2010 IEEE/ACM Int'l Conference on Green Computing and Communications &Amp; Int'l Conference on Cyber, Physical and Social Compu 2010
DOI: 10.1109/greencom-cpscom.2010.36
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues and Challenges for Cyber Physical System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
73
0
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 152 publications
(74 citation statements)
references
References 7 publications
0
73
0
1
Order By: Relevance
“…As shown in Figure 1, the first step will be to generate the exact cover of the list that is all possible combinations that are disjoint and when combined, form the list. For example, in this case, the combinatory subsets can be { (1,3,5), (2,4,8), (6,7,9)}, {(1,2,3), (4,6,8), (5,7,9)}, {(1,4,7), (2,5,8), (3,6,9)} etc. The length is 9 and the factors for length will be 1,3,9.…”
Section: A Case Study: Security Of Pacemakermentioning
confidence: 99%
See 3 more Smart Citations
“…As shown in Figure 1, the first step will be to generate the exact cover of the list that is all possible combinations that are disjoint and when combined, form the list. For example, in this case, the combinatory subsets can be { (1,3,5), (2,4,8), (6,7,9)}, {(1,2,3), (4,6,8), (5,7,9)}, {(1,4,7), (2,5,8), (3,6,9)} etc. The length is 9 and the factors for length will be 1,3,9.…”
Section: A Case Study: Security Of Pacemakermentioning
confidence: 99%
“…Such security measurements can be encryption, access control, and authentication and so on. This dynamic adapting of the environment by context coupling is known as the Context-Aware Security Framework [9].…”
Section: Context-aware Security Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…Though related security issues are broadly studied and analyzed in the fields of Wireless Sensor Network (WSN), Ad-hoc network and Mobile Ad-hoc Networks (MANET) etc., they are barely applicable because CPS security covers a larger scope, contains much more content and requires higher levels of security. By investigating he CPS security issue, a content-aware security framework for generic CPS systems was proposed [1]. Several security problems along with the currently proposed solutions at different network layers of mobile ad hoc networks were presented and discussed based on the related studies before [2].…”
Section: Introductionmentioning
confidence: 99%