2022
DOI: 10.1038/s41598-022-17254-4
|View full text |Cite
|
Sign up to set email alerts
|

Reliability model of the security subsystem countering to the impact of typed cyber-physical attacks

Abstract: The article's main contribution is the description of the process of the security subsystem countering the impact of typed cyber-physical attacks as a model of end states in continuous time. The input parameters of the model are the flow intensities of typed cyber-physical attacks, the flow intensities of possible cyber-immune reactions, and the set of probabilities of neutralization of cyber-physical attacks. The set of admissible states of the info-communication system is described taking into account possib… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…For example, a neural network for real-time cryptographic data protection oriented on unmanned aerial vehicles is presented in [16], for which data protection from damage or loss in the wireless channel between it and the remote control center is critical. The study in [17] proposes the concept of calculating the info-communication system reliability indicator of operating under the probable impact of typical cyber-physical attacks. Special issues dedicated to Internet Security, Trust, and Privacy are organized [18].…”
Section: Introductionmentioning
confidence: 99%
“…For example, a neural network for real-time cryptographic data protection oriented on unmanned aerial vehicles is presented in [16], for which data protection from damage or loss in the wireless channel between it and the remote control center is critical. The study in [17] proposes the concept of calculating the info-communication system reliability indicator of operating under the probable impact of typical cyber-physical attacks. Special issues dedicated to Internet Security, Trust, and Privacy are organized [18].…”
Section: Introductionmentioning
confidence: 99%
“…As we continue to rely on Artificial Intelligence (AI) applications in critical areas such as medical imaging [1], autonomous driving [2], and security [3], it is crucial to be mindful of the potential for adversarial cyber-a acks. These a acks involve subtle manipulations to input data that can deceive an AI model, resulting in erroneous decisions and outcomes.…”
Section: Introduction To Adversarial a Acksmentioning
confidence: 99%