2020
DOI: 10.1016/j.future.2018.07.028
|View full text |Cite
|
Sign up to set email alerts
|

Live forensics of software attacks on cyber–physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(17 citation statements)
references
References 47 publications
0
14
0
2
Order By: Relevance
“…Abeykoon and Feng [92] proposed an analytical framework to acquire digital evidence from a Robot Operating System. Al-Sharif et al [93] investigated the possibility of collecting digital evidence extracted from the main memory (RAM) of the computer components about attacks on CPS. They used Java for their demonstration and found that it is possible to collect some evidence even after the garbage collector is explicitly executed.…”
Section: Current Cps Forensics Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Abeykoon and Feng [92] proposed an analytical framework to acquire digital evidence from a Robot Operating System. Al-Sharif et al [93] investigated the possibility of collecting digital evidence extracted from the main memory (RAM) of the computer components about attacks on CPS. They used Java for their demonstration and found that it is possible to collect some evidence even after the garbage collector is explicitly executed.…”
Section: Current Cps Forensics Approachesmentioning
confidence: 99%
“…Al-Sharif et al [93] Investigation approach Cyber To enable collecting digital evidence extracted from the main memory.…”
Section: Abeykoon and Feng [92] Forensic Tool Cybermentioning
confidence: 99%
“…Serangan Distributed Denial of Services (DDoS) terus menjadi salah satu ancaman paling menantang ke Internet. Intensitas dan frekuensi serangan ini meningkat dengan kecepatan yang mengkhawatirkan [5] Begitu seringnya serangan DoS terjadi menyebabkan banyak peneliti yang melakukan penelitian tentang serangan DoS di antaranya yaitu serangan pada sistem fisik [9], survey dan mitigasi serangan DoS pada Named Data Networking [10], eksplorasi bukti digital pada smart router [11], mitigasi serangan DoS yang efisien [12], deteksi DoS pada penerapan jaringan sensor nirkabel [13], deteksi serangan DDoS berbasis multiple autonomous systems [14], dan DDoS bandwidth flooding [15].…”
Section: Pendahuluanunclassified
“…In [15] author discussed a case study of smart medical devices in terms of general problems of assessing the quality of cyber-physical systems. [16] provided live forensics of software attacks on CPS by launching attacks and understanding its internal flows. [17] compared security issues between IoT and traditional network, elaborated opening security issues in IoT, analyzed the security problems of various layers of IoT and tries to find solutions to them.…”
Section: Literature Reviewmentioning
confidence: 99%