2023
DOI: 10.1007/978-3-031-25460-4_24
|View full text |Cite
|
Sign up to set email alerts
|

A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…Additionally, the systems are getting more complex, integrating systems of systems, which makes it difficult to ensure security and recover in case of security attacks. Traditional static methods for IoT security can not handle this level of complexity [17], [18], [19].…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, the systems are getting more complex, integrating systems of systems, which makes it difficult to ensure security and recover in case of security attacks. Traditional static methods for IoT security can not handle this level of complexity [17], [18], [19].…”
Section: Introductionmentioning
confidence: 99%
“…], Radoglou-Grammatikis et al[97] Radoglou-Grammatikis et al[98], Rahmadika et al[99], Ram and Kumar[100], Rao et al[101], Rao et al[102], Ravi et al[103], Rehman et al[104], Saba[105], Saheed and Arowolo[106], Said et al[107], Salem and Mehaoua[108], Schneble and Thamilarasu[109], Sehatbakhsh et al[110], Sharma et al[111], Singh et al[112], Siniosoglou et al[113], Spegni et al[114], Tabassum et al[115], Tahir et al[116], Thamilarasu et al[117], Thamilarasu et al[24], Thapa et al[118], Toor et al[119], Wa Umba et al[120], Wagan et al [121], Wahab et al [122], Wang et al [123], Yan et al [124], Zaabar et al [125], Zachos et al [126], Zubair et al [127] 99 Specification-based Abdulhammed et al [128], Choudhary et al [129], Fang et al [130], Mitchell and Chen [29], Mitchell and Chen [131], Li et al [132], Raiyat Aliabadi et al [133], You et al [134], Zhang et al [135] 9 Signature-based Boujrad et al [136], Meng et al [25], Mpungu et al [137], Zhang et al [138] 4 Hybrid Begli et al [139], Chen et al [140], Dupont et al [141], Meng et al [142], Kolokotronis et al [143], Lakka et al [144], Tariq et al [145] 7 researchers substantiate why their approach works best (e.g., Saheed et al with their swarm-based approach [106]), others focus on optimizing parts of their approach. E.g., Priya et al measure the benefits of different dimensionality reduction approaches [96].…”
mentioning
confidence: 99%