Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
- Annual ACM Conference on Computer and Communications Security (CCS)
- IEEE International Conference on Distributed Computing Systems (ICDCS)
- Cyber-Physical Systems and Internet-of-Things Week (CPS-IoT Week)
also: Science of Security for Cyber-Physical Systems Workshop (SOSCYPS @ CPS-IoT Week)
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 292 matches
- 2024
- Alex Baird, Abhinandan Panda, Hammond Pearce, Srinivas Pinisetty, Partha S. Roop:
Scalable Security Enforcement for Cyber Physical Systems. IEEE Access 12: 14385-14410 (2024) - Shivani Gaba, Ishan Budhiraja, Vimal Kumar, Sheshikala Martha, Jebreel Khurmi, Akansha Singh, Krishna Kant Singh, Sameh S. Askar, Mohamed Abouhawwash:
A Systematic Analysis of Enhancing Cyber Security Using Deep Learning for Cyber Physical Systems. IEEE Access 12: 6017-6035 (2024) - Zhicong Sun, Yulong Ding, Ke Pei, Shuang-Hua Yang:
Contradictions Identification of Safety and Security Requirements for Industrial Cyber-Physical Systems. IEEE Internet Things J. 11(7): 12033-12057 (2024) - Cen Chen, Yangfan Li, Qinyu Wang, Xulei Yang, Xiaokang Wang, Laurence T. Yang:
An Intelligent Edge-Cloud Collaborative Framework for Communication Security in Distributed Cyber-Physical Systems. IEEE Netw. 38(1): 172-179 (2024) - Woo-Hyun Ko, Jorge Ramos-Ruiz, Tong Huang, Jaewon Kim, Hasan Ibrahim, Prasad N. Enjeti, P. R. Kumar, Le Xie:
Robust Dynamic Watermarking for Cyber-Physical Security of Inverter-Based Resources in Power Distribution Systems. IEEE Trans. Ind. Electron. 71(7): 7106-7116 (2024) - Valeriy Dudykevych, Galyna Mykytyn, Taras Stosyk, Pavlo Skladannyi:
Platform for the Security of Cyber-Physical Systems and the IoT in the Intellectualization of Society (short paper). CPITS 2024: 449-457 - Elias Seid, Oliver Popov, Fredrik Blix:
An Automated Adaptive Security Framework for Cyber-Physical Systems. ICISSP 2024: 242-253 - Alan Mills, Jonathan White, Phil Legg:
Cyber Funfair: Creating Immersive and Educational Experiences for Teaching Cyber Physical Systems Security. SIGCSE (1) 2024: 847-852 - 2023
- Lijing Zhai:
Architectures for Hardening Security in Intelligent Cyber-physical Systems. Georgia Institute of Technology, Atlanta, GA, USA, 2023 - Abhinandan Panda, Alex Baird, Srinivas Pinisetty, Partha S. Roop:
Incremental Security Enforcement for Cyber-Physical Systems. IEEE Access 11: 18475-18498 (2023) - Guowen Li, Lingyu Ren, Yangyang Fu, Zhiyao Yang, Veronica Adetola, Jin Wen, Qi Zhu, Teresa Wu, K. Selcuk Candan, Zheng O'Neill:
A critical review of cyber-physical security for building automation systems. Annu. Rev. Control. 55: 237-254 (2023) - Sabah Suhail, Mubashar Iqbal, Rasheed Hussain, Raja Jurdak:
ENIGMA: An explainable digital twin security solution for cyber-physical systems. Comput. Ind. 151: 103961 (2023) - Gaofeng He, Bingfeng Xu, Junjie Zhao, Yadong Shi:
Architecture-oriented security strategy determination for cyber-physical systems. Concurr. Comput. Pract. Exp. 35(13) (2023) - Buxiang Zhou, Binjie Sun, Tianlei Zang, Yating Cai, Jiale Wu, Huan Luo:
Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities. Entropy 25(1): 47 (2023) - Surjeet Dalal, M. Poongodi, Umesh Kumar Lilhore, Fadl Dahan, Thavavel Vaiyapuri, Ismail Keshta, Sultan Mesfer Aldossary, Amena Mahmoud, Sarita Simaiya:
