Search for dissertations about: "Cyber-Physical Systems"
Showing result 6 - 10 of 109 swedish dissertations containing the words Cyber-Physical Systems.
-
6. On Falsification of Large-Scale Cyber-Physical Systems
Abstract : In the development of modern Cyber-Physical Systems, Model-Based Testing of the closed-loop system is an approach for finding potential faults and increasing quality of developed products. Testing is done on many different abstraction levels, and for large-scale industrial systems, there are several challenges. READ MORE
-
7. On the Secure and Resilient Design of Connected Vehicles: Methods and Guidelines
Abstract : Vehicles have come a long way from being purely mechanical systems to systems that consist of an internal network of more than 100 microcontrollers and systems that communicate with external entities, such as other vehicles, road infrastructure, the manufacturer’s cloud and external applications. This combination of resource constraints, safety-criticality, large attack surface and the fact that millions of people own and use them each day, makes securing vehicles particularly challenging as security practices and methods need to be tailored to meet these requirements. READ MORE
-
8. Vulnerability Analysis for Critical Infrastructures
Abstract : The rapid advances in information and communication technology enable a shift from diverse systems empowered mainly by either hardware or software to cyber-physical systems (CPSs) that are driving Critical infrastructures (CIs), such as energy and manufacturing systems. However, alongside the expected enhancements in efficiency and reliability, the induced connectivity exposes these CIs to cyberattacks exemplified by Stuxnet and WannaCry ransomware cyber incidents. READ MORE
-
9. Digital Power of Attorney for authorization in industrial cyber-physical systems
Abstract : In the age of digitization, many Cyber-Physical Systems are semi-autonomous and have sufficient power and resources to perform tasks on behalf of users. This thesis defines an authorization technique to transfer the power of legitimate users to trusted CPS or IoT devices, allowing the device to sign or access resources on behalf of the user. READ MORE
-
10. Digital Power of Attorney for Authorization in Industrial Cyber-Physical Systems
Abstract : Since ancient times, there has been a practice to authorize individuals that we trust. Today, we grant credentials and privileges digitally, making authorization a crucial part of security control and extending its use cases beyond people and web applications. READ MORE