Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2025
A novel user centric privacy mechanism in cyber physical system
AbstractUser-centric privacy preservation is of paramount importance in the realm of Cyber-Physical Systems (CPS), where making decisions based on nature of data is crucial. This abstract presents a novel approach to safeguarding user privacy within CPS ...
- rapid-communicationFebruary 2025
Stochastic encryption against stealthy attacks in CPSs: A zero-sum game approach
Automatica (Journal of IFAC) (AJIF), Volume 172, Issue Chttps://doi.org/10.1016/j.automatica.2024.112012AbstractThe zero-sum game-based stochastic encryption problem for cyber–physical systems (CPSs) under stealthy attacks is investigated in this paper. Firstly, a deterministic encryption strategy is presented to achieve the same estimation performance as ...
- research-articleJanuary 2025
HGCNN-LSTM: A Data-driven Approach for Cyberattack Detection in Cyber-Physical Systems
AbstractIn recent years, integrating Industrial Control Systems (ICSs) with internet-connected environments has heightened their exposure to cyberattacks. Despite the enhanced cybersecurity measures, emerging attacks targeting network traffic in ...
- research-articleJanuary 2025JUST ACCEPTED
Feature-Oriented Modelling and Analysis of a Self-Adaptive Robotic System
- Juliane Päßler,
- Maurice H. ter Beek,
- Ferruccio Damiani,
- Clemens Dubslaff,
- Einar Broch Johnsen,
- Silvia Lizeth Tapia Tarifa
Improved autonomy in robotic systems is needed for innovation in, e.g., the marine sector. Autonomous robots that are let loose in hazardous environments, such as underwater, need to handle uncertainties that stem from both their environment and internal ...
- research-articleFebruary 2025
Command-governor-based stealthy attack design for estimation difference regulation
Automatica (Journal of IFAC) (AJIF), Volume 171, Issue Chttps://doi.org/10.1016/j.automatica.2024.111951AbstractIn the field of cyber–physical systems, significant attention has been received by the problem of stealthy attack strategy design for remote estimators, for which most existing approaches are exploited by maximizing the difference between the ...
-
- research-articleJanuary 2025
Optimal deception attacks under energy harvesting constraints for cyber–physical systems
AbstractThis paper investigates the design of optimal deception attacks against remote state estimation, where the attacker is equipped with energy harvesting capability to supply more energy resources for implementing the attacks. To derive the optimal ...
- research-articleDecember 2024
Collaboration failure analysis in cyber-physical system-of-systems using context fuzzy clustering
Empirical Software Engineering (KLU-EMSE), Volume 30, Issue 2https://doi.org/10.1007/s10664-024-10572-3AbstractA cyber-physical system-of-systems (CPSoS) facilitates the achievement of high-level goals, such as efficient traffic management on roads, by designing and developing the collaboration of constituent CPSs. A platooning that groups autonomous ...
- research-articleFebruary 2025
FingerCI: Writing industrial process specifications from network traffic
International Journal of Critical Infrastructure Protection (IJCIP), Volume 47, Issue Chttps://doi.org/10.1016/j.ijcip.2024.100725AbstractCritical infrastructures (CIs) are often targets of cyber-attacks, requiring accurate process specifications to identify and defend against incidents. However, discrepancies between these specifications and real-world CI conditions arise due to ...
- review-articleFebruary 2025
Process-aware security monitoring in industrial control systems: A systematic review and future directions
International Journal of Critical Infrastructure Protection (IJCIP), Volume 47, Issue Chttps://doi.org/10.1016/j.ijcip.2024.100719AbstractDue to the tight coupling between the cyber and physical components, control systems are subjected to emerging cyberattacks. In addition to attacks based on networking and communication, control systems are also susceptible to process-aware ...
- research-articleNovember 2024
An Entanglement-Aware Middleware for Digital Twins
ACM Transactions on Internet of Things (TIOT), Volume 5, Issue 4Article No.: 25, Pages 1–25https://doi.org/10.1145/3699520The development of the Digital Twin (DT) approach is tilting research from initial approaches that aim at promoting early adoption to sophisticated attempts to develop, deploy, and maintain applications based on DTs. In this context, we propose a highly ...
- review-articleNovember 2024
A PRISMA-driven systematic mapping study on system assurance weakeners
Information and Software Technology (INST), Volume 175, Issue Chttps://doi.org/10.1016/j.infsof.2024.107526Abstract Context:An assurance case is a structured hierarchy of claims aiming at demonstrating that a mission-critical system supports specific requirements (e.g., safety, security, privacy). The presence of assurance weakeners (i.e., assurance deficits, ...
