Safety and security of cyber-physical systems

被引:0
|
作者
Biro, Miklos [1 ]
Mashkoor, Atif [2 ]
Sametinger, Johannes [2 ]
机构
[1] Software Competence Ctr Hagenberg, Hagenberg, Austria
[2] Johannes Kepler Univ Linz, Linz, Austria
基金
奥地利科学基金会;
关键词
D O I
10.1002/smr.2522
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
8
引用
收藏
页数:3
相关论文
共 50 条
  • [1] Safety and security risk assessment in cyber-physical systems
    Lyu, Xiaorong
    Ding, Yulong
    Yang, Shuang-Hua
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2019, 4 (03) : 221 - 232
  • [2] Cyber-Physical Systems - Security
    Zseby, T.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2018, 135 (03): : 249 - 249
  • [3] Cyber-Physical Systems – Security
    Tanja Zseby
    e & i Elektrotechnik und Informationstechnik, 2018, 135 (3) : 249 - 249
  • [4] Security in Cyber-Physical Systems
    Dsouza, Joanita
    Elezabeth, Laura
    Mishra, Ved Prakash
    Jain, Rachna
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 840 - 844
  • [5] Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems
    Wolf, Marilyn
    Serpanos, Dimitrios
    PROCEEDINGS OF THE IEEE, 2018, 106 (01) : 9 - 20
  • [6] Safety and Security of Cyber-Physical and Internetof- Things Systems
    Wolf, Marilyn
    Serpanos, Dimitrios
    PROCEEDINGS OF THE IEEE, 2017, 105 (06) : 983 - 984
  • [7] Combining Safety and Security Engineering for Trustworthy Cyber-Physical Systems
    Schmittner, Christoph
    Ma, Zhendong
    Gruber, Thomas
    ERCIM NEWS, 2015, (102): : 19 - 20
  • [8] Security- and safety-critical cyber-physical systems
    Mashkoor, Atif
    Sametinger, Johannes
    Biro, Miklos
    Egyed, Alexander
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2020, 32 (02)
  • [9] Analysis of security in cyber-physical systems
    Chen, Jie
    Zhang, Fan
    Sun, Jian
    SCIENCE CHINA-TECHNOLOGICAL SCIENCES, 2017, 60 (12) : 1975 - 1977
  • [10] A survey on the security of cyber-physical systems
    Wu G.
    Sun J.
    Chen J.
    Control Theory and Technology, 2016, 14 (1) : 2 - 10