A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems.
ACM Comput. Surv., August, 2024
Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias.
Sensors, March, 2023
Cyber-Resilience Approaches for Cyber-Physical Systems.
CoRR, 2023
Non-stationary Watermark-Based Attack Detection to Protect Cyber-Physical Control Systems.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023
Switched-based Control Testbed to Assure Cyber-physical Resilience by Design.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Switched-Based Resilient Control of Cyber-Physical Systems.
IEEE Access, 2020
Cyber-Resilience Evaluation of Cyber-Physical Systems.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020
Reflective Attenuation of Cyber-Physical Attacks.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Cyber-physical architecture assisted by programmable networking.
Internet Technol. Lett., 2018
Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems.
Trans. Emerg. Telecommun. Technol., 2018
Using an Event Data Taxonomy to Represent the Impact of Cyber Events as Geometrical Instances.
IEEE Access, 2018
Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018
A Pyramidal-based Model to Compute the Impact of Cyber Security Events.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Detection of attacks against cyber-physical industrial systems. (Détection des attaques contre les systèmes cyber-physiques industriels).
PhD thesis, 2017
On the use of watermark-based schemes to detect cyber-physical attacks.
EURASIP J. Inf. Secur., 2017
Towards a Security Event Data Taxonomy.
Proceedings of the Risks and Security of Internet and Systems, 2017
Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016
Security of Cyber-Physical Systems - From Theory to Testbeds and Validation.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016
Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016