Cybersecurity and Privacy in Cyber-Physical Systems最新文献

筛选
英文 中文
Detecting Pilot Contamination Attacks in Wireless Cyber-Physical Systems 检测无线网络物理系统中的先导污染攻击
Cybersecurity and Privacy in Cyber-Physical Systems Pub Date : 2019-05-01 DOI: 10.1201/9780429263897-8
D. Mihaylova, G. Iliev, Z. Valkova-Jarvis
{"title":"Detecting Pilot Contamination Attacks in Wireless Cyber-Physical Systems","authors":"D. Mihaylova, G. Iliev, Z. Valkova-Jarvis","doi":"10.1201/9780429263897-8","DOIUrl":"https://doi.org/10.1201/9780429263897-8","url":null,"abstract":"","PeriodicalId":115859,"journal":{"name":"Cybersecurity and Privacy in Cyber-Physical Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133321485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Profiteering in the Cloud of Smart Things 智能物云中的网络暴利
Cybersecurity and Privacy in Cyber-Physical Systems Pub Date : 2019-05-01 DOI: 10.1201/9780429263897-17
S. Nidhyananthan, J. S. Kumar, A. Kamaraj
{"title":"Cyber Profiteering in the Cloud of Smart Things","authors":"S. Nidhyananthan, J. S. Kumar, A. Kamaraj","doi":"10.1201/9780429263897-17","DOIUrl":"https://doi.org/10.1201/9780429263897-17","url":null,"abstract":"","PeriodicalId":115859,"journal":{"name":"Cybersecurity and Privacy in Cyber-Physical Systems","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132783262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber-Physical Systems: Vulnerabilities, Attacks and Threats 网络物理系统:漏洞、攻击和威胁
Cybersecurity and Privacy in Cyber-Physical Systems Pub Date : 2019-05-01 DOI: 10.1201/9780429263897-1
Yassine Maleh, M. Shojafar, A. Darwish, A. Haqiq
{"title":"Cyber-Physical Systems: Vulnerabilities, Attacks and Threats","authors":"Yassine Maleh, M. Shojafar, A. Darwish, A. Haqiq","doi":"10.1201/9780429263897-1","DOIUrl":"https://doi.org/10.1201/9780429263897-1","url":null,"abstract":"","PeriodicalId":115859,"journal":{"name":"Cybersecurity and Privacy in Cyber-Physical Systems","volume":"2003 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125783333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDoS Defense in SDN-Based Cyber-Physical Cloud 基于sdn的网络物理云DDoS防御
Cybersecurity and Privacy in Cyber-Physical Systems Pub Date : 2019-05-01 DOI: 10.1201/9780429263897-7
Safaa Mahrach, A. Haqiq
{"title":"DDoS Defense in SDN-Based Cyber-Physical Cloud","authors":"Safaa Mahrach, A. Haqiq","doi":"10.1201/9780429263897-7","DOIUrl":"https://doi.org/10.1201/9780429263897-7","url":null,"abstract":"","PeriodicalId":115859,"journal":{"name":"Cybersecurity and Privacy in Cyber-Physical Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116667894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluating the Reliability of Digital Forensics Tools for Cyber-Physical Systems 评估网络物理系统数字取证工具的可靠性
Cybersecurity and Privacy in Cyber-Physical Systems Pub Date : 2019-05-01 DOI: 10.1201/9780429263897-15
Precilla M. Dimpe, Okuthe P. Kogeda
{"title":"Evaluating the Reliability of Digital Forensics Tools for Cyber-Physical Systems","authors":"Precilla M. Dimpe, Okuthe P. Kogeda","doi":"10.1201/9780429263897-15","DOIUrl":"https://doi.org/10.1201/9780429263897-15","url":null,"abstract":"","PeriodicalId":115859,"journal":{"name":"Cybersecurity and Privacy in Cyber-Physical Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123879964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Searching for IoT Resources in Intelligent Transportation Cyberspace (T-CPS)—Requirements, Use-Cases and Security Aspects 在智能交通网络空间(T-CPS)中寻找物联网资源——需求、用例和安全方面
Cybersecurity and Privacy in Cyber-Physical Systems Pub Date : 2019-05-01 DOI: 10.1201/9780429263897-13
M. Hussain, M. S. Alam, M. Beg, R. Ali
{"title":"Searching for IoT Resources in Intelligent Transportation Cyberspace (T-CPS)—Requirements, Use-Cases and Security Aspects","authors":"M. Hussain, M. S. Alam, M. Beg, R. Ali","doi":"10.1201/9780429263897-13","DOIUrl":"https://doi.org/10.1201/9780429263897-13","url":null,"abstract":"","PeriodicalId":115859,"journal":{"name":"Cybersecurity and Privacy in Cyber-Physical Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129311489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Laboratory Exercises to Accompany Industrial Control and Embedded Systems Security Curriculum Modules 伴随工业控制和嵌入式系统安全课程模块的实验室练习
Cybersecurity and Privacy in Cyber-Physical Systems Pub Date : 1900-01-01 DOI: 10.1201/9780429263897-9
Guillermo A. Francia, J. Snellen, Gretchen M. Richards
{"title":"Laboratory Exercises to Accompany Industrial Control and Embedded Systems Security Curriculum Modules","authors":"Guillermo A. Francia, J. Snellen, Gretchen M. Richards","doi":"10.1201/9780429263897-9","DOIUrl":"https://doi.org/10.1201/9780429263897-9","url":null,"abstract":"The daily intrusion attempts and attacks on industrial control systems (ICS) and embedded systems (ES) underscore the criticality of the protection of our Critical Infrastructures (CIs). As recent as mid-July 2018, numerous reports on the infiltration of US utility control rooms by Russian hackers have been published. These successful infiltration and possible manipulation of the utility companies could easily translate to a devastating attack on our nation’s power grid and, consequently, our economy and well-being. Indeed, the need to secure the control and embedded systems which operate our CIs has never been so pronounced. In our attempt to address this critical need, we designed, developed and implemented ICS and ES security curriculum modules with pertinent hands-on laboratory exercises that can be freely adopted across the national setting. This paper describes in detail the modules and the accompanying exercises and proposes future enhancements and extensions to these pedagogical instruments. It highlights the interaction between control and embedded systems security with Presidential Policy Directive 8the National Preparedness Plan (NPP), cyber risk management, incident handling. To establish the premise the laboratory exercises were developed. This paper outlines the description and content of the modules in the areas of (1) Industrial Control Systems (ICS) Security, (2) embedded systems (ES), and (3) guidelines, standards, and policy. The ICS security modules cover the predominant ICS protocols, ladder logic programming, Human Machine Interface (HMI), defensive techniques, ICS reconnaissance, vulnerability assessment, Intrusion detection, and penetration testing. The ES security modules include topics such as secure firmware programming and authentication mechanisms. In the guidelines, standards, and policy section, the topics covered by the modules include the NPP as it relates to CI protection, risk management, system protection and policy design, and managing operations and controls. An overview of the various hands-on exercises that accompany the course modules is also presented. Further, to evaluate the effectiveness of the pedagogical materials, an initial evaluation was conducted and the survey data were collected, analyzed, and presented. The paper concludes with future enhancements and directives on opportunities for module extensions and course adoption.","PeriodicalId":115859,"journal":{"name":"Cybersecurity and Privacy in Cyber-Physical Systems","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121799458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信