ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1701.04525
  4. Cited By
Cyber-Physical Systems Security -- A Survey

Cyber-Physical Systems Security -- A Survey

17 January 2017
Abdulmalik Humayed
Jingqiang Lin
Fengjun Li
Bo Luo
ArXiv (abs)PDFHTML

Papers citing "Cyber-Physical Systems Security -- A Survey"

50 / 67 papers shown
Title
Federated Learning-Enhanced Blockchain Framework for Privacy-Preserving Intrusion Detection in Industrial IoT
Federated Learning-Enhanced Blockchain Framework for Privacy-Preserving Intrusion Detection in Industrial IoT
Anas Ali
Mubashar Husain
Peter Hans
25
0
0
21 May 2025
A Survey of Anomaly Detection in Cyber-Physical Systems
A Survey of Anomaly Detection in Cyber-Physical Systems
Danial Abshari
Meera Sridhar
96
3
0
18 Feb 2025
Adaptive Anomaly Detection for Identifying Attacks in Cyber-Physical Systems: A Systematic Literature Review
Adaptive Anomaly Detection for Identifying Attacks in Cyber-Physical Systems: A Systematic Literature Review
Pablo Moriano
Steven C. Hespeler
Mingyan Li
Maria Mahbub
AAML
148
1
0
21 Nov 2024
LightPure: Realtime Adversarial Image Purification for Mobile Devices
  Using Diffusion Models
LightPure: Realtime Adversarial Image Purification for Mobile Devices Using Diffusion Models
Hossein Khalili
Seongbin Park
Vincent Li
Brandan Bright
Ali Payani
Ramana Rao Kompella
Nader Sehatbakhsh
AAML
67
1
0
31 Aug 2024
Cyber Risk Assessment for Cyber-Physical Systems: A Review of
  Methodologies and Recommendations for Improved Assessment Effectiveness
Cyber Risk Assessment for Cyber-Physical Systems: A Review of Methodologies and Recommendations for Improved Assessment Effectiveness
Asila AlHarmali
Saqib Ali
Waqas Aman
Omar Hussain
39
0
0
29 Aug 2024
A Quantal Response Analysis of Defender-Attacker Sequential Security
  Games
A Quantal Response Analysis of Defender-Attacker Sequential Security Games
Md. Reya Shad Azim
Mustafa Abdallah
51
0
0
02 Aug 2024
OffRAMPS: An FPGA-based Intermediary for Analysis and Modification of
  Additive Manufacturing Control Systems
OffRAMPS: An FPGA-based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems
Jason Blocklove
Md Raz
Prithwish Basu Roy
Hammond Pearce
Prashanth Krishnamurthy
Farshad Khorrami
Ramesh Karri
38
1
0
23 Apr 2024
Security Modelling for Cyber-Physical Systems: A Systematic Literature
  Review
Security Modelling for Cyber-Physical Systems: A Systematic Literature Review
Shaofei Huang
Christopher M. Poskitt
Lwin Khin Shar
32
1
0
11 Apr 2024
Reconfigurable and Scalable Honeynet for Cyber-Physical Systems
Reconfigurable and Scalable Honeynet for Cyber-Physical Systems
Luís Sousa
José Cecílio
Pedro M. Ferreira
Alan Oliveira
AI4CE
40
3
0
05 Apr 2024
Deployment Challenges of Industrial Intrusion Detection Systems
Deployment Challenges of Industrial Intrusion Detection Systems
Konrad Wolsing
Eric Wagner
Frederik Basels
Patrick Wagner
Klaus Wehrle
62
1
0
04 Mar 2024
MTS-DVGAN: Anomaly Detection in Cyber-Physical Systems using a Dual
  Variational Generative Adversarial Network
MTS-DVGAN: Anomaly Detection in Cyber-Physical Systems using a Dual Variational Generative Adversarial Network
Haili Sun
Yan-Ming Huang
Lansheng Han
Cai Fu
Hongle Liu
Xiang Long
62
11
0
04 Nov 2023
Game Theory in Distributed Systems Security: Foundations, Challenges,
  and Future Directions
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions
Mustafa Abdallah
S. Bagchi
S. Bopardikar
Kevin S. Chan
Xing Gao
Murat Kantarcioglu
Congmiao Li
Peng Liu
Quanyan Zhu
77
0
0
03 Sep 2023
Digital Sovereignty Strategies for Every Nation
Digital Sovereignty Strategies for Every Nation
Ali Shoker
37
4
0
04 Jul 2023
You Can't Always Check What You Wanted: Selective Checking and Trusted
  Execution to Prevent False Actuations in Cyber-Physical Systems
You Can't Always Check What You Wanted: Selective Checking and Trusted Execution to Prevent False Actuations in Cyber-Physical Systems
M. Hasan
Sibin Mohan
42
0
0
27 Apr 2023
Murder by design: Design thinking approach for pre-emptive cybernetic
  security design
Murder by design: Design thinking approach for pre-emptive cybernetic security design
Rebekah Rousi
31
0
0
13 Apr 2023
Few-shot Detection of Anomalies in Industrial Cyber-Physical System via
