Security Analysis on Cyber-physical System Using Attack Tree.
Feng XieTianbo LuXiaobo GuoJingli LiuYong PengYang GaoPublished in: IIH-MSP (2013)
Keyphrases
- security analysis
- authentication protocol
- encryption algorithm
- cyber physical systems
- smart card
- security requirements
- public key
- defense mechanisms
- tree structure
- secret key
- encryption scheme
- authentication scheme
- cyber security
- user authentication
- mutual authentication
- artificial intelligence
- lightweight
- embedded systems
- real time
- information security
- computer systems
- access control