Zobrazeno 1 - 10
of 47
pro vyhledávání: '"Sridhar Adepu"'
Publikováno v:
Cybersecurity, Vol 4, Iss 1, Pp 1-19 (2021)
Abstract Modern critical infrastructure, such as a water treatment plant, water distribution system, and power grid, are representative of Cyber Physical Systems (CPSs) in which the physical processes are monitored and controlled in real time. One so
Externí odkaz:
https://doaj.org/article/cbe58eeab4424e038c00c174bb6b84d9
Publikováno v:
IEEE Transactions on Industrial Informatics. 19:7802-7813
Publikováno v:
IEEE Transactions on Information Forensics and Security, 1080-1094
STARTPAGE=1080;ENDPAGE=1094;ISSN=1556-6013;TITLE=IEEE Transactions on Information Forensics and Security
STARTPAGE=1080;ENDPAGE=1094;ISSN=1556-6013;TITLE=IEEE Transactions on Information Forensics and Security
Industrial Internet of Things (IIoT) is a new paradigm for building intelligent industrial control systems, and how to establish a secure channel in IIoT for machine-to-machine (M2M) communication is a critical problem because the devices in IIoT suf
Publikováno v:
ACM Transactions on Autonomous and Adaptive Systems. 17:1-26
Many self-adaptive systems benefit from human involvement and oversight, where a human operator can provide expertise not available to the system and detect problems that the system is unaware of. One way of achieving this synergy is by placing the h
Publikováno v:
Computer Security. ESORICS 2022 International Workshops ISBN: 9783031254598
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::944412b59b72fe98832ac8b4c45ee9d2
https://doi.org/10.1007/978-3-031-25460-4_3
https://doi.org/10.1007/978-3-031-25460-4_3
Publikováno v:
IEEE Security & Privacy. 19:57-65
Components of modern critical infrastructures (CIs), like water treatment and smart grids, are potential targets for attackers. We present the state of cryptographic techniques with timeliness and availability being the key focus to suit the unique n
Publikováno v:
2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm).
Publikováno v:
International Journal of Information Security. 20:783-795
The current train systems are heavily computerized which makes them highly prone to cyberattacks. Many functions in the trains are controlled by programmable logic controllers (PLCs) which make them an attractive target of attacks. By compromising th
Autor:
Sridhar Adepu, Aditya P. Mathur
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 18:86-99
The rise in attempted and successful attacks on critical infrastructure, such as power grid and water treatment plants, has led to an urgent need for the creation and adoption of methods for detecting such attacks often launched either by insiders or
Publikováno v:
IEEE Internet of Things Journal. 6:8056-8064
Billions of Internet of Things (IoT) devices are being adopted in our daily life as personal wearables, home automation agents, medical appliances, etc. Many domains of their use nowadays rely on the privacy and security of these devices—critical i