Abstract | ||
---|---|---|
This paper describes a framework for modeling the security of a cyber–physical system in which the behavior of the adversary is controlled by a threat model that captures – in a unified manner – the cyber aspects (with discrete values) and the physical aspects (with continuous values) of the cyber–physical system. In particular, the framework addresses combined (dependent) vector attacks and synchronization/localization issues. The framework identifies the cyber–physical features that must be protected according to the prevailing security policy. Also, the framework can be used for formal proofs of the security of cyber–physical systems. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1016/j.ijcip.2012.08.002 | International Journal of Critical Infrastructure Protection |
Keywords | Field | DocType |
Cyber–physical systems,Threat models,Treaty verification protocols | Synchronization,Computer security,Threat model,Cyber-physical system,Mathematical proof,Adversary,Engineering,Security policy | Journal |
Volume | Issue | ISSN |
5 | 3 | 1874-5482 |
Citations | PageRank | References |
17 | 0.92 | 30 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mike Burmester | 1 | 1125 | 98.84 |
Emmanouil Magkos | 2 | 217 | 24.01 |
vassilios chrissikopoulos | 3 | 160 | 16.11 |