  Prototypical Network and Contrastive Learning
Few-shot Detection of Anomalies in Industrial Cyber-Physical System via Prototypical Network and Contrastive Learning
Haili Sun
Yanzhe Huang
Lansheng Han
Chunjie Zhou
38
2
0
21 Feb 2023
A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems
A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems
Mariana Segovia-Ferreira
José Rubio-Hernán
A. Cavalli
J. Garcia-Alfaro
AI4CE
57
13
0
10 Feb 2023
Semantic Learning and Emulation Based Cross-platform Binary
  Vulnerability Seeker
Semantic Learning and Emulation Based Cross-platform Binary Vulnerability Seeker
Jian Gao
Yu Jiang
Zhe Liu
Xin Yang
Cong Wang
Xun Jiao
ZhenYu Yang
Jiaguang Sun
118
18
0
10 Nov 2022
A Unified View of IoT And CPS Security and Privacy
A Unified View of IoT And CPS Security and Privacy
Xinwen Fu
Christopher Morales-Gonzalez
Shan Wang
Zhen Ling
Xinwen Fu
53
5
0
28 Sep 2022
A Bibliometrics Analysis on 28 years of Authentication and Threat Model
  Area
A Bibliometrics Analysis on 28 years of Authentication and Threat Model Area
W. R. Bezerra
C. A. D. Souza
C. Westphall
Carlos Becker Westphall
51
0
0
26 Sep 2022
Missed Opportunities: Measuring the Untapped TLS Support in the
  Industrial Internet of Things
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things
Markus Dahlmanns
J. Lohmöller
Jan Pennekamp
Jörn Bodenhausen
Klaus Wehrle
Martin Henze
64
30
0
01 Jun 2022
A Systematic Survey of Attack Detection and Prevention in Connected and
  Autonomous Vehicles
A Systematic Survey of Attack Detection and Prevention in Connected and Autonomous Vehicles
Trupil Limbasiya
Ko Zheng Teng
Sudipta Chattopadhyay
Jianying Zhou
50
51
0
27 Mar 2022
Improving Radioactive Material Localization by Leveraging Cyber-Security
  Model Optimizations
Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations
Ryan Sheatsley
M. Durbin
A. Lintereur
Patrick McDaniel
48
6
0
21 Feb 2022
The Global State of Security in Industrial Control Systems: An Empirical
  Analysis of Vulnerabilities around the World
The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World
S. D. Antón
Daniel Fraunholz
Daniel Krohmer
Daniel Reti
Daniel Schneider
Hans D. Schotten
39
16
0
27 Nov 2021
Cross-Layered Distributed Data-driven Framework For Enhanced Smart Grid
  Cyber-Physical Security
Cross-Layered Distributed Data-driven Framework For Enhanced Smart Grid Cyber-Physical Security
Allen Starke
Keerthiraj Nagaraj
Cody Ruben
Nader Aljohani
Sheng Zou
A. Bretas
J. Mcnair
Alina Zare
37
19
0
10 Nov 2021
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific
  Industrial Intrusion Detection Systems
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
Konrad Wolsing
Eric Wagner
Antoine Saillard
Martin Henze
73
32
0
05 Nov 2021
Home Energy Management Systems: Operation and Resilience of Heuristics
  against Cyberattacks
Home Energy Management Systems: Operation and Resilience of Heuristics against Cyberattacks
Hafiz Majid Hussain
A. Narayanan
Subham S. Sahoo
Yongheng Yang
P. H. Nardelli
F. Blaabjerg
30
6
0
21 Sep 2021
A Survey of Honeypots and Honeynets for Internet of Things, Industrial
  Internet of Things, and Cyber-Physical Systems
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems
Javier Franco
Ahmet Aris
B. Canberk
A. S. Uluagac
81
147
0
04 Aug 2021
Toward Safe Integration of Legacy SCADA Systems in the Smart Grid
Toward Safe Integration of Legacy SCADA Systems in the Smart Grid
A. C. Chan
Jianying Zhou
25
2
0
13 Jul 2021
Time Series Anomaly Detection for Cyber-Physical Systems via Neural
  System Identification and Bayesian Filtering
Time Series Anomaly Detection for Cyber-Physical Systems via Neural System Identification and Bayesian Filtering
Cheng Feng
Pengwei Tian
AI4TS
75
78
0
15 Jun 2021
Security and Privacy in the Emerging Cyber-Physical World: A Survey
Security and Privacy in the Emerging Cyber-Physical World: A Survey
Zhiyuan Yu
Zack Kaplan
Qiben Yan
Ning Zhang
44
32
0
27 May 2021
An RL-Based Adaptive Detection Strategy to Secure Cyber-Physical Systems
An RL-Based Adaptive Detection Strategy to Secure Cyber-Physical Systems
Ipsita Koley
Sunandan Adhikary
Soumyajit Dey
97
0
0
04 Mar 2021
