Cyber-Physical Systems Security: a Systematic Mapping Study.
TLDR
The provided systematic map of 118 selected studies is based on application fields, various system components, related algorithms and models, attacks characteristics and defense strategies and presents a powerful comparison framework for existing and future research on this hot topic.Abstract:
Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic mapping study sheds some light on how security is actually addressed when dealing with cyber-physical systems. The provided systematic map of 118 selected studies is based on, for instance, application fields, various system components, related algorithms and models, attacks characteristics and defense strategies. It presents a powerful comparison framework for existing and future research on this hot topic, important for both industry and academia.read more
Citations
More filters
Journal ArticleDOI
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
Jairo Giraldo,David I. Urbina,Alvaro A. Cardenas,Junia Valente,Mustafa Amir Faisal,Justin Ruths,Nils Ole Tippenhauer,Henrik Sandberg,Richard Candell +8 more
TL;DR: Previous work on physics-based anomaly detection based on a unified taxonomy that allows us to identify limitations and unexplored challenges and to propose new solutions is reviewed.
Journal ArticleDOI
Security and Privacy in Cyber-Physical Systems: A Survey of Surveys
TL;DR: The authors have provided a classification in CPS Domains, Attacks, Defenses, Research-trends, Network-security, Security level implementation, and Computational Strategies which makes this survey a unique and I believe very helpful article.
Journal ArticleDOI
Cyber-physical systems and their security issues
TL;DR: The aim of this paper is to analyse and classify existing research papers on the security of cyber-physical systems, and to propose a tree of attacks on cyber- physical systems.
Journal ArticleDOI
Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
TL;DR: A systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed, showing that most of the selected studies in this review targeted only a few common security vulnerabilities such as phishing, denial-of-service and malware.
Journal ArticleDOI
A Novel Data Analytical Approach for False Data Injection Cyber-Physical Attack Mitigation in Smart Grids
TL;DR: A novel data analytical method is proposed to detect FDIAs based on data-centric paradigm employing the margin setting algorithm (MSA), which yields better results in terms of detection accuracy than both the SVM and ANN when applied to FDIA detection.
References
More filters
Book
Elements of information theory
Thomas M. Cover,Joy A. Thomas +1 more
TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Book
Power System Stability and Control
TL;DR: In this article, the authors present a model for the power system stability problem in modern power systems based on Synchronous Machine Theory and Modelling, and a model representation of the synchronous machine representation in stability studies.
Journal ArticleDOI
Weighted kappa: Nominal scale agreement provision for scaled disagreement or partial credit.
TL;DR: The Kw provides for the incorpation of ratio-scaled degrees of disagreement (or agreement) to each of the cells of the k * k table of joi.
Book
Graph theory with applications
TL;DR: In this paper, the authors present Graph Theory with Applications: Graph theory with applications, a collection of applications of graph theory in the field of Operational Research and Management. Journal of the Operational research Society: Vol. 28, Volume 28, issue 1, pp. 237-238.
Book
Power Generation, Operation, and Control
Allen J. Wood,Bruce Wollenberg +1 more
TL;DR: In this paper, the authors present a graduate-level text in electric power engineering as regards to planning, operating, and controlling large scale power generation and transmission systems, including characteristics of power generation units, transmission losses, generation with limited energy supply, control of generation, and power system security.