R "Zettelkasten/Literature Notes/.archive/CH4System_Representation_S2020pdf2254.md" -> ".archive/Literature Notes/.archive/CH4System_Representation_S2020pdf2254.md" R "Zettelkasten/Literature Notes/.archive/IntroductionDiffusionModels2022.md" -> ".archive/Literature Notes/.archive/IntroductionDiffusionModels2022.md" R "Zettelkasten/Literature Notes/.archive/Kry10TechnicalOverview.md" -> ".archive/Literature Notes/.archive/Kry10TechnicalOverview.md" R "Zettelkasten/Literature Notes/.archive/ME2046_Sampled_Data_Analysis_Reading_Chapter_2pdf2254ME.md" -> ".archive/Literature Notes/.archive/ME2046_Sampled_Data_Analysis_Reading_Chapter_2pdf2254ME.md" R "Zettelkasten/Literature Notes/.archive/ME2046_The_z_transform_Chapter_3pdf2254ME.md" -> ".archive/Literature Notes/.archive/ME2046_The_z_transform_Chapter_3pdf2254ME.md" R "Zettelkasten/Literature Notes/.archive/My Library.bib" -> ".archive/Literature Notes/.archive/My Library.bib" R "Zettelkasten/Literature Notes/.archive/aModeladoNucleoAnalisis2023.md" -> ".archive/Literature Notes/.archive/aModeladoNucleoAnalisis2023.md" R "Zettelkasten/Literature Notes/.archive/atsumiModifiedBodePlots2012.md" -> ".archive/Literature Notes/.archive/atsumiModifiedBodePlots2012.md"
2.6 KiB
| authors | citekey | alias | publish_date | journal | volume | pages | last_import | |||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
zacchialunStateArtCyberphysical2019 | zacchialunStateArtCyberphysical2019 | 2019-03-01 | Journal of Systems and Software | 149 | 174-216 | 2025-07-30 |
State of the art of cyber-physical systems security: An automatic control perspective
Indexing Information
Published: 2019-03
DOI 10.1016/j.jss.2018.12.006 #Cyber-physical-systems, #Security, #Systematic-mapping-study
#InSecondPass
[!Abstract] Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic mapping study sheds light on how security is actually addressed when dealing with cyber-physical systems from an automatic control perspective. The provided map of 138 selected studies is defined empirically and is based on, for instance, application fields, various system components, related algorithms and models, attacks characteristics and defense strategies. It presents a powerful comparison framework for existing and future research on this hot topic, important for both industry and academia.>[!seealso] Related Papers
Annotations
Notes
Highlights From Zotero
[!highlight] Highlight Characteristics and focus: the bulk of the works on CPS security is focused on power grids, while somehow surprisingly, we have not found any work on the cyber-physical security of medical CPS, and only a small part of selected papers is within the application field of secure control of (unmanned) ground vehicles and aerial systems, and of heating, ventilation, and air-conditioning in large functional buildings. All the works considered in this mapping study deal with attacks, in order to either implement or to counteract them: putting together all this studies gives us the possibility to categorize the existing (cyber-physical) attack models. 2025-05-01 10:55 am
[!tip] Brilliant Even if the repeatability process, capturing how a third party may reproduce the validation results of the method or technique, is recognized as a good scientific practice, we found no studies providing a replication package. 2025-05-01 10:56 am