Home | Legals | Data Protection | Sitemap | KIT

IEEE Design&Test Vol. 34, Issue 4 (July/August) released: Cyber-Physical Systems Security and Privacy

IEEE Design&Test Vol. 34, Issue 4 (July/August) released: Cyber-Physical Systems Security and Privacy
   
Design & Test

Magazine
Volume 34, Issue 4 (July/August)

Highlights
Special Issue on "Cyber-Physical Systems Security and Privacy"
Survey on "Security and Privacy in Cyber-Physical Systems: A Survey of Surveys"  
Tutorial by Jishen Zhao, Qiaosha Zou and Yuan Xie, "verview of 3-D Architecture Design Opportunities and Techniques"  
Perspective by Gabe Moretti, "Accellera’s Support for ESL Verification and Stimulus Reuse"  
Conference Report by David Atienza and Giorgio Di Natale, "Report on DATE 2017 in Lausanne"

July/August 2017 Content


From the EIC
Cyber-Physical Systems Security and Privacy
  View full article (PDF).

Cyber-Physical Systems Security and Privacy
Guest Editors' Introduction: Cyber-Physical Systems Security and Privacy
  View full article (PDF).
Security and Privacy in Cyber-Physical Systems: A Survey of Surveys
  The following is a survey on surveys and may help the interested reader to find a way through the jungle of literature on the security and CPS topics out there already ... read more
View full article (PDF).
Side Channels of Cyber-Physical Systems: Case Study in Additive Manufacturing
  As 3-D printers are becoming increasingly relevant in various domains, including critical infrastructure, cyber-security questions naturally arise. This article investigates ... read more
View full article (PDF).
Comparative Study of Authenticated Encryption Targeting Lightweight IoT Applications
  This article focuses on detecting attacks to power system with the help of cyber-physical co-modeling. The foundational algorithm... read more.
View full article (PDF).
Data Attack Detection and Command Authentication via Cyber-Physical Comodeling
  In this article, the authors study the problem of efficient authenticated encryption algorithms for use in embedded devices. In particular, they describe the ongoing Competition for Authenticated Encryption:... read more
View full article (PDF).
Fault Diagnosis and Network Anomaly Detection in Water Infrastructures
  Testing cybersecurity techniques for critical infrastructure on real-world setups is economically infeasible and lacks flexibility. In order to address this challenge, this article presents a testbed for water infrastructures capable of accurately assessing the effectiveness of cybersecurity solutions read more
View full article (PDF).

General Interest Papers
A Platform to Analyze DDR3 DRAM’s Power and Retention Time
  The authors explore the intrinsic trade-off in a DRAM between the power consumption (due to refresh) and the reliability. Their unique platform allows... read more
View full article (PDF).

Departments
Overview of 3-D Architecture Design Opportunities and Techniques
  View full article (PDF).
Accellera’s Support for ESL Verification and Stimulus Reuse
  View full article (PDF).
Report on DATE 2017 in Lausanne
  Free Access Article (PDF).
Practice Makes Perfect
  Free Access Article (PDF).

 

Table-of-Contents