Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
survey

A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems

Published: 26 April 2024 Publication History

Abstract

Concerns for the resilience of Cyber-Physical Systems (CPS)s in critical infrastructure are growing. CPS integrate sensing, computation, control, and networking into physical objects and mission-critical services, connecting traditional infrastructure to internet technologies. While this integration increases service efficiency, it has to face the possibility of new threats posed by the new functionalities. This leads to cyber-threats, such as denial-of-service, modification of data, information leakage, spreading of malware, and many others. Cyber-resilience refers to the ability of a CPS to prepare, absorb, recover, and adapt to the adverse effects associated with cyber-threats, e.g., physical degradation of the CPS performance resulting from a cyber-attack. Cyber-resilience aims at ensuring CPS survival by keeping the core functionalities of the CPS in case of extreme events. The literature on cyber-resilience is rapidly increasing, leading to a broad variety of research works addressing this new topic. In this article, we create a systematization of knowledge about existing scientific efforts of making CPSs cyber-resilient. We systematically survey recent literature addressing cyber-resilience with a focus on techniques that may be used on CPSs. We first provide preliminaries and background on CPSs and threats, and subsequently survey state-of-the-art approaches that have been proposed by recent research work applicable to CPSs. In particular, we aim at differentiating research work from traditional risk management approaches based on the general acceptance that it is unfeasible to prevent and mitigate all possible risks threatening a CPS. We also discuss questions and research challenges, with a focus on the practical aspects of cyber-resilience, such as the use of metrics and evaluation methods as well as testing and validation environments.

References

[1]
X. Ge, F. Yang, and Q. Han. 2017. Distributed networked control systems: A brief overview. Information Sciences, 380, 117–131.
[2]
X. M. Zhang, Q. L. Han, and X. Yu. 2016. Survey on recent advances in networked control systems. IEEE Transactions on Industrial Informatics 12, 5 (2016), 1740–1752.
[3]
L. Zhang, H. Gao, and O. Kaynak. 2013. Network-induced constraints in networked control systems – a survey. IEEE Transactions on Industrial Informatics 9, 1 (2013), 403–416.
[4]
Y. Z. Lun, A. D’Innocenzo, I. Malavolta, and M. D. Di Benedetto. 2019. Cyber-physical systems security: A systematic mapping study. Journal of Systems and Software 149 (2019), 174–216. arXiv: 1605.09641.
[5]
A. Teixeira, D. Pérez, H. Sandberg, and K. H. Johansson. 2012. Attack models and scenarios for networked control systems. In Proceedings of the 1st International Conference on High Confidence Networked Systems, HiCoNS’12, ACM, New York, NY, 55–64.
[6]
A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson. 2015. A secure control framework for resource-limited adversaries. Automatica 51 (2015), 135–148.
[7]
L. Fillatre, I. Nikiforov, P. Willett, et al. 2017. Security of SCADA systems against cyber–physical attacks. IEEE Aerospace and Electronic Systems Magazine 32, 5 (2017), 28–45.
[8]
R. Alguliyev, Y. Imamverdiyev, and L. Sukhostat. 2018. Cyber-physical systems and their security issues. Computers in Industry 100 (2018), 212–223.
[9]
N. Falliere, L. O. Murchu, and E. Chien. 2011. W32. Stuxnet dossier. White Paper, Symantec Corp., Security Response 5:6 (2011).
[10]
D. Corman, V. Pillitteri, S. Tousley, M. Tehranipoor, and U. Lindqvist. 2014. NITRD cyber-physical security panel. 35th IEEE Symposium on Security and Privacy, IEEE S&P 2014, San Jose, CA, May 18–21.
[11]
D. U. Case. 2016. Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC’16).
[12]
J. Slay and M. Miller. 2008. Lessons learned from the Maroochy water breach. In Critical Infrastructure Protection, Boston, MA. Springer US, 73–82.
[13]
H. S. Sánchez, D. Rotondo, T. Escobet, V. Puig, and J. Quevedo. 2019. Bibliographical review on cyber attacks from a control oriented perspective. Annual Reviews in Control 48 (2019), 103–128.
[14]
Y. L. Huang, A. A. Cárdenas, S. Amin, Z. S. Lin, H. Y. Tsai, and S. Sastry. 2009. Understanding the physical and economic consequences of attacks on control systems. International Journal of Critical Infrastructure Protection 2, 3 (2009), 73–83.
[15]
J. Rubio-Hernan, L. De Cicco, and J. Garcia-Alfaro. 2016. Event-triggered watermarking control to handle cyber-physical integrity attacks. In 21st Nordic Conference on Secure IT Systems (NordSec’16), Springer, 3–19.
[16]
J. Rubio-Hernan, L. De Cicco, and J. Garcia-Alfaro. 2017. Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems. Transactions on Emerging Telecommunications Technologies 32, 09 (2017).
[17]
C. Berger, P. Eichhammer, H. P. Reiser, J. Domaschka, F. J. Hauck, and G. Habiger. 2021. A survey on resilience in the IoT: Taxonomy, classification, and discussion of resilience mechanisms. ACM Comput. Surv. 54, 7 (2021).
[18]
S. Jackson. 2010. Architecting Resilient Systems: Accident Avoidance and Survival and Recovery from Disruptions, Wiley.
[19]
A. F. M. Piedrahita, V. Gaur, J. Giraldo, A. A. Cardenas, and S. J. Rueda. 2018. Leveraging software-defined networking for incident response in industrial control systems. IEEE Software 35, 1 (2018), 44–50.
[20]
B. Rathnayaka, C. Siriwardana, D. Robert, D. Amaratunga, and S. Setunge. 2022. Improving the resilience of critical infrastructures: Evidence-based insights from a systematic literature review. International Journal of Disaster Risk Reduction, 78:103123.
[21]
Y. Zhang, F. Xie, Y. Dong, G. Yang, and X. Zhou. 2013. High fidelity virtualization of cyber-physical systems. International Journal of Modeling, Simulation, and Scientific Computing 4, 2 (2013), 1–26.
[22]
D. I. Urbina, J. Giraldo, A. A. Cardenas, J. Valente, M. Faisal, N. O. Tippenhauer, J. Ruths, R. Candell, and H. Sandberg. 2016. Survey and new directions for physics-based attack detection in control systems. In Grant/Contract Reports (NISTGCR’16), National Institute of Standards and Technology (NIST), 1–37.
[23]
L. Ljung. 2010. Perspectives on system identification. Annual Reviews in Control 34, 1 (2010), 1–12.
[24]
G. C. Goodwin, M. Gevers, and B. Ninness. 1992. Quantifying the error in estimated transfer functions with application to model order selection. IEEE Transactions on Automatic Control 37, 7 (1992), 913–928.
[25]
L. Ljung. 1987. System Identification: Theory for the User. Prentice-Hall, Inc.
[26]
H. Natke. 1992. System identification: Torsten Söderström and Petre Stoica. Automatica 28, 5 (1992), 1069–1071.
[27]
N. L. Ricker. 1993. Model predictive control of a continuous, nonlinear, two-phase reactor. Journal of Process Control 3, 2 (1993), 109–123.
[28]
M. Barenthin Syberg. 2008. Complexity Issues, Validation and Input Design for Control in System Identification. PhD thesis, KTH School of Electrical Engineering, Stockholm, Sweden.
[29]
T. H. Lee, W. S. Ra, S. H. Jin, T. S. Yoon, and J. B. Park. 2004. Robust extended Kalman filtering via Krein space estimation. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E87-A, 1 (2004), 243–250.
[30]
K. Ogata. 2001. Modern Control Engineering (4th ed.). Prentice Hall PTR, Upper Saddle River, NJ.
[31]
A. Barrientos, I. Aguirre, J. Del Cerro, and P. Portero. 2001. LQG vs PID in attitude control of a unmanned aerial vehicle in hover. In 10th International Conference on Advanced Robotics (ICAR’01), 599–604.
[32]
G. F. Franklin, J. D. Powell, and M. L. Workman. 1998. Digital Control of Dynamic Systems (3rd ed.). Addison-Wesley Longman Publishing Co., Inc., Boston, MA.
[33]
Y. Mo, S. Weerakkody, and B. Sinopoli. 2015. Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Systems 35, 1 (2015), 93–109.
[34]
J. Rubio-Hernan, L. De Cicco, and J. Garcia-Alfaro. 2017. On the use of watermark-based schemes to detect cyber-physical attacks. EURASIP Journal on Information Security 2017 (2017), 1–25.
[35]
S. Weerakkody, O. Ozel, Y. Mo, and B. Sinopoli. 2020. Resilient control in cyber-physical systems: Countering uncertainty, constraints, and adversarial behavior. Foundations and Trends® in Systems and Control 7, 1-2 (2020), 1–252.
[36]
R. S. Smith. 2015. Covert misappropriation of networked control systems: Presenting a feedback structure. IEEE Control Systems 35, 1 (2015), 82–92.
[37]
A. Humayed, J. Lin, F. Li, and B. Luo. 2017. Cyber-physical systems security – a survey. arXiv:1701.04525 [cs]. arXiv: 1701.04525.
[38]
M. Krotofil and J. Larsen. 2015. Rocking the pocket book: Hacking chemical plants for competition and extortion. DEF CON, 23 (2015).
[39]
S. M. Dibaji, M. Pirani, D. B. Flamholz, A. M. Annaswamy, K. H. Johansson, and A. Chakrabortty. 2019. A systems and control perspective of CPS security. Annual Reviews in Control 47 (2019), 394–411.
[40]
A. A. Cárdenas, S. Amin, Z. S. Lin, Y. L. Huang, C. Y. Huang, and S. Sastry. 2011. Attacks against process control systems: Risk assessment, detection, and response. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security(ASIACCS’11). New York, NY. ACM, 355–366.
[41]
Y. Mo, R. Chabukswar, and B. Sinopoli. 2014. Detecting integrity attacks on SCADA systems. IEEE Transactions on Control Systems Technology 22, 4 (2014), 1396–1407.
[42]
Y. Yuan, Q. Zhu, F. Sun, Q. Wang, and T. Başar. 2013. Resilient control of cyber-physical systems against Denial-of-Service attacks. In 2013 6th International Symposium on Resilient Control Systems (ISRCS’13), 54–59.
[43]
W. Gao, T. Morris, B. Reaves, and D. Richey. 2010. On SCADA control system command and response injection and intrusion detection. In 2010 eCrime Researchers Summit, 1–9.
[44]
W. Gao and T. H. Morris. 2014. On cyber attacks and signature based intrusion detection for modbus based industrial control systems. The Journal of Digital Forensics, Security and Law: JDFSL 9, 1 (2014), 37.
[45]
Y. Chen, S. Kar, and J. M. F. Moura. 2016. Dynamic attack detection in cyber-physical systems with side initial state information. IEEE Transactions on Automatic Control PP, 99 (2016), 1–1.
[46]
A. Kott and I. Linkov. 2019. Cyber Resilience of Systems and Networks, Springer, 475 pages.
[47]
A. Clark and S. Zonouz. 2019. Cyber-physical resilience: Definition and assessment metric. IEEE Transactions on Smart Grid 10, 2 (2019), 1671–1684.
[48]
C. M. Bishop. 2006. Pattern Recognition and Machine Learning (Information Science and Statistics). Springer, Berlin.
[49]
J. Shawe-Taylor and N. Cristianini. 2004. Kernel Methods for Pattern Analysis. Cambridge University Press.
[50]
T. Hofmann, B. Schölkopf, and A. Smola. 2007. Kernel methods in machine learning. The Annals of Statistics, 36, 01 (2007).
[51]
R. Mitchell and I.-R. Chen. 2014. A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. 46, 4 (2014).
[52]
M. Cheminod, L. Durante, and A. Valenzano. 2013. Review of security issues in industrial networks. IEEE Transactions on Industrial Informatics 9, 1 (2013), 277–293.
[53]
S. Han, M. Xie, H. Chen, and Y. Ling. 2014. Intrusion detection in cyber-physical systems: Techniques and challenges. IEEE Systems Journal 8, 4 (2014), 1052–1062.
[54]
A. Ahmed, K. Abu Bakar, M. I. Channa, K. Haseeb, and A. W. Khan. 2015. A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Frontiers of Computer Science 9, 2 (2015), 280–296.
[55]
D. Ding, Q. L. Han, Y. Xiang, X. Ge, and X. M. Zhang. 2018. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275 (2018), 1674–1683.
[56]
J. M. Beaver, R. C. Borges-Hink, and M. A. Buckner. 2013. An evaluation of machine learning methods to detect malicious SCADA communications. In 2013 12th International Conference on Machine Learning and Applications, Vol. 2, 54–59.
[57]
S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen. 2013. Cyber security of water SCADA systems–Part II: Attack detection using enhanced hydrodynamic models. IEEE Transactions on Control Systems Technology 21, 5 (2013), 1679–1693.
[58]
M. Dehghani, Z. Khalafi, A. Khalili, and A. Sami. 2015. Integrity attack detection in PMU networks using static state estimation algorithm. In 2015 IEEE Eindhoven PowerTech, 1–6.
[59]
Q. Zhu and T. Başar. 2015. Game-theoretic methods for robustness, security, and resilience of cyber-physical control systems: Games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Systems 35, 1 (2015), 46–65.
[60]
R. B. Bobba, K. M. R. Q. Wang, H. Khurana, K. Nahtstedt, and T. J. Overbye. 2010. Detecting false data injection attacks on DC state estimation. In Proceeding of the 1st Workshop on Secure Control Systems (CPSWEEK’10), 1–9.
[61]
F. Pasqualetti, F. Dorfler, and F. Bullo. 2015. Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems. IEEE Control Systems 35, 1 (2015), 110–127.
[62]
D. Luenberger. 1971. An introduction to observers. IEEE Transactions on Automatic Control 16, 6 (1971), 596–602.
[63]
Y. Shoukry and P. Tabuada. 2016. Event-triggered state observers for sparse sensor noise/attacks. IEEE Transactions on Automatic Control 61, 8 (2016), 2079–2091.
[64]
C. Schellenberger and P. Zhang. 2017. Detection of covert attacks on cyber-physical systems by extending the system dynamics with an auxiliary system. In 2017 IEEE 56th Annual Conference on Decision and Control (CDC’17), 1374–1379.
[65]
F. Miao, M. Pajic, and G. J. Pappas. 2013. Stochastic game approach for replay attack detection. In 52nd IEEE Conference on Decision and Control, 1854–1859.
[66]
V. L. Do, L. Fillatre, and I. Nikiforov. 2014. A statistical method for detecting cyber/physical attacks on SCADA systems. In 2014 IEEE Conference on Control Applications (CCA’14), 364–369.
[67]
A. Arvani and V. S. Rao. 2014. Detection and protection against intrusions on smart grid systems. International Journal of Cyber-Security and Digital Forensics (IJCSDF’14) 3, 1 (2014), 38–48.
[68]
A. Y. Lokhov, N. Lemons, T. C. McAndrew, A. Hagberg, and S. Backhaus. 2016. Detection of cyber-physical faults and intrusions from physical correlations. In 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW’16), 303–310.
[69]
Y. Wang, Z. Xu, J. Zhang, L. Xu, H. Wang, and G. Gu. 2014. SRID: State relation based intrusion detection for false data injection attacks in SCADA. In Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II, 401–418. Springer International Publishing.
[70]
P.-Y. Chen, S. Yang, and J. A. McCann. 2015. Distributed real-time anomaly detection in networked industrial sensing systems. IEEE Transactions on Industrial Electronics 62, 6 (2015), 3832–3842.
[71]
Q. Phan and P. Malacaria. 2015. All-solution satisfiability modulo theories: Applications, algorithms and benchmarks. In 2015 10th International Conference on Availability, Reliability and Security, 100–109.
[72]
H. Beikzadeh and H. J. Marquez. 2014. Multirate observers for nonlinear sampled-data systems using input-to-state stability and discrete-time approximation. IEEE Transactions on Automatic Control 59, 9 (2014), 2469–2474.
[73]
H. Tan, B. Shen, Y. Liu, A. Alsaedi, and B. Ahmad. 2017. Event-triggered multi-rate fusion estimation for uncertain system with stochastic nonlinearities and colored measurement noises. Information Fusion, 36 (2017), 313–320.
[74]
H. Fawzi, P. Tabuada, and S. Diggavi. 2014. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Transactions on Automatic Control 59, 6 (2014), 1454–1467.
[75]
M. Pajic, J. Weimer, N. Bezzo, P. Tabuada, O. Sokolsky, I. Lee, and G. J. Pappas. 2014. Robustness of attack-resilient state estimators. In 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS’14), Berlin, Germany, April 2014. IEEE, 163–174.
[76]
M. Pajic, I. Lee, and G. J. Pappas. 2017. Attack-resilient state estimation for noisy dynamical systems. IEEE Transactions on Control of Network Systems 4, 1 (2017), 82–92.
[77]
Y. Mo and B. Sinopoli. 2015. Secure estimation in the presence of integrity attacks. IEEE Transactions on Automatic Control 60, 4 (2015), 1145–1151.
[78]
J. Keller, K. Chabir, and D. Sauter. 2016. Input reconstruction for networked control systems subject to deception attacks and data losses on control signals. International Journal of Systems Science 47, 4 (2016), 814–820.
[79]
J. Weimer, N. Bezzo, M. Pajic, O. Sokolsky, and I. Lee. 2014. Attack-resilient minimum mean-squared error estimation. In 2014 American Control Conference, Portland, OR, June 2014. IEEE, 1114–1119.
[80]
Y. Shoukry, P. Nuzzo, A. Puggelli, A. L. Sangiovanni-Vincentelli, S. A. Seshia, and P. Tabuada. 2017. Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach. IEEE Transactions on Automatic Control 62, 10 (2017), 4917–4932.
[81]
S. Mishra, Y. Shoukry, N. Karamchandani, S. N. Diggavi, and P. Tabuada. 2017. Secure state estimation against sensor attacks in the presence of noise. IEEE Transactions on Control of Network Systems 4, 1 (2017), 49–59.
[82]
L. De Moura and N. Bjørner. 2011. Satisfiability modulo theories: Introduction and applications. Commun. ACM 54, 9 (2011), 69–77.
[83]
W. Yang, L. Lei, and C. Yang. 2017. Event-based distributed state estimation under deception attack. Neurocomputing 270 (2017), 145–151.
[84]
L. Lei, W. Yang, and C. Yang. 2016. Event-based distributed state estimation over a WSN with false data injection attack. IFAC-PapersOnLine 49, 22 (2016), 286–290.
[85]
J. Giraldo, E. Sarkar, A. A. Cardenas, M. Maniatakos, and M. Kantarcioglu. 2017. Security and privacy in cyber-physical systems: A survey of surveys. IEEE Design Test 34, 4 (2017), 7–17.
[86]
X. Li, C. Zhou, Y. Tian, and Y. Qin. 2019. A dynamic decision-making approach for intrusion response in industrial control systems. IEEE Transactions on Industrial Informatics 15, 5 (2019), 2544–2554.
[87]
A. R. Cavalli, A. M. Ortiz, G. Ouffoué, C. A. Sanchez, and F. Zaïdi. 2018. Design of a secure shield for Internet and web-based services using software reflection. In Web Services (ICWS 2018), Springer International Publishing, Cham, 472–486.
[88]
Z. Ismail, J. Leneutre, and A. Fourati. 2018. Optimal deployment of security policies: Application to industrial control systems. In 2018 14th European Dependable Computing Conference (EDCC’18), 120–127.
[89]
C. Kiennert, Z. Ismail, H. Debar, and J. Leneutre. 2018. A survey on game-theoretic approaches for intrusion detection and response optimization. ACM Comput. Surv., 51, 5 (2018).
[90]
W. P. M. H. Heemels, K. H. Johansson, and P. Tabuada. 2012. An introduction to event-triggered and self-triggered control. In 2012 IEEE 51st IEEE Conference on Decision and Control (CDC’12), 3270–3285.
[91]
A. Cetinkaya, H. Ishii, and T. Hayakawa. 2016. Networked control under random and malicious packet losses. IEEE Transactions on Automatic Control, PP, 06 (2016).
[92]
Z. Sun, W. Xue, J. Liu, F. Chen, and X. Lu. 2022. Adaptive event-triggered resilient control of industrial cyber physical systems under asynchronous data injection attack. Journal of the Franklin Institute 359, 7 (2022), 3000–3023.
[93]
A. T. Campbell, I. Katzela, K. Miki, and J. Vicente. 1999. Open signaling for ATM, Internet and mobile networks (OpenSIG’98). SIGCOMM Comput. Commun. Rev. 29, 1 (1999), 97–108.
[94]
D. L. Tennenhouse, J. M. Smith, W. D. Sincoskie, D. J. Wetherall, and G. J. Minden. 1997. A survey of active network research. Comm. Mag. 35, 1 (1997), 80–86.
[95]
R. Enns, M. Bjorklund, J. Schoenwaelder, and A. Bierman. 2011. Network configuration protocol (NETCONF) - Internet Engineering Task Force, RFC 6241 .
[96]
D. Kreutz, F. M. V. Ramos, P. E. Verissimo, C. E. Rothenberg, S. Azodolmolky, and S. Uhlig. 2015. Software-defined networking: A comprehensive survey. Proceedings of the IEEE 103, 1 (2015), 14–76.
[97]
R. Sahay, G. Blanc, Z. Zhang, and H. Debar. 2015. Towards autonomic DDoS mitigation using software defined networking. In SENT 2015 : NDSS Workshop on Security of Emerging Networking Technologies, San Diego, CA, February 2015. Internet Society.
[98]
N. Hachem, H. Debar, and J. Garcia-Alfaro. 2012. HADEGA: A novel MPLS-based mitigation solution to handle network attacks. In 31st IEEE International Performance Computing and Communications Conference (IPCCC 2012), Austin, TX, December 1–3, 2012, 171–180.
[99]
J. Rubio-Hernan, R. Sahay, L. De Cicco, and J. Garcia-Alfaro. 2018. Cyber-physical architecture assisted by programmable networking. Internet Technology Letters, e44.
[100]
E. Molina and E. Yang. 2017. Software-defined networking in cyber-physical systems: A survey. Elsevier Enhanced Reader.
[101]
A. F. M. Piedrahita, V. Gaur, J. Giraldo, A. A. Cardenas, and S. J. Rueda. 2018. Virtual incident response functions in control systems. Computer Networks, 135 (2018), 147–159.
[102]
T. Jackson, B. Salamat, A. Homescu, K. Manivannan, G. Wagner, A. Gal, S. Brunthaler, C. Wimmer, and M. Franz. 2011. Compiler-Generated Software Diversity. Springer, New York, NY, 77–98.
[103]
B. De Sutter, B. Anckaert, J. Geiregat, D. Chanet, and K. De Bosschere. 2009. Instruction set limitation in support of software diversity. In Information Security and Cryptology (ICISC 2008). Springer, Berlin.
[104]
T. Jackson, A. Homescu, S. Crane, P. Larsen, S. Brunthaler, and M. Franz. 2013. Diversifying the software stack using randomized NOP insertion. In Moving Target Defense II, New York, NY. Springer, 151–173.
[105]
S. Bhatkar and R. Sekar. 2008. Data space randomization. In Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, Berlin, 1–22.
[106]