IoT-Enabled Social Relationships Meet Artificial Social Intelligence
IoT-Enabled Social Relationships Meet Artificial Social Intelligence
Sahraoui Dhelim
Huansheng Ning
Fadi Farha
L. Chen
L. Atzori
M. Daneshmand
GNN
71
55
0
21 Feb 2021
Scanning the Cycle: Timing-based Authentication on PLCs
Scanning the Cycle: Timing-based Authentication on PLCs
Chuadhry Mujeeb Ahmed
Martín Ochoa
Jianying Zhou
A. Mathur
54
16
0
17 Feb 2021
Resilient Machine Learning for Networked Cyber Physical Systems: A
  Survey for Machine Learning Security to Securing Machine Learning for CPS
Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS
Felix O. Olowononi
D. Rawat
Chunmei Liu
95
138
0
14 Feb 2021
MiniV2G: An Electric Vehicle Charging Emulator
MiniV2G: An Electric Vehicle Charging Emulator
Luca Attanasio
Mauro Conti
Denis Donadel
Federico Turrin
58
9
0
27 Jan 2021
Cybersecurity of Industrial Cyber-Physical Systems: A Review
Cybersecurity of Industrial Cyber-Physical Systems: A Review
Hakan Kayan
Matthew Nunes
Omer F. Rana
Pete Burnap
Charith Perera
AI4CE
93
126
0
10 Jan 2021
SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things
  and Cyber-Physical Systems based on Machine Learning
SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning
Tanujay Saha
N. Aaraj
Neel Ajjarapu
N. Jha
50
26
0
07 Jan 2021
Poisoning Attacks on Cyber Attack Detectors for Industrial Control
  Systems
Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems
Moshe Kravchik
Battista Biggio
A. Shabtai
AAML
67
28
0
23 Dec 2020
Assessment of System-Level Cyber Attack Vulnerability for Connected and
  Autonomous Vehicles Using Bayesian Networks
Assessment of System-Level Cyber Attack Vulnerability for Connected and Autonomous Vehicles Using Bayesian Networks
G. Comert
M. Chowdhury
D. Nicol
24
1
0
18 Nov 2020
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure
  Deployments
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments
Markus Dahlmanns
J. Lohmöller
I. Fink
Jan Pennekamp
Klaus Wehrle
Martin Henze
47
40
0
26 Oct 2020
Safeguarding the IoT from Malware Epidemics: A Percolation Theory
  Approach
Safeguarding the IoT from Malware Epidemics: A Percolation Theory Approach
Ainur Zhaikhan
Mustafa A. Kishk
Hesham Elsawy
Mohamed-Slim Alouini
22
16
0
24 Oct 2020
Detection of Anomalies and Faults in Industrial IoT Systems by Data
  Mining: Study of CHRIST Osmotron Water Purification System
Detection of Anomalies and Faults in Industrial IoT Systems by Data Mining: Study of CHRIST Osmotron Water Purification System
Mohammad Sadegh Sadeghi Garmaroodi
F. Farivar
M. Sayad Haghighi
M. A. Shoorehdeli
Alireza Jolfaei
28
1
0
08 Sep 2020
Reinforcement Learning Based Penetration Testing of a Microgrid Control
  Algorithm
Reinforcement Learning Based Penetration Testing of a Microgrid Control Algorithm
Christopher Neal
H. Dagdougui
Andrea Lodi
José M. Fernandez
31
14
0
30 Aug 2020
Evaluation of Attack Vectors and Risks in Automobiles and Road
  Infrastructure
Evaluation of Attack Vectors and Risks in Automobiles and Road Infrastructure
J. Brewer
G. Dimitoglou
22
2
0
29 Jun 2020
Spatial Firewalls: Quarantining Malware Epidemics in Large Scale Massive
  Wireless Networks
Spatial Firewalls: Quarantining Malware Epidemics in Large Scale Massive Wireless Networks
Hesham Elsawy
Mustafa A. Kishk
Mohamed-Slim Alouini
27
15
0
09 Jun 2020
G-IDS: Generative Adversarial Networks Assisted Intrusion Detection
  System
G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System
Md Hasan Shahriar
Nur Imtiazul Haque
M. Rahman
M. Alonso
AAML
72
99
0
01 Jun 2020
Revisiting Anomaly Detection in ICS: Aimed at Segregation of Attacks and
  Faults
Revisiting Anomaly Detection in ICS: Aimed at Segregation of Attacks and Faults
Chuadhry Mujeeb Ahmed
J. Prakash
Jianying Zhou
33
4
0
25 Apr 2020
Securing Vehicle-to-Everything (V2X) Communication Platforms
Securing Vehicle-to-Everything (V2X) Communication Platforms
M. Hasan
Sibin Mohan
Takayuki Shimizu
Hongsheng Lu
56
161
0
12 Mar 2020
Securing Autonomous Service Robots through Fuzzing, Detection, and
  Mitigation
Securing Autonomous Service Robots through Fuzzing, Detection, and Mitigation
Chundong Wang
Yee Ching Tok
Rohini Poolat
Sudipta Chattopadhyay
M. R. Elara
37
2
0
12 Mar 2020
12
Next