SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L773:9781450341394 "

Sökning: L773:9781450341394

  • Resultat 1-2 av 2
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Papadimitratos, Panagiotis (författare)
  • Security on Wheels : Security and Privacy for Vehicular Communication Systems
  • 2016
  • Ingår i: CCS'16. - New York, NY, USA : Association for Computing Machinery (ACM). - 9781450341394 ; , s. 1855-1856
  • Konferensbidrag (refereegranskat)abstract
    • There is already a significant body of work on security and privacy for vehicular communication systems and the conditions for deploying the technology are maturing. This tutorial provides a crystalized and easily accessible view of the state of the art.
  •  
2.
  • Urbina, D. I., et al. (författare)
  • Limiting the impact of stealthy attacks on Industrial Control Systems
  • 2016
  • Ingår i: CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. - New York, NY, USA : ACM Digital Library. - 9781450341394 ; , s. 1092-1105
  • Konferensbidrag (refereegranskat)abstract
    • While attacks on information systems have for most practical purposes binary outcomes (information was manipulated/eavesdropped, or not), attacks manipulating the sensor or control signals of Industrial Control Systems (ICS) can be tuned by the attacker to cause a continuous spectrum in damages. Attackers that want to remain undetected can attempt to hide their manipulation of the system by following closely the expected behavior of the system, while injecting just enough false information at each time step to achieve their goals. In this work, we study if physics-based attack detection can limit the impact of such stealthy attacks. We start with a comprehensive review of related work on attack detection schemes in the security and control systems community. We then show that many of these works use detection schemes that are not limiting the impact of stealthy attacks. We propose a new metric to measure the impact of stealthy attacks and how they relate to our selection on an upper bound on false alarms. We finally show that the impact of such attacks can be mitigated in several cases by the proper combination and configuration of detection schemes. We demonstrate the effectiveness of our algorithms through simulations and experiments using real ICS testbeds and real ICS systems.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-2 av 2
Typ av publikation
konferensbidrag (2)
Typ av innehåll
refereegranskat (2)
Författare/redaktör
Sandberg, Henrik (1)
Papadimitratos, Pana ... (1)
Giraldo, J (1)
Faisal, M (1)
Ruths, J. (1)
Cardenas, A. A. (1)
visa fler...
Urbina, D. I. (1)
Tippenhauer, N. O. (1)
Valente, J. (1)
Candell, R. (1)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (2)
Språk
Engelska (2)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (1)
Teknik (1)
År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy