scispace - formally typeset
Book ChapterDOI

Security Threats in Cyber-Physical Systems

About
The article was published on 2017-01-01. It has received 6 citations till now. The article focuses on the topics: Security information and event management & Security through obscurity.

read more

Citations
More filters
Journal ArticleDOI

Malware Detection in Embedded Systems Using Neural Network Model for Electromagnetic Side-Channel Signals

TL;DR: A novel malware detection system for critical embedded and cyber-physical systems (CPS) that exploits electromagnetic (EM) side-channel signals from the device to detect malicious activity and can detect DDoS and ransomware with 100% accuracy.
Journal ArticleDOI

How Do We Optimize Risk in Enterprise Architecture when Deploying Emerging Technologies

TL;DR: An extended framework for executives, as well as questions and process for boards to consider as part of their oversight of cyber physical systems are developed, which equips boards and executives as they begin to develop their thinking around enterprise cyber physical risk.
Book ChapterDOI

Blockchain and Cyber Risk: Identifying Areas of Cyber Risk and a Risk-Based Approach for Executives

TL;DR: A cyber-physical risk-based approach is presented which equips executives as they develop their thinking around enterprise cyber risk, particularly with emerging technologies such as blockchain.
Proceedings ArticleDOI

Guidelines for Data Privacy Compliance: A Focus on Cyber-physical Systems and Internet of Things

TL;DR: This paper proposes a list of privacy compliance guidelines aimed at making it practical for organisations to comply with privacy legislation in these domains, and takes into account technical, organisational and legal aspects of data privacy compliance.
Book ChapterDOI

Data privacy compliance benefits for organisations - a cyber-physical systems and Internet of Things study

TL;DR: This paper seeks to position data privacy Compliance as a value proposition for organisations by focusing on the benefits that can be derived from data privacy compliance as it applies to a particular subset of information technology systems, namely cyber-physical systems and Internet of Things technologies.