Journal articles on the topic 'Cyber-physical testing'

To see the other types of publications on this topic, follow the link: Cyber-physical testing.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber-physical testing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Woehrle, Matthias, Kai Lampka, and Lothar Thiele. "Conformance testing for cyber-physical systems." ACM Transactions on Embedded Computing Systems 11, no. 4 (December 2012): 1–23. http://dx.doi.org/10.1145/2362336.2362351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Deshmukh, Jyotirmoy, Marko Horvat, Xiaoqing Jin, Rupak Majumdar, and Vinayak S. Prabhu. "Testing Cyber-Physical Systems through Bayesian Optimization." ACM Transactions on Embedded Computing Systems 16, no. 5s (October 10, 2017): 1–18. http://dx.doi.org/10.1145/3126521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

QIN, Yi, Chang XU, Ziqi CHEN, and Jian LÜ. "Software testing for cyber-physical systems suffering uncertainty." SCIENTIA SINICA Informationis 49, no. 11 (November 1, 2019): 1428–50. http://dx.doi.org/10.1360/n112018-00305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Turlea, Ana. "Model-in-the-Loop Testing for Cyber Physical Systems." ACM SIGSOFT Software Engineering Notes 44, no. 1 (March 29, 2019): 37. http://dx.doi.org/10.1145/3310013.3310019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nikolopoulos, Dionysios, Georgios Moraitis, Dimitrios Bouziotas, Archontia Lykou, George Karavokiros, and Christos Makropoulos. "Cyber-Physical Stress-Testing Platform for Water Distribution Networks." Journal of Environmental Engineering 146, no. 7 (July 2020): 04020061. http://dx.doi.org/10.1061/(asce)ee.1943-7870.0001722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gromov, M. L., N. V. Yevtushenko, and A. V. Laputenko. "Testing Cyber-Physical Systems Using Timed Finite State Machines." Russian Physics Journal 59, no. 12 (April 2017): 2181–82. http://dx.doi.org/10.1007/s11182-017-1033-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pasternak, Iryna. "Research and Design of the Multifunctional Cyber-Physical System of Testing Computer Performance in WAN." Advances in Cyber-Physical Systems 4, no. 1 (March 23, 2019): 55–63. http://dx.doi.org/10.23939/acps2019.01.055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

El Hariri, Mohamad, Tarek Youssef, Mahmoud Saleh, Samy Faddel, Hany Habib, and Osama A. Mohammed. "A Framework for Analyzing and Testing Cyber–Physical Interactions for Smart Grid Applications." Electronics 8, no. 12 (December 1, 2019): 1455. http://dx.doi.org/10.3390/electronics8121455.

Full text
Abstract:
The reliable performance of the smart grid is a function of the configuration and cyber–physical nature of its constituting sub-systems. Therefore, the ability to capture the interactions between its cyber and physical domains is necessary to understand the effect that each one has on the other. As such, the work in this paper presents a co-simulation platform that formalizes the understanding of cyber information flow and the dynamic behavior of physical systems, and captures the interactions between them in smart grid applications. Power system simulation software packages, embedded microcontrollers, and a real communication infrastructure are combined together to provide a cohesive smart grid cyber–physical platform. A data-centric communication scheme, with automatic network discovery, was selected to provide an interoperability layer between multi-vendor devices and software packages, and to bridge different protocols. The effectiveness of the proposed framework was verified in three case studies: (1) hierarchical control of electric vehicles charging in microgrids, (2) International Electrotechnical Committee (IEC) 61850 protocol emulation for protection of active distribution networks, and (3) resiliency enhancement against fake data injection attacks. The results showed that the co-simulation platform provided a high-fidelity design, analysis, and testing environment for cyber information flow and their effect on the physical operation of the smart grid, as they were experimentally verified, down to the packet, over a real communication network.
APA, Harvard, Vancouver, ISO, and other styles
9

Heussen, Kai, Cornelius Steinbrink, Ibrahim F. Abdulhadi, Van Hoa Nguyen, Merkebu Z. Degefa, Julia Merino, Tue V. Jensen, et al. "ERIGrid Holistic Test Description for Validating Cyber-Physical Energy Systems." Energies 12, no. 14 (July 16, 2019): 2722. http://dx.doi.org/10.3390/en12142722.

