Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Wang R, Venugopalan S and Adepu S. (2024). Safety Analysis for Cyber-Physical Systems Under Cyber Attacks Using Digital Twin 2024 IEEE International Conference on Cyber Security and Resilience (CSR). 10.1109/CSR61664.2024.10679484. 979-8-3503-7536-7. (1-8).

    https://ieeexplore.ieee.org/document/10679484/

  • Li N, Zhang M, Li J, Adepu S, Kang E and Jin Z. (2024). A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems. ACM Transactions on Autonomous and Adaptive Systems. 19:2. (1-49). Online publication date: 30-Jun-2024.

    https://doi.org/10.1145/3652949

  • Alrumaih T, Alenazi M, AlSowaygh N, Humayed A and Alablani I. (2023). Cyber resilience in industrial networks: A state of the art, challenges, and future directions. Journal of King Saud University - Computer and Information Sciences. 10.1016/j.jksuci.2023.101781. 35:9. (101781). Online publication date: 1-Oct-2023.

    https://linkinghub.elsevier.com/retrieve/pii/S131915782300335X

  • Dedousis P, Stergiopoulos G, Arampatzis G and Gritzalis D. Enhancing Operational Resilience of Critical Infrastructure Processes Through Chaos Engineering. IEEE Access. 10.1109/ACCESS.2023.3316028. 11. (106172-106189).

    https://ieeexplore.ieee.org/document/10251941/

  • Palleti V, Adepu S, Mishra V and Mathur A. (2021). Cascading effects of cyber-attacks on interconnected critical infrastructure. Cybersecurity. 10.1186/s42400-021-00071-z. 4:1. Online publication date: 1-Dec-2021.

    https://cybersecurity.springeropen.com/articles/10.1186/s42400-021-00071-z

  • Castiglione L and Lupu E. Hazard Driven Threat Modelling for Cyber Physical Systems. Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy. (13-24).

    https://doi.org/10.1145/3411498.3419967