2010
DOI: 10.2172/978289
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity through Real-Time Distributed Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(21 citation statements)
references
References 34 publications
(13 reference statements)
0
20
0
1
Order By: Relevance
“…La calidad de servicio puede considerarse una herramienta para la seguridad (Szigeti, 2004;Kisner, 2010), ver Fig. 1, lo cual no es extraño si se tiene en cuenta un contexto en donde un sistema de misión crítica supedita su eficacia a los datos recibidos; si estos últimos llegan con retardos o mutilados se puede correr el riesgo de respuestas demoradas o inapropiadas del sistema.…”
Section: Hacia Un Estado Del Arteunclassified
“…La calidad de servicio puede considerarse una herramienta para la seguridad (Szigeti, 2004;Kisner, 2010), ver Fig. 1, lo cual no es extraño si se tiene en cuenta un contexto en donde un sistema de misión crítica supedita su eficacia a los datos recibidos; si estos últimos llegan con retardos o mutilados se puede correr el riesgo de respuestas demoradas o inapropiadas del sistema.…”
Section: Hacia Un Estado Del Arteunclassified
“…A survey of vulnerabilities, failures and attacks on real-time distributed control systems, and mitigation and recovery strategies is given in [34]. A taxonomy of attacks against energy control systems is presented in [25].…”
Section: Related Workmentioning
confidence: 99%
“…Prior work on control systems that focuses on reliability and resilience -by protecting CPSs against random, independent or benign faults and failures of cyber/physical components [8,31] -fails to adequately address integrity, confidentiality and denial-of-service threats [13,14,22,25,34,44]. Moreover, traditional computer and network security approaches do not address in a unified manner how systems can outlive malicious attacks (survivability) and how they can recover from attacks (recoverability) [23,25,34,53].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In most of the reported literature, the sensor saturations have been assumed to occur definitely and described by the so-called sector-bounded conditions. Nevertheless, sensors in practical systems might be subject to some transient phenomena especially in unattended envi-ronments such as power grids [19,20,21]. In these cases, the saturations may occur in a random way owing to various reasons such as random sensor failures and abrupt environmental changes [22].…”
Section: Introductionmentioning
confidence: 99%