Full text
Abstract:
Smart energy solutions aim to modify and optimise the operation of existing energy infrastructure. Such cyber-physical technology must be mature before deployment to the actual infrastructure, and competitive solutions will have to be compliant to standards still under development. Achieving this technology readiness and harmonisation requires reproducible experiments and appropriately realistic testing environments. Such testbeds for multi-domain cyber-physical experiments are complex in and of themselves. This work addresses a method for the scoping and design of experiments where both testbed and solution each require detailed expertise. This empirical work first revisited present test description approaches, developed a newdescription method for cyber-physical energy systems testing, and matured it by means of user involvement. The new Holistic Test Description (HTD) method facilitates the conception, deconstruction and reproduction of complex experimental designs in the domains of cyber-physical energy systems. This work develops the background and motivation, offers a guideline and examples to the proposed approach, and summarises experience from three years of its application.
APA, Harvard, Vancouver, ISO, and other styles
10

Araujo, Hugo, Gustavo Carvalho, Morteza Mohaqeqi, Mohammad Reza Mousavi, and Augusto Sampaio. "Sound conformance testing for cyber-physical systems: Theory and implementation." Science of Computer Programming 162 (September 2018): 35–54. http://dx.doi.org/10.1016/j.scico.2017.07.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Zhou, Xin, Xiaodong Gou, Tingting Huang, and Shunkun Yang. "Review on Testing of Cyber Physical Systems: Methods and Testbeds." IEEE Access 6 (2018): 52179–94. http://dx.doi.org/10.1109/access.2018.2869834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hallaq, Bil, Andrew Nicholson, Richard Smith, Leandros Maglaras, Allan Cook, Helge Janicke, and Kevin Jones. "A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems." International Journal of Smart Security Technologies 8, no. 1 (January 2021): 16–34. http://dx.doi.org/10.4018/ijsst.2021010102.

Full text
Abstract:
Incident response teams cannot prepare for every situation or predict every crisis, especially when they involve cyber-physical systems. As a result, training activities need to be provided to support operating in challenging situations to develop concrete guidance, procedures, and tools to help individuals collectively react in different, unpredictable situations. Experiential learning is a training technique based on the assumed importance of experimenting and involvement, proposing that active engagement in a scenario develops personal experiences that form the basis of understanding. Exercises are a form of serious games that are a proven method of delivering experiential learning. This article presents CYRAN, a realistic environment used for cyber warfare training, cyber resiliency testing, and cyber technology development. CYRAN is a low-cost cyber range that can be easily used for experiments on realistic scenarios for various educational and training purposes and for the collection of labelled datasets for further research.
APA, Harvard, Vancouver, ISO, and other styles
13

Biewer, Sebastian, Pedro R. D’argenio, and Holger Hermanns. "Doping Tests for Cyber-physical Systems." ACM Transactions on Modeling and Computer Simulation 31, no. 3 (July 31, 2021): 1–27. http://dx.doi.org/10.1145/3449354.

Full text
Abstract:
The software running in embedded or cyber-physical systems is typically of proprietary nature, so users do not know precisely what the systems they own are (in)capable of doing. Most malfunctionings of such systems are not intended by the manufacturer, but some are, which means these cannot be classified as bugs or security loopholes. The most prominent examples have become public in the diesel emissions scandal, where millions of cars were found to be equipped with software violating the law, altogether polluting the environment and putting human health at risk. The behaviour of the software embedded in these cars was intended by the manufacturer, but it was not in the interest of society, a phenomenon that has been called software doping . Due to the unavailability of a specification, the analysis of doped software is significantly different from that for buggy or insecure software and hence classical verification and testing techniques have to be adapted. The work presented in this article builds on existing definitions of software doping and lays the theoretical foundations for conducting software doping tests, so as to enable uncovering unethical manufacturers. The complex nature of software doping makes it very hard to effectuate doping tests in practice. We explain the main challenges and provide efficient solutions to realise doping tests despite this complexity.
APA, Harvard, Vancouver, ISO, and other styles
14

Vaagensmith, Bjorn, Vivek Kumar Singh, Robert Ivans, Daniel L. Marino, Chathurika S. Wickramasinghe, Jacob Lehmer, Tyler Phillips, Craig Rieger, and Milos Manic. "Review of Design Elements within Power Infrastructure Cyber–Physical Test Beds as Threat Analysis Environments." Energies 14, no. 5 (March 4, 2021): 1409. http://dx.doi.org/10.3390/en14051409.

Full text
Abstract:
Cyber–physical systems (CPSs) are an integral part of modern society; thus, enhancing these systems’ reliability and resilience is paramount. Cyber–physical testbeds (CPTs) are a safe way to test and explore the interplay between the cyber and physical domains and to cost-effectively enhance the reliability and resilience of CPSs. Here a review of CPT elements, broken down into physical components (simulators, emulators, and physical hardware), soft components (communication protocols, network timing protocols), and user interfaces (visualization-dashboard design considerations) is presented. Various methods used to validate CPS performance are reviewed and evaluated for potential applications in CPT performance validation. Last, initial simulated results for a CPT design, based on the IEEE 33 bus system, are presented, along with a brief discussion on how model-based testing and fault–injection-based testing (using scaling and ramp-type attacks) may be used to help validate CPT performance.
APA, Harvard, Vancouver, ISO, and other styles
15

Park, Moosung, Hyunjin Lee, Yonghyun Kim, Kookjin Kim, and Dongkyoo Shin. "Design and Implementation of Multi-Cyber Range for Cyber Training and Testing." Applied Sciences 12, no. 24 (December 7, 2022): 12546. http://dx.doi.org/10.3390/app122412546.

