2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) 2021
DOI: 10.1109/iemtronics52119.2021.9422623
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of Cyber-Physical Systems Against Stochastic Cyber-Attacks Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Cyberattacks are meant to deliberate an exploitation of system resources to compromise necessary data and utilize the system in illegal usage [ 46 ]. Cyberattacks usually are launched against the victim system to violate the major security services, such as confidentiality, integrity, and availability.…”
Section: System Modelingmentioning
confidence: 99%
“…Cyberattacks are meant to deliberate an exploitation of system resources to compromise necessary data and utilize the system in illegal usage [ 46 ]. Cyberattacks usually are launched against the victim system to violate the major security services, such as confidentiality, integrity, and availability.…”
Section: System Modelingmentioning
confidence: 99%
“…They can also gain unauthorized access and modify sensitive data, disrupt normal operations of the IoT, or damage the IoT altogether. The vulnerability can exist in both hardware and software components of the IoT [5]. Hardware vulnerabilities are difficult to detect and much harder to fix due to various embedded microprograms in them.…”
Section: Introductionmentioning
confidence: 99%
“…The obligation of getting an effective, dependable, and malleable communication foundation is accomplished by facilitating real-time data conversation between various smart and conventional CPS/IoT elements. Cyber-Physical Systems (CPS) are orchestrated systems that incorporate computation, networking, and physical processes as well as security services against several cyber-attack vectors [2]. CPS combines the dynamics of the physical processes with those of the software and networking components, providing abstractions and modeling, design, and analysis techniques for the integrated real-time CPS [3,4].…”
Section: Introductionmentioning
confidence: 99%