2020
DOI: 10.1016/j.sysarc.2020.101739
|View full text |Cite
|
Sign up to set email alerts
|

Design optimization of confidentiality-critical cyber physical systems with fault detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…The cyber security goals of smart grids include integrity, confidentiality and availability [44]. Various cyber attacks can target one or more goals of the smart grids [31], for instance, fault injection attacks can be adopted to corrupt data and break the confidentiality in cyber-physical systems [45] whereas data injection attacks can interrupt integrity of smart grids [46][47][48] and the availability goal can be unsatisfied by denial-of-service attacks [49].…”
Section: Cyber Securitymentioning
confidence: 99%
“…The cyber security goals of smart grids include integrity, confidentiality and availability [44]. Various cyber attacks can target one or more goals of the smart grids [31], for instance, fault injection attacks can be adopted to corrupt data and break the confidentiality in cyber-physical systems [45] whereas data injection attacks can interrupt integrity of smart grids [46][47][48] and the availability goal can be unsatisfied by denial-of-service attacks [49].…”
Section: Cyber Securitymentioning
confidence: 99%
“…The covariance principle denotes the mean as in Eq. (13). Suppose that all instruments are allocated in the same manner and separately according to the mixture likelihood density function of all data points are spread individually and similarly according to the parameter calculated to be used by clusters using the GAM method.…”
Section: A Gammentioning
confidence: 99%
“…The computer vision process is the technically independent subnets of the segment that may have such features as guarantee latency and stability [12]. It exists as a cohesive system for implementations in a conceptual manner that is exclusive of the core technology [13]. It can be developed with a constraining control of access that cannot leave the compartment in a particular process [14,15].…”
Section: Introduction To Industrial Fault Detection and Diagnosis Networkmentioning
confidence: 99%
“…LIN, 2018, MARQUES;PITARMA, 2019 Cyber physical systems Monitor physical processes, create a virtual copy of the physical space and execute decentralized decisions. STRANDHAGEN et al, 2017, JIANG et al, 2020 Big data Collects, stores and processes data for planning and control of manufacturing operations.…”
Section: Systems Integrationmentioning
confidence: 99%