Academic literature on the topic 'Control-oriented attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Control-oriented attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Control-oriented attacks"
Cheng, Long, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, and Danfeng (Daphne) Yao. "Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches." ACM Transactions on Privacy and Security 24, no. 4 (November 30, 2021): 1–36. http://dx.doi.org/10.1145/3462699.
Full textPisu, Pierluigi, Jim Martin, and Zoleikha Abdollahi Biron. "A Control Oriented Perspective for Security in Connected and Automated Vehicles." Mechanical Engineering 139, no. 12 (December 1, 2017): S17—S20. http://dx.doi.org/10.1115/1.2017-dec-10.
Full textSánchez, Helem S., Damiano Rotondo, Teresa Escobet, Vicenç Puig, and Joseba Quevedo. "Bibliographical review on cyber attacks from a control oriented perspective." Annual Reviews in Control 48 (2019): 103–28. http://dx.doi.org/10.1016/j.arcontrol.2019.08.002.
Full textMa, Jian Hong, and Li Xia Ji. "Shrew Attack on Internet Congestion Control Protocol in Control Engineering." Advanced Materials Research 648 (January 2013): 277–80. http://dx.doi.org/10.4028/www.scientific.net/amr.648.277.
Full textBhardwaj, Akashdeep, Fadi Al-Turjman, Manoj Kumar, Thompson Stephan, and Leonardo Mostarda. "Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems." IEEE Access 8 (2020): 104956–66. http://dx.doi.org/10.1109/access.2020.2998983.
Full textTian, Wan Li, Lian Zhong Liu, and Meng Liu. "Roles Generation for Applications in RBAC Model." Applied Mechanics and Materials 411-414 (September 2013): 35–39. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.35.
Full textDelgado, Raimarius, Jaeho Park, Cheonho Lee, and Byoung Wook Choi. "Safe and Policy Oriented Secure Android-Based Industrial Embedded Control System." Applied Sciences 10, no. 8 (April 17, 2020): 2796. http://dx.doi.org/10.3390/app10082796.
Full textWang, Zibo, Yaofang Zhang, Zhiyao Liu, Tongtong Li, Yilu Chen, Chen Yang, Bailing Wang, and Zhusong Liu. "A Prioritizing Interdiction Surface-Based Vulnerability Remediation Composite Metric for Industrial Control Systems." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–16. http://dx.doi.org/10.1155/2022/6442778.
Full textBaig, Ahmed Fraz, and Sigurd Eskeland. "Security, Privacy, and Usability in Continuous Authentication: A Survey." Sensors 21, no. 17 (September 6, 2021): 5967. http://dx.doi.org/10.3390/s21175967.
Full textGenge, Béla, Piroska Haller, Adrian-Vasile Duka, and Hunor Sándor. "A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems." at - Automatisierungstechnik 67, no. 5 (May 27, 2019): 417–28. http://dx.doi.org/10.1515/auto-2019-0017.
Full textDissertations / Theses on the topic "Control-oriented attacks"
Song, Sui. "Flow-oriented anomaly-based detection of denial of service attacks with flow-control-assisted mitigation." Thesis, 2006. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2006-036.
Full textErsan, Erkan. "On the (in)security of behavioral-based dynamic anti-malware techniques." Thesis, 2017. http://hdl.handle.net/1828/7935.
Full textGraduate
2018-02-07
0984
erkanersan@gmail.com
Book chapters on the topic "Control-oriented attacks"
Caldeira, Filipe, Tiago Cruz, Paulo Simões, and Edmundo Monteiro. "Towards Protecting Critical Infrastructures." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 121–65. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8456-0.ch007.
Full textToapanta Toapanta, Segundo Moisés, Yaritza Julieth Terán Terranova, Bertha Alice Naranjo Sánchez, and Luis Enrique Mafla Gallegos. "Security and Privacy in Information Management in a Distributed Environment for Public Organizations." In Fuzzy Systems and Data Mining VI. IOS Press, 2020. http://dx.doi.org/10.3233/faia200716.
Full textEllefsen, Ian, and Sebastiaan von Solms. "A Community-Oriented Approach to CIIP in Developing Countries." In Securing Critical Infrastructures and Critical Control Systems, 240–61. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2659-1.ch010.
Full textAbassi, Ryma. "Trust Management in Vehicular Ad hoc NETwork." In Security and Privacy in Smart Sensor Networks, 47–62. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5736-4.ch003.
Full textConference papers on the topic "Control-oriented attacks"
Hu, Hong, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai Liang. "Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks." In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016. http://dx.doi.org/10.1109/sp.2016.62.
Full textBiernacki, Lauren, Mark Gallagher, Valeria Bertacco, and Todd Austin. "Thwarting Control Plane Attacks with Displaced and Dilated Address Spaces." In 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2020. http://dx.doi.org/10.1109/host45689.2020.9300273.
Full textOgunsanya, B. O., and A. J. Ifebajo. "Developing a Proactive Environmental Management System (PEMS) in Offshore West Africa." In ASME 2001 Engineering Technology Conference on Energy. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/etce2001-17082.
Full textPeng, Yong, Yu Wang, Chong Xiang, Xifeng Liu, Zhe Wen, Dongqing Chen, and Chaojun Zhang. "Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment Environment." In 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2015. http://dx.doi.org/10.1109/iih-msp.2015.110.
Full textNiether, Sebastian, Bernhard Bobusch, David Marten, Georgios Pechlivanoglou, Christian Navid Nayeri, and Christian Oliver Paschereit. "Development of a Fluidic Actuator for Adaptive Flow Control on a Thick Wind Turbine Airfoil." In ASME Turbo Expo 2014: Turbine Technical Conference and Exposition. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/gt2014-25922.
Full textYu, Jinghua, Stefan Wagner Stefan Wagner, and Feng Luo. "A STPA-based Approach for Systematic Security Analysis of In-vehicle Diagnostic and Software Update Systems." In FISITA World Congress 2021. FISITA, 2021. http://dx.doi.org/10.46720/f2020-ves-020.
Full textAziminejad, Arash. "A Cyber-Physical Security Framework for Rail Transportation Data Systems." In 2022 Joint Rail Conference. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/jrc2022-78167.
Full text