING 1-10 OF 253 REFERENCES
Introduction to layers of protection analysis.
- BusinessJournal of hazardous materials
Securing vulnerable home IoT devices with an in-hub security manager
- Computer Science2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
A central security manager that is built on top of the smarthome's hub or gateway router and positioned to intercept all traffic to and from devices is proposed.
Research Challenges for the Security of Control Systems
- Computer Science, MathematicsHotSec
This paper proposes a new mathematical framework to analyze attacks against control systems and formulates specific research problems to detect attacks, and survive attacks.
CPS: stateful policy enforcement for control system device usage
- Computer ScienceACSAC
C2 is introduced, an enforcement mechanism for policies governing the usage of electromechanical devices, and takes measures to ensure unsafe behaviors are not caused when denying slightly erroneous yet legitimate operations.
The Past, Present and Future of Cyber-Physical Systems: A Focus on Models
- Computer ScienceSensors
Two projects show that deterministic CPS models with faithful physical realizations are possible and practical and shows that the timing precision of synchronous digital logic can be practically made available at the software level of abstraction.
Stealth Attacks and Protection Schemes for State Estimators in Power Systems
- Computer Science, Engineering2010 First IEEE International Conference on Smart Grid Communications
This work proposes two algorithms to place encrypted devices in the system such as to maximize their utility in terms of increased system security, and illustrates the effectiveness of these algorithms on two IEEE benchmark power networks under two attack and protection cost models.
Taking the integrated condition assessment system to the year 2010
- 13th Int. Ship Control Systems Symposium, Orlando, FL, 2003.
International Law in Cyberspace: The Koh Speech and the Tallinn Manual Justaposed
Examines the speech by Legal Advisor Harold Kon on Cyber Law in light of the Tallinn Manual on the International Law Appicable to Cyber Warfare.
Wired for War: The Robotics Revolution and Conflict in the 21st Century
- Political Science
Dr. Singer is a person who likes to tackle provocative topics, and does so in a very engaging and instructive manner. Subjects such as child soldiers and military outsourcing are subjects of his…