Full text
Abstract:
It is essential to build a practical environment of the training/test site for cyber training and weapon system test evaluation. In a military environment, cyber training sites should be continuously developed according to the characteristics of the military. Weapons with cyber security capabilities should be deployed through cyber security certification. Recently, each military has been building its own cyber range that simulates its battlefield environment. However, since the actual battlefield is an integrated operation environment, the cyber range built does not reflect the integrated battlefield environment that is interconnected. This paper proposes a configuration plan and operation function to construct a multi-cyber range reflecting the characteristics of each military to overcome this situation. In order to test the multi-cyber range, which has scenario authoring and operation functions, and can faithfully reflect reality, the impact of DDoS attacks is tested. It is a key to real-world mission-based test evaluation to ensure interoperability between military systems. As a result of the experiment, it was concluded that if a DDoS attack occurs due to the infiltration of malicious code into the military network, it may have a serious impact on securing message interoperability between systems in the military network. Cyber range construction technology is being developed not only in the military, but also in school education and businesses. The proposed technology can also be applied to the construction of cyber ranges in industries where cyber-physical systems are emphasized. In addition, it is a field that is continuously developing with the development of technology, such as being applied as an experimental site for learning machine learning systems.
APA, Harvard, Vancouver, ISO, and other styles
16

Hou, Yunfei, Yunjie Zhao, Aditya Wagh, Longfei Zhang, Chunming Qiao, Kevin F. Hulme, Changxu Wu, Adel W. Sadek, and Xuejie Liu. "Simulation-Based Testing and Evaluation Tools for Transportation Cyber–Physical Systems." IEEE Transactions on Vehicular Technology 65, no. 3 (March 2016): 1098–108. http://dx.doi.org/10.1109/tvt.2015.2407614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Dokhanchi, Adel, Bardh Hoxha, and Georgios Fainekos. "Formal Requirement Debugging for Testing and Verification of Cyber-Physical Systems." ACM Transactions on Embedded Computing Systems 17, no. 2 (April 26, 2018): 1–26. http://dx.doi.org/10.1145/3147451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Kulikov, I. A., K. E. Karpukhin, R. Kh Kurmaev, and V. G. Ivanov. "X-in-the-Loop technology for research and development of electric vehicles." Trudy NAMI, no. 2 (July 17, 2021): 6–14. http://dx.doi.org/10.51187/0135-3152-2021-2-6-14.

Full text
Abstract:
Introduction (problem statement and relevance). The article describes an X-in-the-Loop system intended for cyber-physical tests of electric vehicle's chassis components. The system allows connecting and synchronizing laboratories located in different geographic regions.The purpose of the study is to elaborate an X-in-the-Loop system allowing to perform geographically-scattered cyber-physical testing of the components belonging to an electric vehicle chassis.Methodology and research methods. The elaboration of the X-in-the-Loop system involves methods of cyber-physical testing whose functionality is extended by means of connecting and synchronizing the tested objects via a global network.Scientific novelty and results. A new research and development technology has been proposed for electric vehicles allowing for cooperation of geographically scattered laboratories within a real-time coherent environment that synchronizes tests of the electric vehicle components (both hardware and software) belonging to those laboratories.The practical significance. The proposed technology provides researchers and developers in the field of electric vehicles with advanced cyber-physical tools allowing them to increase the effectiveness of their cooperative work and shorten the time needed for producing development or research results.
APA, Harvard, Vancouver, ISO, and other styles
19

Kavallieratos, Georgios, Christos Grigoriadis, Angeliki Katsika, Georgios Spathoulas, Panayiotis Kotzanikolaou, and Sokratis Katsikas. "Risk assessment and control selection for cyber-physical systems: a case study on supply chain tracking systems." Journal of Surveillance, Security and Safety 3, no. 4 (2022): 128–49. http://dx.doi.org/10.20517/jsss.2022.17.

Full text
Abstract:
Aim: The paper proposes a novel risk assessment method ology for complex cyber-physical systems: The proposed method ology may assist risk assessors to: (a) assess the risks deriving from cyber and physical interactions among cyber-physical components; and (b) prioritize the control selection process for mitigating these risks. Methods: To achieve this, we combine and modify appropriately two recent risk assessment method ologies targeted to cyber physical systems and interactions, as underlying building blocks. By applying the existing method ology, we enable the utilization of well-known software vulnerability taxonomies, to extract vulnerability and impact submetrics for all the interactions among the system components. These metrics are then fed to the risk analysis phase in order to assess the overall cyber-physical risks and to prioritize the list of potential mitigation controls. Results: To validate the applicability and efficiency of the proposed method ology, we apply it in a realistic scenario involving supply chain tracking systems. Conclusion: Our results show that the proposed method ology can be effectively applied to capture the risks deriving from cyber and physical interactions among system components in realistic application scenarios, while for large scale networks further testing should be carried out.
APA, Harvard, Vancouver, ISO, and other styles
20

Kuc, Mateusz, Wojciech Sułek, and Dariusz Kania. "FPGA-Oriented LDPC Decoder for Cyber-Physical Systems." Mathematics 8, no. 5 (May 4, 2020): 723. http://dx.doi.org/10.3390/math8050723.

