Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Loukas, George Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 3 of 3 reviews    
  Cyber-physical attacks: a growing invisible threat
Loukas G., Butterworth-Heinemann, Newton, MA, 2015. 270 pp.  Type: Book (978-0-128012-90-1), Reviews: (2 of 2)

A cyberphysical system is generally considered to be an embedded system with network connectivity. Embedded systems are defined in this book, after Peter Marwedel [1], as “information processing systems embedded into a larger...
...
Feb 19 2016  
  A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
Heartfield R., Loukas G. ACM Computing Surveys 48(3): 1-39, 2015.  Type: Article

Social engineering attacks include a large variety of ways to manipulate and deceive users. A specific type is semantic attacks that deceive rather than directly attack a user. We find here a taxonomy and description of semantic attack...
...
Feb 3 2016  
  Cyber-physical attacks: a growing invisible threat
Loukas G., Butterworth-Heinemann, Newton, MA, 2015. 270 pp.  Type: Book (978-0-128012-90-1), Reviews: (1 of 2)

“Cyber-physical systems [CPSs] are physical, biological, and engineered systems whose operations are integrated, monitored, and/or controlled by a computational core. ... Computing is deeply embedded into every physical compo...
...
Oct 21 2015  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy