In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks before they can cause significant damage. To achieve this, intrusion detection sys-tems (IDS) may be deployed, which can detect attacks and alert human operators, who can then intervene. However, the resource-constrained nature of many CPS poses a chal-lenge, since reliable IDS can be computationally expensive. Consequently, computational nodes may not be able to per-form intrusion detection continuously, which means that we have to devise a schedule for performing intrusion detec-tion. While a uniformly random schedule may be optimal in a purely cyber system, an optimal schedule for protecting CPS must also take into account the physical prope...
Security in CPS-based real-time embedded systems controlling the power grid has been an afterthought...
Abstract—In this paper we analyze the effect of intrusion de-tection and response on the reliability...
To isolate computations from denial of service (DoS) at-tacks and other forms of adversarial interfe...
The evolving trends of mobility, cloud computing and collaboration have blurred the perimeter separa...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
We consider a large-scale cyber network with N components (e.g., paths, servers, subnets). ...
The recent years have seen a surge of security issues of cyber-physical systems (CPS). In this paper...
Abstract. Recently cyber security has emerged as an established discipline for computer systems and ...
Cyber-Physical Systems (CPS) are advanced intelligent systems that consist of networked or distribut...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
We consider periodic watermarking scheduling for detecting discontinuous replay attacks in Cyber–Phy...
Cyber-Physical Systems (CPSes) are being widely deployed in security- critical scenarios such as sma...
A major challenge for intrusion prevention system (IPS) sensors in today’s Internet is the amount of...
International audienceEnforcing security in a network always comes with a trade-off regarding budget...
We focus on detecting intrusions in ad hoc networks using misuse detection techniques and investigat...
Security in CPS-based real-time embedded systems controlling the power grid has been an afterthought...
Abstract—In this paper we analyze the effect of intrusion de-tection and response on the reliability...
To isolate computations from denial of service (DoS) at-tacks and other forms of adversarial interfe...
The evolving trends of mobility, cloud computing and collaboration have blurred the perimeter separa...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
We consider a large-scale cyber network with N components (e.g., paths, servers, subnets). ...
The recent years have seen a surge of security issues of cyber-physical systems (CPS). In this paper...
Abstract. Recently cyber security has emerged as an established discipline for computer systems and ...
Cyber-Physical Systems (CPS) are advanced intelligent systems that consist of networked or distribut...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
We consider periodic watermarking scheduling for detecting discontinuous replay attacks in Cyber–Phy...
Cyber-Physical Systems (CPSes) are being widely deployed in security- critical scenarios such as sma...
A major challenge for intrusion prevention system (IPS) sensors in today’s Internet is the amount of...
International audienceEnforcing security in a network always comes with a trade-off regarding budget...
We focus on detecting intrusions in ad hoc networks using misuse detection techniques and investigat...
Security in CPS-based real-time embedded systems controlling the power grid has been an afterthought...
Abstract—In this paper we analyze the effect of intrusion de-tection and response on the reliability...
To isolate computations from denial of service (DoS) at-tacks and other forms of adversarial interfe...