Vulnerabilities of Control Systems in Internet of Things Applications.
Verica Radisavljevic-GajicSeri ParkDanai ChasakiPublished in: IEEE Internet Things J. (2018)
Keyphrases
- control system
- information security
- mobile devices
- security vulnerabilities
- key technologies
- control law
- security risks
- countermeasures
- real time
- industrial automation
- big data
- physical world
- buffer overflow
- security issues
- mobile computing
- control algorithm
- ubiquitous computing
- control strategy
- open standards
- closed loop
- future internet
- attack graph
- context aware
- open source
- metadata