2017
DOI: 10.1109/mdat.2017.2709310
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy in Cyber-Physical Systems: A Survey of Surveys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
121
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 262 publications
(121 citation statements)
references
References 30 publications
0
121
0
Order By: Relevance
“…These types of cyber‐attacks disrupting physical systems require broadening the scope from security and privacy in CPSs to consider the potential for physical harm and the implications for safety . This broader view stresses the need for a combined safety and security risk analysis in CPS, where security and safety goals coexist and require an integration process …”
Section: The Emergence Of Cps: Two Perspectives For Derivation Of Keymentioning
confidence: 99%
“…These types of cyber‐attacks disrupting physical systems require broadening the scope from security and privacy in CPSs to consider the potential for physical harm and the implications for safety . This broader view stresses the need for a combined safety and security risk analysis in CPS, where security and safety goals coexist and require an integration process …”
Section: The Emergence Of Cps: Two Perspectives For Derivation Of Keymentioning
confidence: 99%
“…Incident analysis security ontology research is presented in [15] and provides a taxonomy which has some similarities to the framework presented in [14], but some aspects have been added in their classification such as action and unauthorized results. In their taxonomy Giraldo et al [16] categorized cyberphysical systems by focusing on some of the CPS characteristics such as its domains, defenses, attacks, network security, research trends, security-level implementation, and computational strategies.…”
Section: Related Workmentioning
confidence: 99%
“…Government: is denoting local or national governments including buildings/housing, emergency services, public benefits, and social services, federal and state governments, tribal governments, military, protection of workers, and environment [16].…”
Section: B Target Sectormentioning
confidence: 99%
See 1 more Smart Citation
“…Although it is a widely discussed and studied topic, authentication remains a crucial security issue [1][2][3][4]. Nowadays, technologies such as sensor networks, smart systems, cyberphysical systems (CPS), and Internet of Things (IoT) depend on small building blocks like sensors, actuators, measuring instruments, and smart devices.…”
Section: Introductionmentioning
confidence: 99%