Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy 2017
DOI: 10.1145/3140241.3140249
|View full text |Cite
|
Sign up to set email alerts
|

Developing Models for Physical Attacks in Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…Some smart sectors including smart healthcare and smart citizen were addressed only by a small number of studies, see Figure 12; it is critical that future research recognises this limitation. It is also evident that interest is growing in cross-sector proposals and an interdisciplinary approach to solve real-life problems including cybercrime [39,51,[63][64][65][100][101][102]111,131,134]. Going forward, an interdisciplinary approach across smart sectors and aggregated sharing of CTI from multiple sources could increase situational awareness and provide a detailed, real-time and measurable body-of-knowledge to deal with the increased sophistication and coordination of cyberattacks.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Some smart sectors including smart healthcare and smart citizen were addressed only by a small number of studies, see Figure 12; it is critical that future research recognises this limitation. It is also evident that interest is growing in cross-sector proposals and an interdisciplinary approach to solve real-life problems including cybercrime [39,51,[63][64][65][100][101][102]111,131,134]. Going forward, an interdisciplinary approach across smart sectors and aggregated sharing of CTI from multiple sources could increase situational awareness and provide a detailed, real-time and measurable body-of-knowledge to deal with the increased sophistication and coordination of cyberattacks.…”
Section: Discussionmentioning
confidence: 99%
“…The results show that some studies address more than one smart sector [104,120,124,126,133,145] or aim to diversify their future research [39,51,[63][64][65]100,102,111,131,134]. For example, reference [145] explores smart support for independent living of the elderly within the community to maximise their independence whilst maintaining the ability to deal with their complex medical needs across The scientific community focused the research on smart infrastructure, followed by smart mobility and smart security sectors whilst smart healthcare and smart citizen were addressed only by a small number of studies, see Figure 12.…”
Section: Analysis Of Primary Studies Cross-sector Proposals or Applications To Improve Digital Forensicsmentioning
confidence: 96%
See 2 more Smart Citations
“…Several approaches have been proposed in the literature to study attack graphs and the analysis of attack paths within IT infrastructures [9]. The ADversary VIew Security Evaluation (ADVISE) meta modeling approach was used in [10] to facilitate the understating of attack paths within cyber-physical systems. A set of algorithms were proposed in [11] to facilitate the analysis of attack paths and to prioritize them taking into account the system's vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%