Full text
Abstract:
A potentially useful Cyber-Physical Systems element is a modern forward error correction (FEC) coding system, utilizing a code selected from the broad class of Low-Density Parity-Check (LDPC) codes. In this paper, development of a hardware implementation in an FPGAs of the decoder for Quasi-Cyclic (QC-LDPC) subclass of codes is presented. The decoder can be configured to support the typical decoding algorithms: Min-Sum or Normalized Min-Sum (NMS). A novel method of normalization in the NMS algorithm is proposed, one that utilizes combinational logic instead of arithmetic units. A comparison of decoders with different bit-lengths of data (beliefs that are messages propagated between computing units) is also provided. The presented decoder has been implemented with a distributed control system. Experimental studies were conducted using the Intel Cyclone V FPGA module, which is a part of the developed testing environment for LDPC coding systems.
APA, Harvard, Vancouver, ISO, and other styles
21

Nikolopoulos, Dionysios, and Christos Makropoulos. "Stress-testing water distribution networks for cyber-physical attacks on water quality." Urban Water Journal 19, no. 3 (November 4, 2021): 256–70. http://dx.doi.org/10.1080/1573062x.2021.1995446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Sauder, Thomas, and Sverre A. Alterskjær. "Hydrodynamic testing of wind-assisted cargo ships using a cyber–physical method." Ocean Engineering 243 (January 2022): 110206. http://dx.doi.org/10.1016/j.oceaneng.2021.110206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lee, Dong-Chul, Kyung-Min Seo, Hee-Mun Park, and Byeong Soo Kim. "Simulation Testing of Maritime Cyber-Physical Systems: Application of Model-View-ViewModel." Complexity 2022 (January 21, 2022): 1–14. http://dx.doi.org/10.1155/2022/1742772.

Full text
Abstract:
From the perspective of the system of systems development, system-level functional testing is required for designing subsystems. This study utilizes modeling and simulation techniques to analyze the operational behaviors of the subsystems and confirm data communication between them. The targeted system in the study is a naval combat system (NCS), which is a typical type of defense cyber-physical system (CPS). Three types of models were designed for the simulation testing of the NCS: a combat-management model for simulating the overall computational activities, physical models to confirm the intrasubsystem behaviors, and data integration models to test the intersubsystem communications. These models are realized with the Model-View-ViewModel design pattern, which strongly facilitates graphical user interfaces being decoupled from model logic and data. We consider underwater combat scenarios as an application. Six significant physical subsystems within the NCS are simulated and tested: a ship-steering system, an inertial navigation system, a global navigation satellite system, a periscope, sonar systems, and a plotting board. We expect that the proposed work will play a principal role when analyzing the behaviors and communications of defense CPSs and providing an environment for functional testing as a digital twin.
APA, Harvard, Vancouver, ISO, and other styles
24

Krueger, Volker, Francesco Rovida, Bjarne Grossmann, Ronald Petrick, Matthew Crosby, Arnaud Charzoule, German Martin Garcia, Sven Behnke, Cesar Toscano, and Germano Veiga. "Testing the vertical and cyber-physical integration of cognitive robots in manufacturing." Robotics and Computer-Integrated Manufacturing 57 (June 2019): 213–29. http://dx.doi.org/10.1016/j.rcim.2018.11.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Ma, Tao, Shaukat Ali, Tao Yue, and Maged Elaasar. "Testing self-healing cyber-physical systems under uncertainty: a fragility-oriented approach." Software Quality Journal 27, no. 2 (March 20, 2019): 615–49. http://dx.doi.org/10.1007/s11219-018-9437-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Sauder, Thomas, Stefano Marelli, and Asgeir J. Sørensen. "Probabilistic robust design of control systems for high-fidelity cyber–physical testing." Automatica 101 (March 2019): 111–19. http://dx.doi.org/10.1016/j.automatica.2018.11.040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Mehrabian, Mohammadreza, Mohammad Khayatian, Aviral Shrivastava, John C. Eidson, Patricia Derler, Hugo A. Andrade, Ya-Shian Li-Baboud, Edward Griffor, Marc Weiss, and Kevin Stanton. "Timestamp Temporal Logic (TTL) for Testing the Timing of Cyber-Physical Systems." ACM Transactions on Embedded Computing Systems 16, no. 5s (October 10, 2017): 1–20. http://dx.doi.org/10.1145/3126510.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Oruc, Aybars, Vasileios Gkioulos, and Sokratis Katsikas. "Towards a Cyber-Physical Range for the Integrated Navigation System (INS)." Journal of Marine Science and Engineering 10, no. 1 (January 14, 2022): 107. http://dx.doi.org/10.3390/jmse10010107.

