Cyber-physical systems (CPSs) have dependability requirements that are associated with controlling a physical process. Cyber-attacks can result in those requirements not being met. Consequently, it is important to monitor a CPS in order to identify deviations from normal operation. A major challenge is inferring the cause of these deviations in a trustworthy manner. This is necessary to support the implementation of correct and timely control decisions, in order to mitigate cyber-attacks and other causes of reduced dependability. This paper presents evidential networks as a solution to this problem. Through the evaluation of a representative use case for cyber-physical control systems, this paper shows novel approaches to integrate low-leve...
Water management infrastructures such as floodgates are critical and increasingly operated by Indust...
Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A promi...
The world today increasingly relies upon the usage of smart devices which have the capability to com...
We consider the trusted operation of cyber-physical processes based on an assessment of the system’s...
The security essentially governs the usability and stability of Cyber Physical Systems (CPSs) whose ...
We present a method to devise, execute, and assess a cyber deception. The aim is to cause an adversa...
The chapter is devoted to the development of an automatic knowledge-based information fusion system ...
Identifying cyberattack vectors on cyber supply chains (CSC) in the event of cyberattacks are very i...
This paper presents techniques to integrate and reason about complementary intrusion evidence such a...
Part 2: Infrastructure SecurityInternational audienceTelecommunications networks are exposed to new ...
Abstract—A Cyber-Physical System (CPS) integrates physical devices (e.g., sensors, cameras) with cyb...
False alerts due to misconfigured or compromised intrusion detection systems (IDS) in industrial con...
Monitoring security properties of cyber systems at runtime is necessary if the preservation of such ...
Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components de...
Water management infrastructures such as floodgates are critical and increasingly operated by Indust...
Water management infrastructures such as floodgates are critical and increasingly operated by Indust...
Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A promi...
The world today increasingly relies upon the usage of smart devices which have the capability to com...
We consider the trusted operation of cyber-physical processes based on an assessment of the system’s...
The security essentially governs the usability and stability of Cyber Physical Systems (CPSs) whose ...
We present a method to devise, execute, and assess a cyber deception. The aim is to cause an adversa...
The chapter is devoted to the development of an automatic knowledge-based information fusion system ...
Identifying cyberattack vectors on cyber supply chains (CSC) in the event of cyberattacks are very i...
This paper presents techniques to integrate and reason about complementary intrusion evidence such a...
Part 2: Infrastructure SecurityInternational audienceTelecommunications networks are exposed to new ...
Abstract—A Cyber-Physical System (CPS) integrates physical devices (e.g., sensors, cameras) with cyb...
False alerts due to misconfigured or compromised intrusion detection systems (IDS) in industrial con...
Monitoring security properties of cyber systems at runtime is necessary if the preservation of such ...
Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components de...
Water management infrastructures such as floodgates are critical and increasingly operated by Indust...
Water management infrastructures such as floodgates are critical and increasingly operated by Indust...
Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A promi...
The world today increasingly relies upon the usage of smart devices which have the capability to com...