Security evaluation of cyber-physical systems using automatically generated attack trees

5Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The security of cyber-physical systems (CPS) is often lacking. This abstract presents a methodology that performs a security evaluation of these systems by automatically generating attack trees based on the system model. The assessor can define different kinds of attackers and see how the attack tree is evaluated with respect to a specific type of attacker. Optimal attacker strategies are calculated and from here the most vulnerable elements of the system can be derived.

Cite

CITATION STYLE

APA

Lemaire, L., Vossaert, J., De Decker, B., & Naessens, V. (2018). Security evaluation of cyber-physical systems using automatically generated attack trees. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10707 LNCS, pp. 225–228). Springer Verlag. https://doi.org/10.1007/978-3-319-99843-5_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free