Full text
Abstract:
The e-navigation concept was introduced by the IMO to enhance berth-to-berth navigation towards enhancing environmental protection, and safety and security at sea by leveraging technological advancements. Even though a number of e-navigation testbeds including some recognized by the IALA exist, they pertain to parts only of the Integrated Navigation System (INS) concept. Moreover, existing e-navigation and bridge testbeds do not have a cybersecurity testing functionality, therefore they cannot be used for assessing the cybersecurity posture of the INS. With cybersecurity concerns on the rise in the maritime domain, it is important to provide such capability. In this paper we review existing bridge testbeds, IMO regulations, and international standards, to first define a reference architecture for the INS and then to develop design specifications for an INS Cyber-Physical Range, i.e., an INS testbed with cybersecurity testing functionality.
APA, Harvard, Vancouver, ISO, and other styles
29

Rüssmeier, N., A. Lamm, and A. Hahn. "A generic testbed for simulation and physical-based testing of maritime cyber-physical system of systems." Journal of Physics: Conference Series 1357 (October 2019): 012025. http://dx.doi.org/10.1088/1742-6596/1357/1/012025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Nikolopoulos, Dionysios, Avi Ostfeld, Elad Salomons, and Christos Makropoulos. "Resilience Assessment of Water Quality Sensor Designs under Cyber-Physical Attacks." Water 13, no. 5 (February 28, 2021): 647. http://dx.doi.org/10.3390/w13050647.

Full text
Abstract:
Water distribution networks (WDNs) are critical infrastructure for the welfare of society. Due to their spatial extent and difficulties in deployment of security measures, they are vulnerable to threat scenarios that include the rising concern of cyber-physical attacks. To protect WDNs against different kinds of water contamination, it is customary to deploy water quality (WQ) monitoring sensors. Cyber-attacks on the monitoring system that employs WQ sensors combined with deliberate contamination events via backflow attacks can lead to severe disruptions to water delivery or even potentially fatal consequences for consumers. As such, the water sector is in immediate need of tools and methodologies that can support cyber-physical quality attack simulation and vulnerability assessment of the WQ monitoring system under such attacks. In this study we demonstrate a novel methodology to assess the resilience of placement schemes generated with the Threat Ensemble Vulnerability Assessment and Sensor Placement Optimization Tool (TEVA-SPOT) and evaluated under cyber-physical attacks simulated using the stress-testing platform RISKNOUGHT, using multidimensional metrics and resilience profile graphs. The results of this study show that some sensor designs are inherently more resilient than others, and this trait can be exploited in risk management practices.
APA, Harvard, Vancouver, ISO, and other styles
31

CELANOVIC, N. L., I. L. CELANOVIC, and Z. R. IVANOVIC. "Cyber Physical Systems: A New Approach to Power Electronics Simulation, Control and Testing." Advances in Electrical and Computer Engineering 12, no. 1 (2012): 33–38. http://dx.doi.org/10.4316/aece.2012.01006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Coppolino, Luigi, Salvatore D’Antonio, Vincenzo Giuliano, Giovanni Mazzeo, and Luigi Romano. "A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants." Computers in Industry 136 (April 2022): 103589. http://dx.doi.org/10.1016/j.compind.2021.103589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ma, Tao, Shaukat Ali, and Tao Yue. "Modeling foundations for executable model-based testing of self-healing cyber-physical systems." Software & Systems Modeling 18, no. 5 (November 27, 2018): 2843–73. http://dx.doi.org/10.1007/s10270-018-00703-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

R, Shuvar, Prodyvus A, Yuzevych V, Ogirko I, Ogirko O, Kovtko R, and Mysiuk R. "Information technologies and threats in cyberphysical systems for displaying information in underground metal structures with defects." Artificial Intelligence 26, jai2021.26(1) (June 30, 2021): 85–94. http://dx.doi.org/10.15407/jai2021.01.085.

Full text
Abstract:
Software implementation of a system for data searching and acquisition received from measurement of underground metal structures with defects, is described. This system collects the data using sensors and sends them to the web service for further loading into the database. Information encryption algorithms for such a system are presented. The web service is suggested to use HTTPS, data transfer protocol with OAuth secret keys. The NoSQL Elasticsearch database can be encrypted and used as additional protection for the used data store. It should be noted that the search and selection of useful information concerns the electric currents and voltages obtained by measuring the sensors during non-destructive testing. The properties of cyber security and the requirements for information security are analyzed for the cyber-physical system. The types of attacks and threats in cyber-physical systems are described. The main elements of Security Metrics as a science for modeling system security are considered. The various important criteria of metals for defective underground metal structures are given. Defining the security version of a cyber-physical system helps to find changes from previous versions of the software and thus point to potential cyber security vulnerabilities. The importance of the corrosion detection stage for underground metal structures is noted. The next step is to verify the cyber-physical system for security problems using automated tools according to the criteria. The functional diagram for a secure connection in the specified system is given. Security checks of the cyber-physical system can be performed with unauthorized access to systems with error messages, codes, etc. It was pointed out that the use of cryptographic techniques is advisable to preserve the confidentiality and integrity of the cyber-physical system
APA, Harvard, Vancouver, ISO, and other styles
35

Dantsker, Or D., Mirco Theile, and Marco Caccamo. "A Cyber-Physical Prototyping and Testing Framework to Enable the Rapid Development of UAVs." Aerospace 9, no. 5 (May 17, 2022): 270. http://dx.doi.org/10.3390/aerospace9050270.

Full text
Abstract:
In this work, a cyber-physical prototyping and testing framework to enable the rapid development of UAVs is conceived and demonstrated. The UAV Development Framework is an extension of the typical iterative engineering design and development process, specifically applied to the rapid development of UAVs. Unlike other development frameworks in the literature, the presented framework allows for iteration throughout the entire development process from design to construction, using a mixture of simulated and real-life testing as well as cross-aircraft development. The framework presented includes low- and high-order methods and tools that can be applied to a broad range of fixed-wing UAVs and can either be combined and executed simultaneously or be executed sequentially. As part of this work, seven novel and enhanced methods and tools were developed that apply to fixed-wing UAVs in the areas of: flight testing, measurement, modeling and emulation, and optimization. A demonstration of the framework to quickly develop an unmanned aircraft for agricultural field surveillance is presented.
APA, Harvard, Vancouver, ISO, and other styles
36

Blazek, Petr, Radek Fujdiak, Petr Mlynek, and Jiri Misurec. "Development of Cyber-Physical Security Testbed Based on IEC 61850 Architecture." Elektronika ir Elektrotechnika 25, no. 5 (October 6, 2019): 82–87. http://dx.doi.org/10.5755/j01.eie.25.5.24361.

Full text
Abstract:
The paper focuses on security in industrial control systems. Numerous protocols and their incompatibility are undermining the security design. Also, the IEC 61850 standard focuses on these issues. In detail, it deals with the compatibility between protocols and, partly, security. In the context of this work, a testbed together with the traffic generator for IEC 61850 standard and its three main parts – MMS (Manufacturing Message Specification), GOOSE (Generic Object-Oriented Substation Events), and Sampled Values - are designed. Additionally, the used generator is compared with an example of RTU (Remote Terminal Unit) used in standard ICS (Industrial Control Systems) networks. The last part of this work consists of the performance testing of the implemented protocols (MMS, GOOSE, and Sampled Values).
APA, Harvard, Vancouver, ISO, and other styles
37

Faramondi, L., F. Flammini, S. Guarino, and R. Setola. "A Hardware-in-the-Loop Water Distribution Testbed Dataset for Cyber-Physical Security Testing." IEEE Access 9 (2021): 122385–96. http://dx.doi.org/10.1109/access.2021.3109465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Claessen, Koen, Nicholas Smallbone, Johan Eddeland, Zahra Ramezani, and Knut Åkesson. "Using Valued Booleans to Find Simpler Counterexamples in Random Testing of Cyber-Physical Systems." IFAC-PapersOnLine 51, no. 7 (2018): 408–15. http://dx.doi.org/10.1016/j.ifacol.2018.06.333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Hannon, Christopher, Jiaqi Yan, and Dong Jin. "Distributed Virtual Time-Based Synchronization for Simulation of Cyber-Physical Systems." ACM Transactions on Modeling and Computer Simulation 31, no. 2 (April 2021): 1–24. http://dx.doi.org/10.1145/3446237.

Full text
Abstract:
Our world today increasingly relies on the orchestration of digital and physical systems to ensure the successful operations of many complex and critical infrastructures. Simulation-based testbeds are useful tools for engineering those cyber-physical systems and evaluating their efficiency, security, and resilience. In this article, we present a cyber-physical system testing platform combining distributed physical computing and networking hardware and simulation models. A core component is the distributed virtual time system that enables the efficient synchronization of virtual clocks among distributed embedded Linux devices. Virtual clocks also enable high-fidelity experimentation by interrupting real and emulated cyber-physical applications to inject offline simulation data. We design and implement two modes of the distributed virtual time: periodic mode for scheduling repetitive events like sensor device measurements, and dynamic mode for on-demand interrupt-based synchronization. We also analyze the performance of both approaches to synchronization including overhead, accuracy, and error introduced from each approach. By interconnecting the embedded devices’ general purpose IO pins, they can coordinate and synchronize with low overhead, under 50 microseconds for eight processes across four embedded Linux devices. Finally, we demonstrate the usability of our testbed and the differences between both approaches in a power grid control application.
APA, Harvard, Vancouver, ISO, and other styles
40

Певнев, Володимир Якович, Володимир Володимирович Торяник, and Вячеслав Сергійович Харченко. "КІБЕРБЕЗПЕКА БЕЗПРОВОДОВИХ СМАРТ-СИСТЕМ: КАНАЛИ ВТРУЧАНЬ ТА РАДІОЧАСТОТНІ ВРАЗЛИВОСТІ." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 4 (November 27, 2020): 79–92. http://dx.doi.org/10.32620/reks.2020.4.07.

