During the last decades, more and more devices have been connected to the Internet.Today, there are more devices connected to the Internet than humans.An increasingly more common type of devices are cyber-physical devices.A device that interacts with its environment is called a cyber-physical device.Sensors that measure their environment and actuators that alter the physical environment are both cyber-physical devices.Devices connected to the Internet risk being compromised by threat actors such as hackers.Cyber-physical devices have become a preferred target for threat actors since the consequence of an intrusion disrupting or destroying a cyber-physical system can be severe.Cyber attacks against power and energy infrastructure have caused...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In modern society, the communications sector is a critical enabler of economic and social activity. ...
In recent years, we observed a growth of cybersecurity threats, especially due to the ubiquitous of ...
Industrial Control Systems (ICS) are becoming more and more connected. Whileconnecting systems incre...
Cyber Physical Systems (CPS) couple digital systems with the physical environment, creating technica...
The emergent next generation of computing, the so-called Internet of Things (IoT), presents signific...
peer reviewedRecent adversarial attacks have been shown IoT devices weaknesses due to their limited ...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
Since the introduction of Stuxnet, security research of industrial control systems, or cyber-physica...
Recent adversarial attacks have been shown IoT devices weaknesses due to their limited computing pow...
The Internet of Things has the potential to connect billions of devices and is developing at a treme...
Wireless networks afford many benefits compared to wired networks in terms of their usability in dyn...
Ubiquitous computing, also called the Internet of Things (IoT), is rapidly transforming our lives an...
The last few decades have seen a large proliferation in the prevalence of cyber-physical systems. Al...
In this paper we identify some of the particular challenges that are encountered when trying to secu...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In modern society, the communications sector is a critical enabler of economic and social activity. ...
In recent years, we observed a growth of cybersecurity threats, especially due to the ubiquitous of ...
Industrial Control Systems (ICS) are becoming more and more connected. Whileconnecting systems incre...
Cyber Physical Systems (CPS) couple digital systems with the physical environment, creating technica...
The emergent next generation of computing, the so-called Internet of Things (IoT), presents signific...
peer reviewedRecent adversarial attacks have been shown IoT devices weaknesses due to their limited ...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
Since the introduction of Stuxnet, security research of industrial control systems, or cyber-physica...
Recent adversarial attacks have been shown IoT devices weaknesses due to their limited computing pow...
The Internet of Things has the potential to connect billions of devices and is developing at a treme...
Wireless networks afford many benefits compared to wired networks in terms of their usability in dyn...
Ubiquitous computing, also called the Internet of Things (IoT), is rapidly transforming our lives an...
The last few decades have seen a large proliferation in the prevalence of cyber-physical systems. Al...
In this paper we identify some of the particular challenges that are encountered when trying to secu...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In modern society, the communications sector is a critical enabler of economic and social activity. ...
In recent years, we observed a growth of cybersecurity threats, especially due to the ubiquitous of ...