The multifaceted nature of cyber-physical systems needs holistic study methods to detect essential aspects and interrelations among physical and cyber components. Like the systems themselves, security threats feature both cyber and physical elements. Although to apply divide et impera approaches helps handling system complexity, to consider just one aspect at a time does not provide adequate risk awareness and hence does not allow to design the most appropriate countermeasures. To support this claim, in this paper we provide a joint application of two model-driven techniques for physical and cyber-security evaluation. We apply two UML profiles, namely SecAM (for cyber-security) and CIP\_VAM (for physical security), in combination. In such a...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The Internet of Things (IoT) and cloud technologies are increasingly implemented in the form of Cybe...
The security challenges arising at the layer between their digital and physical components of Cyber-...
The multifaceted nature of cyber-physical systems needs holistic study methods to detect essential a...
Critical infrastructure systems are vital to all nations, and incapacitating such systems can result...
In the last years, research on Critical Infrastructure Protection (CIP) has become one of the primar...
The high level of interconnection and interdependency between critical infrastructures demands for n...
IEEE ISNCC 2018, International Symposium on Networks, Computers and Communications, Rome, ITALIE, 19...
Modern physical protection systems integrate a number of security systems (including procedures, equ...
Vulnerability of railway physical assets against adversary’s attacks is affected by a number of fact...
The critical infrastructures such as electrical power systems, telecommunication, transportation sys...
Urban railway systems are increasingly relying on information and communications technologies (ICT)....
Abstract—Cyber-Physical Systems (CPS) are systems with seamless integration of physical, computation...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The ongoing digitalisation of industrial systems is bringing new challenges in managing, monitoring,...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The Internet of Things (IoT) and cloud technologies are increasingly implemented in the form of Cybe...
The security challenges arising at the layer between their digital and physical components of Cyber-...
The multifaceted nature of cyber-physical systems needs holistic study methods to detect essential a...
Critical infrastructure systems are vital to all nations, and incapacitating such systems can result...
In the last years, research on Critical Infrastructure Protection (CIP) has become one of the primar...
The high level of interconnection and interdependency between critical infrastructures demands for n...
IEEE ISNCC 2018, International Symposium on Networks, Computers and Communications, Rome, ITALIE, 19...
Modern physical protection systems integrate a number of security systems (including procedures, equ...
Vulnerability of railway physical assets against adversary’s attacks is affected by a number of fact...
The critical infrastructures such as electrical power systems, telecommunication, transportation sys...
Urban railway systems are increasingly relying on information and communications technologies (ICT)....
Abstract—Cyber-Physical Systems (CPS) are systems with seamless integration of physical, computation...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The ongoing digitalisation of industrial systems is bringing new challenges in managing, monitoring,...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The Internet of Things (IoT) and cloud technologies are increasingly implemented in the form of Cybe...
The security challenges arising at the layer between their digital and physical components of Cyber-...