[1] M. Anand, E. Cronin, M. Sherr, M. Blaze, Z. Ives, and I.
Lee. Security challenges in next generation cyber
physical systems. In Beyond SCADA: Networked
Embedded Control for Cyber Physical Systems,
November 2006.
[2] A. Jøsang, C. Keser, and T. Dimitrakos. Can we manage
trust? In Trust Management, Proc. of the Third
International Conference, iTrust 2005, Paris, France, May
23-26, 2005
[3] Alvaro A. Cárdenas Saurabh Amin Shankar Sastry.
Research Challenges for the Security of Control Systems,
University of California, Berkeley
[4] Dr. Clifford Neuman. Challenges in Security for Cyber-
Physical Systems. Information Sciences Institute,
University of Southern California.
[5] P. Tabuada. Cyber-physical systems: Position paper. In
NSF Workshop on Cyber-Physical Systems, 2006.
[6] Annarita Giani, Adrian Perrig, Shankar Sastry,
Challenges for Securing Cyber Physical Systems,
Workshop on Future Directions in Cyber-physical
Systems Security, DHS 23 July 2009.
[7] Dr. Clifford Neuman. Understanding trust and security in
SCADA systems. In Beyond SCADA: Networked
Embedded Control for Cyber Physical Systems,
November 2006.
[8] Bonnie Zhu, Anthony Joseph, and Shankar
Sastry, Taxonomy of Cyber Attacks on SCADA
Systems, Proceedings of CPSCom 2011: The 4th IEEE
International Conference on Cyber, Physical and Social
Computing, Dalian, China, October 19-22, 2011.
[9] J. Slay and M. Miller. Lessons learned from the
Maroochy water breach. In Critical Infrastructure
Protection, volume 253/2007, pages 73–82.
SpringerBoston, November 2007.
[10] Krishna Kumar Venkatasubramanian Security Solutions
For Cyber-Physical Systems, Ph.D. Dissertation, Arizona
State University December 2009.
[11] B. Krebs. Cyber Incident Blamed for Nuclear Power
Plant Shutdown. Washington Post,
http://www.washingtonpost.com/wpdyn/
content/article/2008/06/05/AR2008060501958.html,
June 2008.
[12] Alvaro A. C´ardenas Saurabh Amin Shankar Sastry,
Secure Control: Towards Survivable Cyber-Physical
Systems, University of California, Berkeley.
[13] N. W. Group. Internet security glossary.
http://rfc.net/rfc2828.html, May 2000.
[14] Ayan Banerjee, Krishna K. Venkatasubramanian, Tridib
Mukherjee, Sandeep Kumar S. Gupta, Ensuring Safety,
Security, andSustainabilityof Mission-CriticalCyber–
Physical Systems, Proceedings of the IEEE (Volume:100
, Issue 1) Jan 2012
[15] Qaisar Shafi, Cyber Physical Systems Security: A Brief
Survey, Computational Science and Its Applications
(ICCSA), 2012 12th International Conference.
[16] K. Venkatasubramanian, S. Nabar, S. K. S. Gupta, and R.
Poovendran, Cyber Physical Security Solutions for
Pervasive Health Monitoring Systems, M. Watfa, Ed. IGI Global, 2011, ser. E-Healthcare Systems and Wireless
Communications: Current and Future Challenges.
[17] Dina Had?ziosmanovic, Robin Sommer, Damiano
Bolzoni, Pieter Hartel, Improving SCADA Security with
Context-aware Network Profiling, University of Twente,
Enschede, The Netherlands, International Computer
Science Institute, Berkeley, Lawrence Berkeley National
Laboratory, Berkeley.
[18] David A. Fisher, Principles of Trust for Embedded
Systems, Technical Note CMU/SEI-2012-TN-007, March
2012.
[19] Embedded Systems and Trusted Computing Security,
Trusted Computing Group News Letter