scispace - formally typeset
Open AccessJournal ArticleDOI

Cyber-Physical Systems Security: a Systematic Mapping Study.

TLDR
The provided systematic map of 118 selected studies is based on application fields, various system components, related algorithms and models, attacks characteristics and defense strategies and presents a powerful comparison framework for existing and future research on this hot topic.
Abstract
Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic mapping study sheds some light on how security is actually addressed when dealing with cyber-physical systems. The provided systematic map of 118 selected studies is based on, for instance, application fields, various system components, related algorithms and models, attacks characteristics and defense strategies. It presents a powerful comparison framework for existing and future research on this hot topic, important for both industry and academia.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Survey of Physics-Based Attack Detection in Cyber-Physical Systems

TL;DR: Previous work on physics-based anomaly detection based on a unified taxonomy that allows us to identify limitations and unexplored challenges and to propose new solutions is reviewed.
Journal ArticleDOI

Security and Privacy in Cyber-Physical Systems: A Survey of Surveys

TL;DR: The authors have provided a classification in CPS Domains, Attacks, Defenses, Research-trends, Network-security, Security level implementation, and Computational Strategies which makes this survey a unique and I believe very helpful article.
Journal ArticleDOI

Cyber-physical systems and their security issues

TL;DR: The aim of this paper is to analyse and classify existing research papers on the security of cyber-physical systems, and to propose a tree of attacks on cyber- physical systems.
Journal ArticleDOI

Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study

TL;DR: A systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed, showing that most of the selected studies in this review targeted only a few common security vulnerabilities such as phishing, denial-of-service and malware.
Journal ArticleDOI

A Novel Data Analytical Approach for False Data Injection Cyber-Physical Attack Mitigation in Smart Grids

TL;DR: A novel data analytical method is proposed to detect FDIAs based on data-centric paradigm employing the margin setting algorithm (MSA), which yields better results in terms of detection accuracy than both the SVM and ANN when applied to FDIA detection.
References
More filters
Book

Elements of information theory

TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Book

Power System Stability and Control

P. Kundur
TL;DR: In this article, the authors present a model for the power system stability problem in modern power systems based on Synchronous Machine Theory and Modelling, and a model representation of the synchronous machine representation in stability studies.
Journal ArticleDOI

Weighted kappa: Nominal scale agreement provision for scaled disagreement or partial credit.

TL;DR: The Kw provides for the incorpation of ratio-scaled degrees of disagreement (or agreement) to each of the cells of the k * k table of joi.
Book

Graph theory with applications

J. A. Bondy
TL;DR: In this paper, the authors present Graph Theory with Applications: Graph theory with applications, a collection of applications of graph theory in the field of Operational Research and Management. Journal of the Operational research Society: Vol. 28, Volume 28, issue 1, pp. 237-238.
Book

Power Generation, Operation, and Control

TL;DR: In this paper, the authors present a graduate-level text in electric power engineering as regards to planning, operating, and controlling large scale power generation and transmission systems, including characteristics of power generation units, transmission losses, generation with limited energy supply, control of generation, and power system security.
Related Papers (5)