Listing 1 - 1 of 1 |
Sort by
|
Choose an application
This dissertation by Rouhollah Mahfouzi focuses on the security threats to control applications within cyber-physical systems. It provides solutions for detecting, preventing, and mitigating attacks, considering the unique properties and resource constraints of these systems. The work discusses the design of intrusion detection mechanisms and the use of resource management to maintain system performance under attack. The study introduces the Butterfly attack, which exploits timing anomalies in shared resources, and examines the impact of network delays on control stability. Additionally, it explores the challenges of outsourcing control algorithms to the cloud, demonstrating the effectiveness of verifiable computation techniques. The intended audience includes researchers and professionals in computer science and engineering, particularly those focused on cybersecurity and control systems.
Listing 1 - 1 of 1 |
Sort by
|