Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Jose Rubio Hernan"'
Publikováno v:
Sensors, Vol 23, Iss 5, p 2735 (2023)
The aim of this paper was to propose a method to characterize the ability of a GNSS user to detect a spoofing attack from the behavior of the clock bias. Spoofing interference is not a new issue, especially in military GNSS, although it is a new chal
Externí odkaz:
https://doaj.org/article/86a8139696be41e49f5cfba3a56ba35a
Publikováno v:
EURASIP Journal on Information Security, Vol 2017, Iss 1, Pp 1-25 (2017)
Abstract We address security issues in cyber-physical systems (CPSs). We focus on the detection of attacks against cyber-physical systems. Attacks against these systems shall be handled both in terms of safety and security. Networked-control technolo
Externí odkaz:
https://doaj.org/article/06afeeee846b40ca82e0f9e8651ade98
Publikováno v:
IEEE Access
IEEE Access, IEEE, 2020, 8, pp.212194-212208. ⟨10.1109/ACCESS.2020.3039879⟩
IEEE Access, Vol 8, Pp 212194-212208 (2020)
IEEE Access, IEEE, 2020, 8, pp.212194-212208. ⟨10.1109/ACCESS.2020.3039879⟩
IEEE Access, Vol 8, Pp 212194-212208 (2020)
International audience; We present a control-theoretic approach to achieve Cyber-Physical Systems (CPS) resilient designs. We assume situations in which the CPS must maintain the correct operation of a set of crucial functionalities despite ongoing a
Publikováno v:
Proceedings of the 19th International Conference on Security and Cryptography.
Publikováno v:
NCA
2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)
International Symposium on Network Computing and Applications
International Symposium on Network Computing and Applications, Nov 2020, Cambridge, MA (online), United States. pp.1-8, ⟨10.1109/NCA51143.2020.9306741⟩
Publons
2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)
International Symposium on Network Computing and Applications
International Symposium on Network Computing and Applications, Nov 2020, Cambridge, MA (online), United States. pp.1-8, ⟨10.1109/NCA51143.2020.9306741⟩
Publons
Cyber-Physical Systems (CPS) use computational resources to control physical process and provide critical services. For this reason, an attack in these systems may have dangerous consequences in the physical world. Hence, resilience is a fundamental
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::99a62d0494630589fb49807d4224788e
http://arxiv.org/abs/2009.06927
http://arxiv.org/abs/2009.06927
Publikováno v:
Computer Security ISBN: 9783030420475
CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS
Computer Security: ESORICS 2019 international workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019: revised selected papers
CyberICPS 2019 : 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems
CyberICPS 2019 : 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, Sep 2019, Luxembourg, Luxembourg. pp.19-34, ⟨10.1007/978-3-030-42048-2_2⟩
CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS
Computer Security: ESORICS 2019 international workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019: revised selected papers
CyberICPS 2019 : 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems
CyberICPS 2019 : 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, Sep 2019, Luxembourg, Luxembourg. pp.19-34, ⟨10.1007/978-3-030-42048-2_2⟩
International audience; Cyber-physical systems (CPS) integrate computation and networking resources to control a physical process. The adoption of new communication capabilities comes at the cost of introducing new securiy threats that need to be han
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::23fce8a9abd7d08091064a5de5109b7e
https://doi.org/10.1007/978-3-030-42048-2_2
https://doi.org/10.1007/978-3-030-42048-2_2
Publikováno v:
Conference paper
SoMMA 2019: 1st Symposium on Machine Learning and Metaheuristics Algorithms, and Applications
SoMMA 2019: 1st Symposium on Machine Learning and Metaheuristics Algorithms, and Applications, Dec 2019, Trivandrum, India. pp.1-15, ⟨10.1007/978-981-15-4301-2_1⟩
