Back to Results
First PageMeta Content
Computer network security / Cyberwarfare / Crime prevention / Telemetry / SCADA / Computer security / Cyber-physical system / Computer insecurity / Attack / Technology / Security / National security


Challenges for Securing Cyber Physical Systems Alvaro A. C´ardenas∗ , Saurabh Amin† , Bruno Sinopoli‡ ,
Add to Reading List

Document Date: 2009-07-13 12:34:19


Open Document

File Size: 127,45 KB

Share Result on Facebook

City

Oak Harbor / Sacramento / San Jose / Boston / Miami / /

Company

Secure Control Systems / Lockheed Martin / Thales / Computer Sciences / Telecom Italia / Agilent / Toyota / National Instruments / Bosch / Pirelli / Embedded Software Systems / Sun / Docomo Research USA / Symantec / Energetics Incorporated. / IBM / North American Electric Reliability Corporation / British Telecom / Cisco / HP / United Technologies / Qualcomm / Intel / Microsoft / Presidio Press / Idao National Laboratory / Washington Post / BBC / /

Country

Colombia / Australia / United States / Soviet Union / /

Currency

pence / /

Facility

Davis-Besse power plant / University of Illinois / Vanderbilt University / University of California / /

IndustryTerm

process control systems / secure systems / attack-detection algorithms / intrusion detection systems / Wireless Systems / control network devices / real time / safetycritical systems / oil and gas / cyber physical systems / offshore oil platforms / continuous systems / control networks / safety systems / dynamical systems / estimation algorithms / Large industrial control systems / sensor networks / mature technologies / cyber-physical systems / real-time availability / attack technologies / software update / attack-resilient algorithms / cyberphysical systems / manufacturing / law enforcement / detection algorithm / enterprise systems / real-time requirements / autonomous and real-time detection / communication networks / pirated software / electric utility control systems / wireless communication proposal / sensor network / control algorithms / power utilities / incidents involving control systems / industrial control systems / Electricity grid / short-term solutions / safety-critical applications / gas pipeline explosion / electric utilities / network intrusion detection systems / wireless sensor networks / chemical and diagnostic data / real-time responses / dependable and secure computing / response algorithms / legacy systems / control systems / defined protocol / physical infrastructure / public networks / hybrid systems / safety display systems / software patching / real-time decision making algorithms / sent using communication networks / /

OperatingSystem

Hurd / DoS / /

Organization

University of California / Tehama Colusa Canal Authority / U.S. Department of Energy / U. S. Army Research Office / Maroochy Shire Council / UC Berkeley / U.S. Securities and Exchange Commission / U. S. Air Force office of Scientific Research / VDE Association / Department of Civil and Environmental Engineering / Central Intelligence Agency / Carnegie Mellon University / Department of Electrical Engineering and Computer Sciences / National Science Foundation / U.S. Department of Homeland Security / University of California / Berkeley / Congress / University of Illinois / Vanderbilt University / Center for Hybrid / Air Force Research Lab / /

Person

D. Schroeder / Bruno Sinopoli / Adrian Perrig‡ Shankar Sastry / Turk / /

Position

United States Attorney / senior analyst / /

ProvinceOrState

Ohio / California / Queensland / Illinois / Pennsylvania / /

PublishedMedium

Washington Post / /

Technology

Information Technologies / properly defined protocol / response algorithms / Cryptography / control algorithms / detection algorithm / autonomous / real-time decision making algorithms / attack-resilient algorithms / control network / process control / estimation algorithms / attack technologies / Environmental Engineering / attack-detection algorithms / http / simulation / underlying technology / /

URL

http /

SocialTag