2017
DOI: 10.48550/arxiv.1701.04525
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Cyber-Physical Systems Security -- A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 58 publications
0
5
0
Order By: Relevance
“…The protocol validates the transaction's legitimacy, eliminating the requirement for a trusted third party to do so. When the transaction is finished [15] Mining is the process of adding the records of a transaction to the ledger of prior transactions. The rest of the network's nodes must verify the proof of work.…”
Section: Components Of Blockchain: -mentioning
confidence: 99%
“…The protocol validates the transaction's legitimacy, eliminating the requirement for a trusted third party to do so. When the transaction is finished [15] Mining is the process of adding the records of a transaction to the ledger of prior transactions. The rest of the network's nodes must verify the proof of work.…”
Section: Components Of Blockchain: -mentioning
confidence: 99%
“…Because of that, the attack can be easily detected by control-theoretic fault detection techniques [36]. Authors have systematized existing CPS security research analyzing the taxonomy of threats, vulnerabilities, and attacks from the CPS components perspective, with a special focus on cyber components [37] and cyber adversaries [8].…”
Section: Adversary Modelsmentioning
confidence: 99%
“…In the cyber-physical systems (CPS) security literature, recent studies [15], [26], [36]- [39], list possible cyber-attacks and discuss their detection and mitigation techniques. In these studies, abstract cyber-physical models for smart cars are also presented.…”
Section: B V2i Cyber-attacks In a CV Environmentmentioning
confidence: 99%