- research-articleNovember 2024
Neural networks in closed-loop systems: Verification using interval arithmetic and formal prover
Engineering Applications of Artificial Intelligence (EAAI), Volume 137, Issue PBhttps://doi.org/10.1016/j.engappai.2024.109238AbstractMachine Learning approaches have been successfully used for the creation of high-performance control components of cyber–physical systems, where the control dynamics result from the combination of many subsystems. However, these approaches may ...
- ArticleOctober 2024
Formal Foundations of Consistency in Model-Driven Development
Leveraging Applications of Formal Methods, Verification and Validation. Specification and VerificationPages 178–200https://doi.org/10.1007/978-3-031-75380-0_11AbstractModels are abstractions used to precisely represent specific aspects of a system in order to make work easier for engineers. This separation of concerns naturally leads to a proliferation of models, and thus to the challenge of ensuring that all ...
- ArticleOctober 2024
Statistical Model Checking of Cooperative Autonomous Driving Systems
Leveraging Applications of Formal Methods, Verification and Validation. Rigorous Engineering of Collective Adaptive SystemsPages 316–332https://doi.org/10.1007/978-3-031-75107-3_19AbstractIn automotive engineering, one of the ideas of vehicle cooperation is to improve convoy movements to increase the safety and efficiency of transportation systems. The complexity and stochastic nature of such cooperative systems pose difficulties ...
- research-articleOctober 2024
IsaVODEs: Interactive Verification of Cyber-Physical Systems at Scale: IsaVODEs: Interactive Verification of Cyber-Physical Systems at Scale
- Jonathan Julián Huerta y Munive,
- Simon Foster,
- Mario Gleirscher,
- Georg Struth,
- Christian Pardillo Laursen,
- Thomas Hickman
AbstractWe formally introduce IsaVODEs (Isabelle verification with Ordinary Differential Equations), an open, compositional and extensible framework for the verification of cyber-physical systems. We extend a previous semantic approach with methods and ...
- ArticleOctober 2024
Dynamic, Multi-objective Specification and Falsification of Autonomous CPS
AbstractSimulation-based falsification has proved to be an effective verification method for cyber-physical systems. Traditional approaches to falsification take as input a single or a set of temporal properties that must be satisfied by the system at all ...
- research-articleOctober 2024
Zero-trust design and assurance patterns for cyber–physical systems
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 155, Issue Chttps://doi.org/10.1016/j.sysarc.2024.103261AbstractSecurity is paramount in all mission-critical domains, including the aerospace industry. Cyber-attacks are increasing both in number and sophistication. Zero-trust is an emerging initiative that has proven very effective for enterprise systems in ...
- research-articleOctober 2024
Security control for cyber–physical systems under aperiodic denial-of-service attacks: A memory-event-triggered active approach
AbstractThis paper is concerned with the security control problem for cyber–physical systems (CPSs) subjected to aperiodic denial-of-service (DoS) attacks. In order to mitigate the adverse impacts of DoS attacks, buffers are installed at both the event-...
Highlights- Reduce the communication frequency in quasi-steady state process by a novel METM.
- Design an active security control with historical signals against DoS attacks and network delays.
- Analyze the co-design of METM and the active ...
- research-articleOctober 2024
Co-design of distributed dynamic event-triggered scheme and extended dissipative consensus control for singular Markov jumping multi-agent systems under periodic Denial-of-Service jamming attacks
Expert Systems with Applications: An International Journal (EXWA), Volume 251, Issue Chttps://doi.org/10.1016/j.eswa.2024.124091AbstractThis paper introduces a distributed dynamic event-triggered (DDET) controller meticulously crafted to achieve resilient consensus control in singular Markov jumping multi-agent systems (SMJMAs) even in the face of periodic Denial-of-Service (DoS) ...
Highlights- A novel distributed dynamic event-triggered scheme under DoS attacks is proposed.
- Exponential consensus for singular Markov multi-agent systems is achieved.
- An extended dissipative consensus controller is designed.
- research-articleOctober 2024
Insider threat detection in cyber-physical systems: a systematic literature review
- Mohammed Nasser Al-Mhiqani,
- Tariq Alsboui,
- Taher Al-Shehari,
- Karrar hameed Abdulkareem,
- Rabiah Ahmad,
- Mazin Abed Mohammed
Computers and Electrical Engineering (CENG), Volume 119, Issue PAhttps://doi.org/10.1016/j.compeleceng.2024.109489AbstractThe rapid expansion of cyber-physical systems (CPSs) has introduced new security challenges, leading to the emergence of various threats, attacks, and controls aimed at addressing security concerns in this evolving CPS landscape. However, a ...