G. S. Kc, A. D. Keromytis, and V. Prevelakis. 2003. Countering code-injection attacks with instruction-set randomization. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS’03), New York, NY, USA. ACM, 272–280.
[107]
A. Homescu, S. Neisius, P. Larsen, S. Brunthaler, and M. Franz. 2013. Profile-guided automated software diversity. In Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO’13), 1–11.
[108]
L. V. Davi, A. Dmitrienko, S. Nürnberger, and A.-R. Sadeghi. 2013. Gadge me if you can: Secure and efficient ad-hoc instruction-level randomization for x86 and ARM. In 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ACM ASIACCS’13), ACM, 299–310.
[109]
P. Larsen, A. Homescu, S. Brunthaler, and M. Franz. 2014. SoK: Automated software diversity. In 2014 IEEE Symposium on Security and Privacy, 276–291.
[110]
G. Ouffoué, F. Zaïdi, A. R. Cavalli, and M. Lallali. 2017. How web services can be tolerant to intruders through diversification. In 2017 IEEE International Conference on Web Services (ICWS’17), 436–443.
[111]
L. Chen and A. Avizienis. 1995. N-version programming: A fault-tolerance approach to reliability of software operation. In 25th International Symposium on Fault-Tolerant Computing, 1995, Highlights from Twenty-Five Years, 113.
[112]
A. Chaves, M. Rice, S. Dunlap, and J. Pecarina. 2017. Improving the cyber resilience of industrial control systems. International Journal of Critical Infrastructure Protection 17 (2017), 30–48.
[113]
F. B. Cohen. 1993. Operating system protection through program evolution. Computers & Security 12, 6 (1993), 565–584.
[114]
Stephanie Forrest, Anil Somayaji, and David H. Ackley. 1997. Building diverse computer systems. In Proceedings The Sixth Workshop on Hot Topics in Operating Systems (Cat. No. 97TB100133), IEEE, 67–72.
[115]
A. Homescu, S. Brunthaler, P. Larsen, and M. Franz. 2013. Librando: Transparent code randomization for just-in-time compilers. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security(CCS’13), New York, NY, 993–1004.
[116]
B. Genge and C. Siaterlis. 2012. An experimental study on the impact of network segmentation to the resilience of physical processes. In NETWORKING 2012. Springer, Berlin, 121–134.
[117]
M. Krotofil and A. A. Cárdenas. 2013. Resilience of process control systems to cyber-physical attacks. In Secure IT Systems. Springer, Berlin, 166–182.
[118]
E. Bellini, F. Bagnoli, A. A. Ganin, and I. Linkov. 2019. Cyber resilience in IoT network: Methodology and example of assessment through epidemic spreading approach. In 2019 IEEE World Congress on Services (SERVICES’19), Vol. 2642-939X, 72–77.
[119]
L. Chen, D. Yue, C. Dou, Z. Cheng, and J. Chen. 2020. Robustness of cyber-physical power systems in cascading failure: Survival of interdependent clusters. International Journal of Electrical Power & Energy Systems, 114 (2020), 105374.
[120]
A. Avizienis, R. Avizienis, and A. V. Avizienis. 2016. The concept of a software-free resilience infrastructure for cyber-physical systems. In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W’16), 230–233.
[121]
M. A. Haque, S. Shetty, and B. Krishnappa. 2019. Modeling cyber resilience for energy delivery systems using critical system functionality. In 2019 Resilience Week (RWS’19), Vol. 1, 33–41.
[122]
A. Kwasinski. 2020. Modeling of cyber-physical intra-dependencies in electric power grids and their effect on resilience. In 2020 8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 1–6.
[123]
J. Xu, T. Zhang, Y. Du, W. Zhang, T. Yang, and J. Qiu. 2020. Islanding and dynamic reconfiguration for resilience enhancement of active distribution systems. Electric Power Systems Research, 189 (2020), 106749.
[124]
M. Segovia, A. R. Cavalli, N. Cuppens, J. Rubio-Hernan, and J. Garcia-Alfaro. 2020. Reflective attenuation of cyber-physical attacks. In Computer Security. Springer International Publishing, Cham, 19–34.
[125]
F. Januário, A. Cardoso, and P. Gil. 2019. A distributed multi-agent framework for resilience enhancement in cyber-physical systems. IEEE Access, 7 (2019), 31342–31357.
[126]
C. J. Marshall, B. Roberts, and M. W. Grenn. 2019. Context-driven autonomy for enhanced system resilience in emergent operating environments. IEEE Systems Journal 13, 3 (2019), 2130–2141.
[127]
C. Chen, K. Xie, F. L. Lewis, S. Xie, and R. Fierro. 2020. Adaptive synchronization of multi-agent systems with resilience to communication link faults. Automatica, 111 (2020), 108636.
[128]
P. Griffioen, R. Romagnoli, B. H. Krogh, and B. Sinopoli. 2020. Secure networked control for decentralized systems via software rejuvenation. In 2020 American Control Conference (ACC’20), 1266–1273.
[129]
S. Pradhan, A. Dubey, T. Levendovszky, P. S. Kumar, W. A. Emfinger, D. Balasubramanian, W. Otte, and G. Karsai. 2016. Achieving resilience in distributed software systems via self-reconfiguration. Journal of Systems and Software, 122 (2016), 344–363.
[130]
Q. Duan, E. Al-Shaer, and H. Jafarian. 2013. Efficient random route mutation considering flow and network constraints. In 2013 IEEE Conference on Communications and Network Security (CNS’13), 260–268.
[131]
D. Ma, C. Lei, L. Wang, H. Zhang, Z. Xu, and M. Li. 2016. A self-adaptive hopping approach of moving target defense to thwart scanning attacks. In Information and Communications Security. Springer International Publishing, Cham, 39–53.
[132]
C. Lei, H. Q. Zhang, J. L. Tan, Y. C. Zhang, and X. H. Liu. 2018. Moving target defense techniques: A survey. Security and Communication Networks 2018 (2018), 1–25.
[133]
J. Zheng and A. S. Namin. 2019. A survey on the moving target defense strategies: An architectural perspective. Journal of Computer Science and Technology 34, 1 (2019), 207–233.
[134]
B. Potteiger, A. Dubey, F. Cai, X. Koutsoukos, and Z. Zhang. 2022. Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems. Journal of Systems Architecture, 125 (2022), 102420.
[135]
X. Xu, H. Hu, Y. Liu, J. Tan, H. Zhang, and H. Song. 2022. Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack. Digital Communications and Networks 8, 3 (2022), 373–387.
[136]
M. Azab, M. Samir, and E. Samir. 2022. “MystifY”: A proactive moving-target defense for a resilient SDN controller in software defined CPS. Computer Communications 189 (2022), 205–220.
[137]
A. Kanellopoulos and K. Vamvoudakis. 2019. A moving target defense control framework for cyber-physical systems. IEEE Transactions on Automatic Control, 1–1.
[138]