Optimized LightGBM model for security and privacy issues in cyber-physical systems. Trans. Emerg. Telecommun. Technol. 34(6) (2023) - Aida Akbarzadeh, Sokratis K. Katsikas:
Dependency-based security risk assessment for cyber-physical systems. Int. J. Inf. Sec. 22(3): 563-578 (2023) - Abdulaziz A. Alsulami, Qasem Abu Al-Haija, Badraddin Alturki, Ali Alqahtani, Raed Alsini:
Security strategy for autonomous vehicle cyber-physical systems using transfer learning. J. Cloud Comput. 12(1): 181 (2023) - Yuhang Chen, Tieshan Li, Yue Long, Weiwei Bai:
Attacks detection and security control for cyber-physical systems under false data injection attacks. J. Frankl. Inst. 360(14): 10476-10498 (2023) - Ahmad Elhabashy, Lee J. Wells, Jaime A. Camelio:
Introducing randomness into univariate control chart sampling strategies for enhancing security against cyber-physical attacks in production systems. Qual. Reliab. Eng. Int. 39(3): 853-870 (2023) - Sarah Fluchs, Emre Tastan, Tobias Trumpf, Alexander Horch, Rainer Drath, Alexander Fay:
Traceable Security-by-Design Decisions for Cyber-Physical Systems (CPSs) by Means of Function-Based Diagrams and Security Libraries. Sensors 23(12): 5547 (2023) - Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh, Paulo Jorge Sequeira Gonçalves:
Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS). Sensors 23(12): 5459 (2023) - Irum Inayat, Muhammad Farooq, Zubaria Inayat:
Safety and security risks management process for cyber-physical systems: A case study. J. Softw. Evol. Process. 35(7) (2023) - R. Pavithra, Vishnu kumar Kaliappan, Sivaramakrishnan Rajendar:
Security Algorithm for Intelligent Transport System in Cyber-Physical Systems Perceptive: Attacks, Vulnerabilities, and Countermeasures. SN Comput. Sci. 4(5): 544 (2023) - Yong Xie, Gang Zeng, Ryo Kurachi, Fu Xiao, Hiroaki Takada, Shiyan Hu:
Timing Analysis of CAN FD for Security-Aware Automotive Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 20(4): 3064-3078 (2023) - Mansoor Ali, Georges Kaddoum, Wen-Tai Li, Chau Yuen, Muhammad Tariq, H. Vincent Poor:
A Smart Digital Twin Enabled Security Framework for Vehicle-to-Grid Cyber-Physical Systems. IEEE Trans. Inf. Forensics Secur. 18: 5258-5271 (2023) - Nektaria Kaloudi, Jingyue Li:
AST-SafeSec: Adaptive Stress Testing for Safety and Security Co-Analysis of Cyber-Physical Systems. IEEE Trans. Inf. Forensics Secur. 18: 5567-5579 (2023) - Yan Yu, Wen Yang, Wenjie Ding, Jiayu Zhou:
Reinforcement Learning Solution for Cyber-Physical Systems Security Against Replay Attacks. IEEE Trans. Inf. Forensics Secur. 18: 2583-2595 (2023) - Matthias Eckhart, Andreas Ekelhart, Stefan Biffl, Arndt Lüder, Edgar R. Weippl:
QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems. IEEE Trans. Ind. Informatics 19(4): 5870-5881 (2023) - Zhen Liu, Xinkai Chen, Jinpeng Yu:
Adaptive Sliding Mode Security Control for Stochastic Markov Jump Cyber-Physical Nonlinear Systems Subject to Actuator Failures and Randomly Occurring Injection Attacks. IEEE Trans. Ind. Informatics 19(3): 3155-3165 (2023) - Jitao Li, Zhenhua Wang, Yi Shen, Lihua Xie:
Security Synthesis for Cyber-Physical Systems. IEEE Trans. Syst. Man Cybern. Syst. 53(2): 1027-1037 (2023)
skipping 262 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 08:54 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint