Cyber Physical Systems (CPSs) are considered as an integration of computing, networking, and physical processes. In such systems physical processes are monitored and controlled by the combination of computation, communication, and control technologies. Examples of CPSs include process control systems, medical devices, robots, and critical infrastructures such as water treatment plants, water distribution systems, and power grid. Often, these systems are vulnerable to attacks as the cyber components such as Supervisory Control and Data Acquisition (SCADA) workstations, Human Machine Interface (HMI), and Programmable Logic Controllers (PLCs) are potential targets for attackers. Replay attacks are easy to perform on such systems and can potent...
An Industrial Control System (ICS) is used to monitor and control industrial processes and critical ...
Cyber-Physical Systems (CPS) are smart co-engineered interacting networks of physical and computatio...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...
Security issues of Cyber-Physical Systems (CPS) are of great significance since cyber attacks may ca...
This paper considers the problem of designing physical watermark signals to protect a control system...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
International audienceWe address detection of attacks against cyber-physical systems. Cyber-physical...
We consider periodic watermarking scheduling for detecting discontinuous replay attacks in Cyber–Phy...
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Industrial Control Systems (ICS) monitor and control physical processes. ICS are found in, among oth...
The problem of replay attacks in the communication network between Distributed Generation Units (DG...
The problem of replay attacks in the communication network between Distributed Generation Units (DGU...
Cyber-physical systems (CPS) face tremendous threats in modern society. Indeed their presence incrit...
This letter proposes a threat discrimination methodology for distinguishing between sensor replay at...
This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-p...
An Industrial Control System (ICS) is used to monitor and control industrial processes and critical ...
Cyber-Physical Systems (CPS) are smart co-engineered interacting networks of physical and computatio...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...
Security issues of Cyber-Physical Systems (CPS) are of great significance since cyber attacks may ca...
This paper considers the problem of designing physical watermark signals to protect a control system...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
International audienceWe address detection of attacks against cyber-physical systems. Cyber-physical...
We consider periodic watermarking scheduling for detecting discontinuous replay attacks in Cyber–Phy...
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Industrial Control Systems (ICS) monitor and control physical processes. ICS are found in, among oth...
The problem of replay attacks in the communication network between Distributed Generation Units (DG...
The problem of replay attacks in the communication network between Distributed Generation Units (DGU...
Cyber-physical systems (CPS) face tremendous threats in modern society. Indeed their presence incrit...
This letter proposes a threat discrimination methodology for distinguishing between sensor replay at...
This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-p...
An Industrial Control System (ICS) is used to monitor and control industrial processes and critical ...
Cyber-Physical Systems (CPS) are smart co-engineered interacting networks of physical and computatio...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...