E. Al-Shaer, Q. Duan, and J. Jafarian. 2013. Random host mutation for moving target defense. In Security and Privacy in Communication Networks, Springer, Berlin, 310–327.
[139]
S. Antonatos, P. Akritidis, E. Markatos, and K. Anagnostakis. 2007. Defending against hitlist worms using network address space randomization. Computer Networks 51, 12 (2007), 3471–3490.
[140]
V. Heydari. 2018. Moving target defense for securing SCADA communications. IEEE Access 6 (2018), 33329–33343.
[141]
R. Zhuang, S. A. DeLoach, and X. Ou. 2014. Towards a theory of moving target defense. In Proceedings of the 1st ACM Workshop on Moving Target Defense (MTD’14). ACM, New York, NY, 31–40.
[142]
D. C. MacFarland and C. A. Shue. 2015. The SDN shuffle: Creating a moving-target defense using host-based software-defined networking. In MTD’15. ACM, New York, NY, 37–41.
[143]
S. Dolev and S. T. David. 2014. SDN-based private interconnection. In 2014 IEEE 13th International Symposium on Network Computing and Applications, 129–136.
[144]
A. Aseeri, N. Netjinda, and R. Hewett. 2017. Alleviating eavesdropping attacks in software-defined networking data plane. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research(CISRC’17). ACM, New York, NY, 1:1–1:8.
[145]
S. Weerakkody and B. Sinopoli. 2016. A moving target approach for identifying malicious sensors in control systems. In 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton’16), Monticello, IL. IEEE, 1149–1156.
[146]
M. Segovia-Ferreira, J. Rubio-Hernan, R. Cavalli, and J. Garcia-Alfaro. 2020. Switched-based resilient control of cyber-physical systems. IEEE Access, 8 (2020), 212194–212208.
[147]
J. Giraldo, M. El Hariri, and M. Parvania. 2022. Moving target defense for cyber-physical systems using IoT-enabled data replication. IEEE Internet of Things Journal, 1–1.
[148]
M. Liu, C. Zhao, Z. Zhang, R. Deng, P. Cheng, and J. Chen. 2021. Converter-based moving target defense against deception attacks in DC microgrids. IEEE Transactions on Smart Grid, 1–1.
[149]
P. Griffioen, S. Weerakkody, and B. Sinopoli. 2020. A moving target defense for securing cyber-physical systems. IEEE Transactions on Automatic Control, 1–1.
[150]
J. Giraldo, A. Cardenas, and R. G. Sanfelice. 2019. A moving target defense to detect stealthy attacks in cyber-physical systems. In 2019 American Control Conference (ACC’19), 391–396.
[151]
N. Mavrogiannopoulos, N. Kisserli, and B. Preneel. 2011. A taxonomy of self-modifying code for obfuscation. Comput. Secur. 30, 8 (2011), 679–691.
[152]
Z. He, K. Ben, and Z. Zhang. 2008. Software architectural reflection mechanism for runtime adaptation. In 2008 The 9th International Conference for Young Computer Scientists, Hunan, China. IEEE, 1101–1105.
[153]
F. Kon, F. Costa, G. Blair, and R. H. Campbell. 2002. The case for reflective middleware. Communications of the ACM 45, 6 (2002).
[154]
D. Saldaña, A. Prorok, S. Sundaram, M. F. M. Campos, and V. Kumar. 2017. Resilient consensus for time-varying networks of dynamic agents. In 2017 American Control Conference (ACC’17), 252–258.
[155]
D. Meng and K. L. Moore. 2014. Studies on resilient control through multiagent consensus networks subject to disturbances. IEEE Transactions on Cybernetics 44, 11 (2014), 2050–2064.
[156]
J. Yan, Y. Mo, X. Li, L. Xing, and C. Wen. 2020. Resilient vector consensus: An event-based approach. In 2020 IEEE 16th International Conference on Control Automation (ICCA’20), 889–894.
[157]
J. Usevitch and D. Panagou. 2019. Resilient leader-follower consensus with time-varying leaders in discrete-time systems, 5432–5437.
[158]
M. Shabbir, J. Li, W. Abbas, and X. Koutsoukos. 2020. Resilient vector consensus in multi-agent networks using centerpoints. In 2020 American Control Conference (ACC’20), 4387–4392.
[159]
F. M. Zegers, P. Deptula, J. M. Shea, and W. E. Dixon. 2019. Event-triggered approximate leader-follower consensus with resilience to byzantine adversaries. In 2019 IEEE 58th Conference on Decision and Control (CDC’19), 6412–6417.
[160]
S. Sundaram and C. N. Hadjicostis. 2011. Distributed function calculation via linear iterative strategies in the presence of malicious agents. IEEE Transactions on Automatic Control 56, 7 (2011), 1495–1508.
[161]
T. A. Severson, B. Croteau, E. J. Rodríguez-Seda, K. Kiriakidis, R. Robucci, and C. Patel. 2020. A resilient framework for sensor-based attacks on cyber–physical systems using trust-based consensus and self-triggered control. Control Engineering Practice, 101 (2020), 104509.
[162]
F. Wen and Z. Wang. 2018. Distributed Kalman filtering for robust state estimation over wireless sensor networks under malicious cyber attacks. Digital Signal Processing 78 (2018), 92–97.
[163]
M. S. Mahmoud and H. M. Khalid. 2013. Distributed Kalman filtering: A bibliographic review. IET Control Theory & Applications 7, 4 (2013), 483–501.
[164]
A. Amini, Z. Zeinaly, A. Mohammadi, and A. Asif. 2019. Performance constrained distributed event-triggered consensus in multi-agent systems. In 2019 American Control Conference (ACC’19), 1830–1835.
[165]
S. Hasan, A. Dubey, G. Karsai, and X. Koutsoukos. 2020. A game-theoretic approach for power systems defense against dynamic cyber-attacks. International Journal of Electrical Power & Energy Systems, 115 (2020), 105432.
[166]
L. Huang and Q. Zhu. 2020. A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems. Computers & Security, 89 (2020), 101660.
[167]
A. Sanjab and W. Saad. 2016. On bounded rationality in cyber-physical systems security: Game-theoretic analysis with application to smart grid protection. In 2016 Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG’16), 1–6.
[168]
A. Kanellopoulos and K. G. Vamvoudakis. 2019. Non-equilibrium dynamic games and cyber–physical security: A cognitive hierarchy approach. Systems & Control Letters 125 (2019), 59–66.
[169]
Q. Zhu and T. Başar. 2013. Game-theoretic approach to feedback-driven multi-stage moving target defense. In Decision and Game Theory for Security, Vol. 8252. Springer International Publishing, Cham, 246–263.
[170]
N. S. V. Rao, C. Y. T. Ma, U. Shah, J. Zhuang, F. He, and D. K. Y. Yau. 2015. On resilience of cyber-physical infrastructures using discrete product-form games. In 2015 18th International Conference on Information Fusion (Fusion’15), 1451–1458.
[171]
R. Arghandeh, A. von Meier, L. Mehrmanesh, and L. Mili. 2016. On the definition of cyber-physical resilience in power systems. Renewable and Sustainable Energy Reviews 58 (2016), 1060–1069.
[172]