Full text
Abstract:
The subject of this study is the radio frequency cyber vulnerability of information and control interaction technology in the wireless smart systems (WSS). WSS is the cyber-physical systems, that operate within the OSI model. The specificity and specialization of these systems are determined by radio technologies of the physical layer. For example, the Internet of Things (IoT, including medical IoMT), the Internet of Drones (IoD), systems for aviation monitoring ADS-B and traffic management ATM, and, in the future, the Internet of Everything (IoE) - all are types of WSS. The aim is to analyze the radio frequency parameters of information and control interaction in the WSS to identify possible radio frequency cyber vulnerabilities in the WSS. Objectives: summarize and systematize the physical and functional parameters of wireless technologies in the ISM (Industrial Scientific & Medical Band) and SRD (Short range devices) ranges, which are significant from the WSS radiofrequency cyber vulnerability perspective, including navigation technologies; analyze trends and methods of successful cyber attacks on the WSS; carry out expert assessments of potential WSSs cyber vulnerabilities depending on their architecture and application area. The methods used: analysis of trends in known radiofrequency incidents and expert assessments of the cyber vulnerability of the WSS information and control interaction channels. The following results were obtained: 12 actual WSS radio technologies were analyzed. 6 types of possible radio frequency cyber attacks on the WSS were typified. The expert assessment of the probability of exploiting vulnerabilities by ranges, radio technologies, and attack type was made. The special danger of high-tech targeted APT attacks, as well as the high potential radio vulnerability of cyber-physical systems, was shown. The cyber vulnerability of ADS-B aircraft systems was especially noted. Conclusions. The scientific novelty of the results obtained is as follows: a trend of APT attacks cost reduction and an increase in the probability of their implementation through the new capabilities of SDR technology (Software Defined Radio) were revealed. The possibility of a controlled SDR compromising of the security parameters of WSS channels in any radio range was shown. A promising direction of research was proposed - SDR-penetration testing of WSS.
APA, Harvard, Vancouver, ISO, and other styles
41

Burke, Ivan D., and Renier P. van Heerden. "The World is Polluted With Leaked Cyber Data." International Journal of Cyber Warfare and Terrorism 7, no. 4 (October 2017): 35–51. http://dx.doi.org/10.4018/ijcwt.2017100104.

Full text
Abstract:
Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly remediation is minimal. This research proposes that a similar approach to physical pollution (environmental pollution) can be used to map and identify data leaks as Cyber pollution. Thus, IT institutions should be made aware of their contribution to Cyber pollution in a more measurable method. This article defines the concept of cyber pollution as: security vulnerable (such as unmaintained or obsolete) devices that are visible through the Internet and corporate networks. This paper analyses the recent state of data breach disclosures Worldwide by providing statistics on significant scale data breach disclosures from 2014/01 to 2016/12. Ivan Burke and Renier van Heerden model security threat levels similar to that of pollution breaches within the physical environment. Insignificant security openings or vulnerabilities can lead to massive exploitation of entire systems. By modelling these breaches as pollution, the aim is to introduce the concept of cyber pollution. Cyber pollution is a more tangible concept for IT managers to relay to staff and senior management. Using anonymised corporate network traffic with Open Source penetration testing software, the model is validated.
APA, Harvard, Vancouver, ISO, and other styles
42

Du, Yan, Yuanyuan Huang, Guogen Wan, and Peilin He. "Deep Learning-Based Cyber–Physical Feature Fusion for Anomaly Detection in Industrial Control Systems." Mathematics 10, no. 22 (November 20, 2022): 4373. http://dx.doi.org/10.3390/math10224373.

Full text
Abstract:
In this paper, we propose an unsupervised anomaly detection method based on the Autoencoder with Long Short-Term Memory (LSTM-Autoencoder) network and Generative Adversarial Network (GAN) to detect anomalies in industrial control system (ICS) using cyber–physical fusion features. This method improves the recall of anomaly detection and overcomes the challenges of unbalanced datasets and insufficient labeled samples in ICS. As a first step, additional network features are extracted and fused with physical features to create a cyber–physical dataset. Following this, the model is trained using normal data to ensure that it can properly reconstruct the normal data. In the testing phase, samples with unknown labels are used as inputs to the model. The model will output an anomaly score for each sample, and whether a sample is anomalous depends on whether the anomaly score exceeds the threshold. Whether using supervised or unsupervised algorithms, experimentation has shown that (1) cyber–physical fusion features can significantly improve the performance of anomaly detection algorithms; (2) the proposed method outperforms several other unsupervised anomaly detection methods in terms of accuracy, recall, and F1 score; (3) the proposed method can detect the majority of anomalous events with a low false negative rate.
APA, Harvard, Vancouver, ISO, and other styles
43

Smadi, Abdallah A., Babatunde Tobi Ajao, Brian K. Johnson, Hangtian Lei, Yacine Chakhchoukh, and Qasem Abu Al-Haija. "A Comprehensive Survey on Cyber-Physical Smart Grid Testbed Architectures: Requirements and Challenges." Electronics 10, no. 9 (April 28, 2021): 1043. http://dx.doi.org/10.3390/electronics10091043.

Full text
Abstract:
The integration of improved control techniques with advanced information technologies enables the rapid development of smart grids. The necessity of having an efficient, reliable, and flexible communication infrastructure is achieved by enabling real-time data exchange between numerous intelligent and traditional electrical grid elements. The performance and efficiency of the power grid are enhanced with the incorporation of communication networks, intelligent automation, advanced sensors, and information technologies. Although smart grid technologies bring about valuable economic, social, and environmental benefits, testing the combination of heterogeneous and co-existing Cyber-Physical-Smart Grids (CP-SGs) with conventional technologies presents many challenges. The examination for both hardware and software components of the Smart Grid (SG) system is essential prior to the deployment in real-time systems. This can take place by developing a prototype to mimic the real operational circumstances with adequate configurations and precision. Therefore, it is essential to summarize state-of-the-art technologies of industrial control system testbeds and evaluate new technologies and vulnerabilities with the motivation of stimulating discoveries and designs. In this paper, a comprehensive review of the advancement of CP-SGs with their corresponding testbeds including diverse testing paradigms has been performed. In particular, we broadly discuss CP-SG testbed architectures along with the associated functions and main vulnerabilities. The testbed requirements, constraints, and applications are also discussed. Finally, the trends and future research directions are highlighted and specified.
APA, Harvard, Vancouver, ISO, and other styles
44

Murar, Mircea, and Stelian Brad. "Monitoring and Control of Dual-Arm Industrial Robot Tasks Using IoT Application and Services." Applied Mechanics and Materials 762 (May 2015): 255–60. http://dx.doi.org/10.4028/www.scientific.net/amm.762.255.

Full text
Abstract:
In the context of latest technological revolution, Industry 4.0, connectivity and therefore access and control of cyber-physical systems and resources from any place, at any time by any means represent a technological enabler of crucial importance. The first part of this paperwork contains a brief introduction of cyber-physical systems and IoT concepts, together with a review of major IoT providers. The second part introduces an approach towards achieving connectivity and remote control of task selection for a dual-arm industrial robot using a commercially available IoT infrastructure and technology provided by ioBridge. Within the third part, details about experimental testing and evaluation of the selected solutions are presented. The last part is allocated for conclusions and further research directions.
APA, Harvard, Vancouver, ISO, and other styles
45

Browne, Aidan F., Stacey Watson, and Wesley B. Williams. "Development of an Architecture for a Cyber-Physical Emulation Test Range for Network Security Testing." IEEE Access 6 (2018): 73273–79. http://dx.doi.org/10.1109/access.2018.2882410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Lezynski, Piotr, Pawel Szczesniak, Bartosz Waskowicz, Robert Smolenski, and Wojciech Drozdz. "Design and Implementation of a Fully Controllable Cyber-Physical System for Testing Energy Storage Systems." IEEE Access 7 (2019): 47259–72. http://dx.doi.org/10.1109/access.2019.2907612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Arrieta, Aitor, Shuai Wang, Goiuria Sagardui, and Leire Etxeberria. "Search-Based test case prioritization for simulation-Based testing of cyber-Physical system product lines." Journal of Systems and Software 149 (March 2019): 1–34. http://dx.doi.org/10.1016/j.jss.2018.09.055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Shin, Seung Yeob, Karim Chaouch, Shiva Nejati, Mehrdad Sabetzadeh, Lionel C. Briand, and Frank Zimmer. "Uncertainty-aware specification and analysis for hardware-in-the-loop testing of cyber-physical systems." Journal of Systems and Software 171 (January 2021): 110813. http://dx.doi.org/10.1016/j.jss.2020.110813.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Kats, V., and A. Volkov. "Features extraction from non-destructive testing data in cyber-physical monitoring system of construction facilities." Journal of Physics: Conference Series 1425 (December 2019): 012149. http://dx.doi.org/10.1088/1742-6596/1425/1/012149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

S, Smys, and Wang Haoxiang. "Data Elimination on Repetition using a Blockchain based Cyber Threat Intelligence." December 2020 2, no. 4 (January 5, 2021): 149–54. http://dx.doi.org/10.36548/jsws.2020.4.002.

Full text
Abstract:
Cyber threat is a major issue that has been terrorizing the computing work. A typical cyber-physical system is crucial in ensuring a safe and secure architecture of a sustainable computing ecosystem. Cyber Threat Intelligence (CTI) is a new methodology that is used to address some of the existing cyber threats and ensure a more secure environment for communication. Data credibility and reliability plays a vital role in increasing the potential of a typical CTI and the data collected for this purpose is said to be highly reliable. In this paper, we have introduced a CTI system using blockchain to tackle the issues of sustainability, scalability, privacy and reliability. This novel approach is capable of measuring organizations contributions, reducing network load, creating a reliable dataset and collecting CTI data with multiple feeds. We have testing various parameters to determine the efficiency of the proposed methodology. Experimental results show that when compared to other methodologies, we can save upto 20% of storage space using the proposed methodology.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography