A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 15.3, Top 1 (SCI Q1)
    CiteScore: 23.5, Top 2% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
C. Sheng, W. Ma, Q.-L. Han, W. Zhou, X. Zhu, S. Wen, Y. Xiang, and F.-Y. Wang, “Pager explosion: Cybersecurity insights and afterthoughts,” IEEE/CAA J. Autom. Sinica, vol. 11, no. 12, pp. 2359–2362, Dec. 2024. doi: 10.1109/JAS.2024.125034
Citation: C. Sheng, W. Ma, Q.-L. Han, W. Zhou, X. Zhu, S. Wen, Y. Xiang, and F.-Y. Wang, “Pager explosion: Cybersecurity insights and afterthoughts,” IEEE/CAA J. Autom. Sinica, vol. 11, no. 12, pp. 2359–2362, Dec. 2024. doi: 10.1109/JAS.2024.125034

Pager Explosion: Cybersecurity Insights and Afterthoughts

doi: 10.1109/JAS.2024.125034
More Information
  • loading
  • [1]
    M. Murphy and J. Tidy, What we know about the hezbollah device explosions, 2024. [Online]. Available: https://www.bbc.com/news/articles/cz04m913m49o (visited on 09/24/2024).
    [2]
    A. Press, Lebanon pager and walkie-talkie explosions, 2024. [Online]. Available: https://apnews.com/article/lebanon-israel-hezbollah-pager-explosion-e9493409a0648b846fdcadffdb02d71e (visited on 09/24/2024).
    [3]
    M. Yang, T. Ahmed, S. Inagaki, K. Sakiyama, Y. Li, et al., “Hardware/software cooperative design against power sidechannel attacks on IoT devices,” IEEE Internet Things J., 2024. doi: 10.1109/JIOT.2024.3355417
    [4]
    G. Lin, S. Wen, Q.-L. Han, J. Zhang, and Y. Xiang, “Software vulnerability detection using deep neural networks: A survey,” Proc. IEEE, vol. 108, no. 10, pp. 1825–1848, 2020. doi: 10.1109/JPROC.2020.2993293
    [5]
    X. Zhu, S. Wen, S. Camtepe, and Y. Xiang, “Fuzzing: A survey for roadmap,” ACM Comput. Surv. (CSUR), vol. 54, no. 11s, pp. 1–36, 2022.
    [6]
    X. Feng, X. Zhu, Q.-L. Han, W. Zhou, S. Wen, et al., “Detecting vulnerability on IoT device firmware: A survey,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 1, pp. 25–41, 2022.
    [7]
    L. M. Castiglione and E. C. Lupu, “Which attacks lead to hazards? combining safety and security analysis for cyberphysical systems,” IEEE Trans. Dependable Secure Comput., 2023. doi: 10.1109/TDSC.2023.3309778
    [8]
    S. G. Abbas, M. O. Ozmen, A. Alsaheel, A. Khan, Z. B. Celik, et al., “SAIN: Improving ICS attack detection sensitivity via state-aware invariants,” in Proc. 33rd USENIX Secur. Symp. (USENIX Security 24), 2024, pp. 6597–6613.
    [9]
    M. J. Assante and R. M. Lee, “The industrial control system cyber kill chain,” SANS Institute InfoSec Reading Room, vol. 1, no. 1, p. 2, 2015.
    [10]
    C. Liu, B. Jiang, X. Wang, H. Yang, and S. Xie, “Distributed fault-tolerant consensus tracking of multi-agent systems under cyber-attacks,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 6, pp. 1037–1048, 2022. doi: 10.1109/JAS.2022.105419
    [11]
    F. Teng, Y. Zhang, T. Yang, T. Li, Y. Xiao, et al., “Distributed optimal energy management for we-energy considering operation security,” IEEE Trans. Netw. Sci. Eng., 2023. doi: 10.1109/TNSE.2023.3295079
    [12]
    N. Vashistha, M. M. Hossain, M. R. Shahriar, F. Farahmandi, F. Rahman, et al., “Echain: A blockchain-enabled ecosystem for electronic device authenticity verification,” IEEE Trans. Consumer Electron., vol. 68, no. 1, pp. 23–37, 2021.
    [13]
    D. G. Dunn and E. Cosman, “Cybersecurity fundamentals are not just for industrial control systems: Guidance and direction are available,” IEEE Ind. Appl. Mag., pp. 2–10, 2024. doi: 10.1109/MIAS.2024.3395933
    [14]
    L. Liang, R. Su, and H. Xu, “Distributed state and fault estimation for cyber-physical systems under DoS attacks,” IEEE/CAA J. Autom. Sinica, 2024. doi: 10.1109/JAS.2024.124527
    [15]
    Y. Yang and C. Peng, “MPC-Based change management of supply chain under disruption risks: The case of battery industry.,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 9, pp. 1896–1898, 2023. doi: 10.1109/JAS.2023.123294
    [16]
    S. Hart, B. Halak, and V. Sassone, “CIST: A serious game for hardware supply chain,” Comput. Secur., vol. 122, p. 102912, 2022. doi: 10.1016/j.cose.2022.102912
    [17]
    L. Williams, “Narrowing the software supply chain attack vectors: The SSDF is wonderful but not enough,” IEEE Secur. Priv., vol. 22, no. 2, pp. 4–7, 2024. doi: 10.1109/MSEC.2024.3359798
    [18]
    Q. Xu, C. Yu, X. Yuan, Z. Fu, and H. Liu, “A privacypreserving distributed subgradient algorithm for the economic dispatch problem in smart grid,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 7, pp. 1625–1627, 2022.
    [19]
    M. Abuhamad, A. Abusnaina, D. Nyang, and D. Mohaisen, “Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: A contemporary survey,” IEEE Internet Things J., vol. 8, no. 1, pp. 65–84, 2020.
    [20]
    J. Zhang, L. Pan, Q.-L. Han, C. Chen, S. Wen, et al., “Deep learning based attack detection for cyber-physical system cybersecurity: A survey,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 3, pp. 377–391, 2021.

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(2)

    Article Metrics

    Article views (7) PDF downloads(0) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return