I. Linkov and B. D. Trump. 2019. The Science and Practice of Resilience. Risk, Systems and Decisions. Springer International Publishing, Cham.
[173]
Francesco Flammini. 2019. Resilience of Cyber-Physical Systems. Springer. https://link.springer.com/book/10.1007/978-3-319-95597-1
[174]
J. M. Rubio Hernan. 2017. Detection of Attacks against Cyber-physical Industrial Systems. Thesis, Institut National des Télécommunications.
[175]
Jeffrey D. Taft. 2021. Differentiating Resilience. Resilient Control Architectures and Power Systems (2021), 147–167.
[176]
N. Catano. 2022. Program synthesis for cyber-resilience. IEEE Transactions on Software Engineering, 1–1.
[177]
D. Williams, W. Hu, J. W. Davidson, J. D. Hiser, J. C. Knight, and A. Nguyen-Tuong. 2009. Security through diversity: Leveraging virtual machine technology. IEEE Security Privacy 7, 1 (2009), 26–33.
[178]
G. Ouffoué, F. Zaïdi, A. R. Cavalli, and H. Nghia Nguyen. 2020. A framework for the attack tolerance of cloud applications based on web services. Electronics 10, 1 (2020), 6.
[179]
M. Abdelmalak and M. Benidris. 2022. Enhancing power system operational resilience against wildfires. IEEE Transactions on Industry Applications 58, 2 (2022), 1611–1621.
[180]
D. Ratasich, O. Hoftberger, H. Isakovic, M. Shafique, and R. Grosu. 2017. A self-healing framework for building resilient cyber-physical systems. In 2017 IEEE 20th International Symposium on Real-Time Distributed Computing (ISORC’17), Toronto, ON, Canada. IEEE, 133–140.
[181]
P. Veríssimo, N. Neves, and M. Correia. 2003. Intrusion-tolerant architectures: Concepts and design. In Architecting Dependable Systems, Springer, Berlin, 3–36.
[182]
S. Forrest, A. Somayaji, and D. Ackley. 1997. Building diverse computer systems. In Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI), HOTOS’97, Washington, DC. IEEE, 67–72.
[183]
L. Lamport, R. Shostak, and M. Pease. 1982. The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4, 3 (1982), 382–401.
[184]
A. D. Fekete. 1986. Asymptotically optimal algorithms for approximate agreement. In Proceedings of the 5th Annual ACM Symposium on Principles of Distributed Computing (PODC’86), New York, NY. ACM, 73–87.
[185]
H. LeBlanc, H. Zhang, and X. Koutsoukos. 2013. Resilient asymptotic consensus in robust networks. IEEE Journal on Selected Areas in Communications 31, 4 (2013), 766–781.
[186]
A. Mitra and S. Sundaram. 2018. Distributed observers for LTI systems. IEEE Transactions on Automatic Control 63, 11 (2018), 3689–3704.
[187]
H. J. LeBlanc and X. Koutsoukos. 2018. Resilient first-order consensus and weakly stable, higher order synchronization of continuous-time networked multiagent systems. IEEE Transactions on Control of Network Systems 5, 3 (2018), 1219–1231.
[188]
S. Dibaji and H. Ishii. 2017. Resilient consensus of second-order agent networks: Asynchronous update rules with delays. Automatica, 81 (2017), 123–132.
[189]
A. Shamir. 1979. How to share a secret. Commun. ACM 22, 11 (1979), 612–613.
[190]
E. F. Brickell. 1990. Some ideal secret sharing schemes. In Advances in Cryptology — EUROCRYPT’89, Springer, Berlin, 468–475.
[191]
A. Beimel. 2011. Secret-sharing schemes: A survey. In International Conference on Coding and Cryptology, Springer, 11–46.
[192]
A. Abdul-Rahman and S. Hailes. 1997. A distributed trust model. In Proceedings of the 1997 Workshop on New Security Paradigms (NSPW’97), New York, NY. ACM, 48–60.
[193]
A. Jøsang. 1996. The right type of trust for distributed systems. In Proceedings of the 1996 Workshop on New Security Paradigms (NSPW’96), New York, NY. ACM, 119–131.
[194]
M. Ito, A. Saito, and T. Nishizeki. 1989. Secret sharing scheme realizing general access structure. Electronics and Communications in Japan (Part III: Fundamental Electronic Science) 72, 9 (1989), 56–64.
[195]
J. Benaloh and J. Leichter. 1990. Generalized secret sharing and monotone functions. In Advances in Cryptology - CRYPTO’ 88, New York, NY. Springer, 27–35.
[196]
E. F. Brickell. 1990. Some ideal secret sharing schemes. In Advances in Cryptology — EUROCRYPT’89, Springer, Berlin, 468–475.
[197]
M. Karchmer and A. Wigderson. 1993. On span programs. In [1993] Proceedings of the 8th Annual Structure in Complexity Theory Conference, 102–111.
[198]
D. Artz and Y. Gil. 2007. A survey of trust in computer science and the semantic web. Journal of Web Semantics 5, 2 (2007), 58–71.
[199]
E. Bellini, Y. Iraqi, and E. Damiani. 2020. Blockchain-based distributed trust and reputation management systems: A survey. IEEE Access 8 (2020), 21127–21151.
[200]
A. Ilavendhan and K. Saruladha. 2018. Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs. ICT Express 4, 1 (2018), 46–50.
[201]
Z. Ismail, J. Leneutre, D. Bateman, and L. Chen. 2016. A methodology to apply a game theoretic model of security risks interdependencies between ICT and electric infrastructures. In Decision and Game Theory for Security, Springer International Publishing, Cham, 159–171.
[202]
C. Kwon, W. Liu, and I. Hwang. 2013. Security analysis for cyber-physical systems against stealthy deception attacks. In 2013 American Control Conference, 3344–3349.
[203]
Yilin Mo and Bruno Sinopoli. 2010. False data injection attacks in control systems. In Preprints of the 1st workshop on Secure Control Systems. https://ptolemy.berkeley.edu/projects/truststc/conferences/10/CPSWeek/papers/scs1_paper_7.pdf
[204]
Y. Mo, E. Garone, A. Casavola, and B. Sinopoli. 2010. False data injection attacks against state estimation in wireless sensor networks. In 49th IEEE Conference on Decision and Control (CDC’10), 5967–5972.
[205]
A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson. 2012. Revealing stealthy attacks in control systems. In 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 1806–1813.
[206]
R. Smith. 2011. A decoupled feedback structure for covertly appropriating networked control systems. IFAC Proceedings Volumes 44, 1 (2011), 90–95.
[207]
I. Linkov and A. Kott. 2019. Fundamental concepts of cyber resilience: Introduction and overview. In Cyber Resilience of Systems and Networks, Risk, Systems and Decisions, Springer International Publishing, Cham, 1–25.
[208]
M. Conti, D. Donadel, and F. Turrin. 2021. A survey on industrial control system testbeds and datasets for security research. IEEE Communications Surveys & Tutorials 23, 4 (2021), 2248–2294.
[209]
G. Gonzalez-Granadillo, J. Rubio-Hernán, and J. Garcia-Alfaro. 2018. Towards a security event data taxonomy. In Risks and Security of Internet and Systems, Springer International Publishing, Cham, 29–45.

Cited By

View all
  • (2025)Empowered Cyber–Physical Systems security using both network and physical dataComputers & Security10.1016/j.cose.2025.104382152(104382)Online publication date: May-2025
  • (2024)Design Procedure for Real-Time Cyber–Physical Systems Tolerant to CyberattacksSymmetry10.3390/sym1606068416:6(684)Online publication date: 3-Jun-2024
  • (2024)Insights On Industrial Firewall and Its Application in Networked Control SystemsProceedings of the 2024 14th International Conference on Communication and Network Security10.1145/3711618.3711626(95-101)Online publication date: 6-Dec-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 56, Issue 8
August 2024
963 pages
EISSN:1557-7341
DOI:10.1145/3613627
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 April 2024
Online AM: 16 March 2024
Accepted: 12 March 2024
Revised: 11 March 2024
Received: 05 September 2022
Published in CSUR Volume 56, Issue 8

Check for updates

Author Tags

  1. Cyber-physical system
  2. critical infrastructure
  3. cyber-security
  4. cyber-resilience
  5. dependability
  6. attack mitigation
  7. graceful degradation

Qualifiers

  • Survey

Funding Sources

  • European Commission

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)888
  • Downloads (Last 6 weeks)124
Reflects downloads up to 22 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Empowered Cyber–Physical Systems security using both network and physical dataComputers & Security10.1016/j.cose.2025.104382152(104382)Online publication date: May-2025
  • (2024)Design Procedure for Real-Time Cyber–Physical Systems Tolerant to CyberattacksSymmetry10.3390/sym1606068416:6(684)Online publication date: 3-Jun-2024
  • (2024)Insights On Industrial Firewall and Its Application in Networked Control SystemsProceedings of the 2024 14th International Conference on Communication and Network Security10.1145/3711618.3711626(95-101)Online publication date: 6-Dec-2024
  • (2024)Deep Reinforcement Learning-based Multi-Layer Cascaded Resilient Recovery for Cyber-Physical SystemsIEEE Transactions on Services Computing10.1109/TSC.2024.3478729(1-14)Online publication date: 2024
  • (2024)Performance/Reliability Tradeoffs When Watermarking Cyber-Physical SystemsIEEE Transactions on Industrial Cyber-Physical Systems10.1109/TICPS.2024.34437722(606-614)Online publication date: 2024
  • (2024)Cyber Resilience in OT: Characteristics and Security Challenges2024 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR61664.2024.10679463(750-756)Online publication date: 2-Sep-2024
  • (2024)DeepOpt: A Deep Learning Optimized Privacy Preservation Framework for Cyber-Physical SystemsPhysica Scripta10.1088/1402-4896/ad6f58Online publication date: 14-Aug-2024

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media