We argue that cyber-physical systems cannot be protected just by protecting their IT infrastructure and that the CIA approach to security is insufficient. Rather, the IT components should be treated as a control system, inputs to that control system should be checked for veracity, and control algorithms should be designed in a way that they can handle a certain amount of adversarial actions.
CITATION STYLE
Gollmann, D., & Krotofil, M. (2016). Cyber-physical systems security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9100, pp. 195–204). Springer Verlag. https://doi.org/10.1007/978-3-662-49301-4_14
Mendeley helps you to discover research relevant for your work.