Communications in Computer and Information Science ISBN: 9789811543005
SoMMA 2019: 1st Symposium on Machine Learning and Metaheuristics Algorithms, and Applications
SoMMA 2019: 1st Symposium on Machine Learning and Metaheuristics Algorithms, and Applications, Dec 2019, Trivandrum, India. pp.1-15, ⟨10.1007/978-981-15-4301-2_1⟩
Communications in Computer and Information Science ISBN: 9789811543005
International audience; Wireless Sensor Networks (WSNs) are used to monitor physical or environmental conditions. Due to energy and bandwidth constraints, wireless sensors are prone to packet loss during communication. To overcome the physical constr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ee3e6eac1d7c35fc712296817a2c93af
https://hal.archives-ouvertes.fr/hal-02962613
https://hal.archives-ouvertes.fr/hal-02962613
Autor:
Stephane Grunenwald, Jose Rubio Hernan, Kirsten Vanhulst, Thomas Cledel, Fabien Autrel, Alexandre Kabil, Edwin Bourget, Simon N. Foley, Vivien M. Rooney, Raphael Larsen
Publikováno v:
Proceedings CPS-SPC 2018 : Workshop on Cyber-Physical Systems Security and Privacy
CPS-SPC 2018 : Workshop on Cyber-Physical Systems Security and Privacy
CPS-SPC 2018 : Workshop on Cyber-Physical Systems Security and Privacy, Oct 2018, Toronto, Canada. pp.102-107, ⟨10.1145/3564888.3264.897⟩
CPS-SPC@CCS
CPS-SPC 2018 : Workshop on Cyber-Physical Systems Security and Privacy
CPS-SPC 2018 : Workshop on Cyber-Physical Systems Security and Privacy, Oct 2018, Toronto, Canada. pp.102-107, ⟨10.1145/3564888.3264.897⟩
CPS-SPC@CCS
International audience; A challenge is to develop cyber-physical system scenarios that reflect the diversity and complexity of real-life cyber-physical systems in the research questions that they address. Time-bounded collaborative events, such a hac
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0e60395b9d923ca8f494bf0129f75b5c
https://hal.archives-ouvertes.fr/hal-01911182
https://hal.archives-ouvertes.fr/hal-01911182
Publikováno v:
Proceedings ARES 2018 : 13th International Conference on Availability, Reliability and Security
ARES 2018 : 13th International Conference on Availability, Reliability and Security
ARES 2018 : 13th International Conference on Availability, Reliability and Security, Aug 2018, Hamburg, Germany. pp.Article n° 19-, ⟨10.1145/3230833.3230847⟩
ARES
ARES 2018 : 13th International Conference on Availability, Reliability and Security
ARES 2018 : 13th International Conference on Availability, Reliability and Security, Aug 2018, Hamburg, Germany. pp.Article n° 19-, ⟨10.1145/3230833.3230847⟩
ARES
International audience; This paper presents a geometrical model that projects malicious and benign events (e.g.,attacks, security countermeasures) as pyramidal instances in a multidimensional coordinate system. The approach considers internal event d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::48261ee7dda5cd283292ee03be42decd
https://hal.archives-ouvertes.fr/hal-01885053
https://hal.archives-ouvertes.fr/hal-01885053
Publikováno v:
Internet technology letters
Internet technology letters, 2018, 1 (4), pp.e44-1-e44-8. ⟨10.1002/itl2.44⟩
Rubio-Hernan, J, Sahay, R, De Cicco, L & Garcia-Alfaro, J 2018, ' Cyber-physical architecture assisted by programmable networking ', Internet Technology Letters, vol. 1, no. 4, e44 . https://doi.org/10.1002/itl2.44
Internet technology letters, 2018, 1 (4), pp.e44-1-e44-8. ⟨10.1002/itl2.44⟩
Rubio-Hernan, J, Sahay, R, De Cicco, L & Garcia-Alfaro, J 2018, ' Cyber-physical architecture assisted by programmable networking ', Internet Technology Letters, vol. 1, no. 4, e44 . https://doi.org/10.1002/itl2.44
Cyber-physical technologies are prone to attacks, in addition to faults and failures. The issue of protecting cyber-physical systems should be tackled by jointly addressing security at both cyber and physical domains, in order to promptly detect and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f82cff6538c448a13884ed93b3e653e6
http://hdl.handle.net/11589/177291
http://hdl.handle.net/11589/177291