نتایج جستجو برای: physical security

تعداد نتایج: 830792  

Journal: :Information 2022

Critical infrastructures are an attractive target for attackers, mainly due to the catastrophic impact of these attacks on society. In addition, cyber–physical nature makes them more vulnerable threats and detection, investigation, remediation security difficult. Therefore, improving correlations, forensics investigations, Incident response tasks is paramount importance. This work describes SMS...

Journal: :International journal of smart security technologies 2021

The cyber-physical system (CPS) has made tremendous progress in recent years and also disrupting technical fields ranging from health, transportation, industries, more. However, CPS security is still one of the concerns for wide adoption owing to high number devices connecting internet traditional solutions may not be suitable protect advanced, application-specific attacks. This paper presents ...

Journal: :IEEE Communications Letters 2021

In this letter, the use of intelligent reflecting surface (IRS) to enhance physical layer security downlink wireless communication is investigated. Assuming a single-antenna legitimate user and multi-antenna eavesdropper, we propose an effective algorithm jointly optimize active passive beamforming. proposed algorithm, optimal transmit beamforming vector at BS under fixed IRS phase shifts deriv...

Journal: :IEEE Transactions on Automatic Control 2021

In cyber-physical systems (CPS), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms secure transmission since are becoming increasingly distributed over larger geographical areas. Distortion-based security, recently proposed one candidate transmissions in CPS, not o...

Journal: :IJCIP 2012
Mike Burmester Emmanouil Magkos Vassilios Chrissikopoulos

This paper describes a framework for modeling the security of a cyber–physical system in which the behavior of the adversary is controlled by a threat model that captures – in a unified manner – the cyber aspects (with discrete values) and the physical aspects (with continuous values) of the cyber–physical system. In particular, the framework addresses combined (dependent) vector attacks and sy...

Journal: :Wireless Communications and Mobile Computing 2018

Journal: :IEEE Transactions on Wireless Communications 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید