Listing 1 - 1 of 1 |
Sort by
|
Choose an application
Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems.
smart grids --- device authentication --- situational awareness --- home area networks --- time-delay switch attack --- networked control systems --- secure control design --- Lyapunov theory --- attack estimation --- hardware-in-the-loop testing --- machine learning --- industrial control systems --- anomaly detection --- fault detection --- intrusion detection system --- blockchain --- security --- privacy --- financial transactions --- transportation systems --- autonomous vehicles --- power system resilience --- disaster --- Federated Learning --- edge intelligence --- resilience management systems --- resource-limitations --- demand response --- remedial testing --- greybox fuzzing --- vulnerability detection --- enhanced security --- traffic microsimulation tool --- cooperative automated driving systems --- vehicle powertrain --- safety --- road capacity --- contested environments --- anomaly isolation --- artificial neural networks --- Cyber Physical System --- out-of-bounds --- vulnerable detection --- patch --- inverter-based energy resources --- islanded microgrids --- resilient control design --- secondary control --- false data injection
Listing 1 - 1 of 1 |
Sort by
|