2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI) 2020
DOI: 10.1109/sti50764.2020.9350452
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Threat Modeling of A Telesurgery System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…This choice is based on the tool's wide acceptance in both academia and industry, as well as its ability to identify threats at the component level. It is an open-source tool provided by Microsoft and is free [36]. It specifically focuses on identifying vulnerabilities and weaknesses in application security.…”
Section: Threat Modeling Using Stridementioning
confidence: 99%
“…This choice is based on the tool's wide acceptance in both academia and industry, as well as its ability to identify threats at the component level. It is an open-source tool provided by Microsoft and is free [36]. It specifically focuses on identifying vulnerabilities and weaknesses in application security.…”
Section: Threat Modeling Using Stridementioning
confidence: 99%
“…• Resource Prioritization [4]: For the desired system function using wireless, setting up a transmission priority enables nodes to be given a desired wireless resource to transmit data. One potential approach for setting a transmission priority is through defining the delay requirement of data transmission.…”
Section: Plan and Implement Cybersecurity Controlsmentioning
confidence: 99%
“…As the threat of cyber-attacks increases, preparing and enhancing the cyber security of bilateral control systems is essential. Several studies have been conducted on the modeling and classification of cyber-attack methods, such as denialof-service (DoS) attacks and packet drop attacks on forceposition-type bilateral control systems [26], specific cyberattacks on surgical robots and remote rescue robots [27], [28], and false data injection attacks on practical force-positiontype bilateral control systems [26], [29]. Moreover, several studies have been conducted on cyber-attack countermeasures for bilateral control systems, which are broadly classified into proactive and reactive countermeasures.…”
Section: Introductionmentioning
confidence: 99%