{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T15:08:08Z","timestamp":1745334488900,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/greencom-cpscom.2010.36","type":"proceedings-article","created":{"date-parts":[[2011,3,8]],"date-time":"2011-03-08T06:26:37Z","timestamp":1299565597000},"page":"733-738","source":"Crossref","is-referenced-by-count":128,"title":["Security Issues and Challenges for Cyber Physical System"],"prefix":"10.1109","author":[{"given":"Eric Ke","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yunming","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Xiaofei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"S. M.","family":"Yiu","sequence":"additional","affiliation":[]},{"given":"L. C. K.","family":"Hui","sequence":"additional","affiliation":[]},{"given":"K. P.","family":"Chow","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2010.39"},{"key":"ref11","article-title":"Automotive Cyber Physical Systems in the Context of Human Mobility","author":"work","year":"2008","journal-title":"National Workshop on high-confidence automotive cyber-physical systems"},{"article-title":"Cryptography and network security: principles and practice","year":"2010","author":"stallings","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2006.288535"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88653-2_17"},{"article-title":"Active Man in the Middle Attacks, A Security Advisory","year":"2009","author":"saltzman","key":"ref15"},{"key":"ref16","article-title":"Denial of Service Attacks in Wireless Networks: The case of Jammers","author":"pelechrinis","year":"2006","journal-title":"UC Riverside Department of Computer Science and Engineering"},{"journal-title":"Interagency Working Group on Cyber Security and Information Assurance","article-title":"Federal Plan for Cyber Security and Information Assurance Research and Development","year":"2006","key":"ref17"},{"journal-title":"Development of a New Client-Server Architecture for Context Aware Mobile Computing","year":"2009","author":"gui","key":"ref18"},{"journal-title":"Escrypt whitepaper","article-title":"Trusted Computing Technology for embedded Systems","year":"2009","key":"ref19"},{"key":"ref4","article-title":"CIA Report: Cyber Extortionists Attacked Foreign Power Grid, Disrupting Delivery","author":"o'connell","year":"2008","journal-title":"Internet Business Law Services"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MC.2010.237","article-title":"Researchers Fight to Keep Implanted Medical Devices Safe from Hackers","volume":"43","author":"neal","year":"2010","journal-title":"Computer"},{"key":"ref6","article-title":"Virus Attacks Siemens Plant-Control Systems","author":"fuhrmans","year":"2010","journal-title":"The Wall Street Journal"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref8","article-title":"Don't sweat your privacy: Using humidity to detect human presence","author":"han","year":"2007","journal-title":"Proceedings of 5th International Workshop on Privacy in UbiComp (UbiPriv'07)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.386"},{"key":"ref2","first-page":"6a","article-title":"Hackers broke into FAA air traffic control system","author":"mills","year":"2009","journal-title":"The Wall Street Journal"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2010.74"},{"key":"ref1","article-title":"Specification, Analyzing Challenges and Approaches for Cyber-Physical Systems (CPS)","author":"wan","year":"2010","journal-title":"Engineering Letters"},{"key":"ref20","article-title":"Secure Code Update for Embedded Devices via Proofs of Secure Erasure","author":"perito","year":"2010","journal-title":"INRIA Rhône-Alpes Technique Report"},{"key":"ref21","article-title":"Trusted Wireless Sensor Node Platform","volume":"i","author":"mohd yussoff","year":"2010","journal-title":"Proceedings of the World Congress on Engineering"}],"event":{"name":"Int'l Conference on Cyber, Physical and Social Computing (CPSCom)","start":{"date-parts":[[2010,12,18]]},"location":"Hangzhou, China","end":{"date-parts":[[2010,12,20]]}},"container-title":["2010 IEEE\/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5724111\/5724803\/05724910.pdf?arnumber=5724910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T16:48:09Z","timestamp":1497890889000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5724910\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/greencom-cpscom.2010.36","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}