Citation: | C. Sheng, W. Ma, Q.-L. Han, W. Zhou, X. Zhu, S. Wen, Y. Xiang, and F.-Y. Wang, “Pager explosion: Cybersecurity insights and afterthoughts,” IEEE/CAA J. Autom. Sinica, vol. 11, no. 12, pp. 2359–2362, Dec. 2024. doi: 10.1109/JAS.2024.125034 |
[1] |
M. Murphy and J. Tidy, What we know about the hezbollah device explosions, 2024. [Online]. Available: https://www.bbc.com/news/articles/cz04m913m49o (visited on 09/24/2024).
|
[2] |
A. Press, Lebanon pager and walkie-talkie explosions, 2024. [Online]. Available: https://apnews.com/article/lebanon-israel-hezbollah-pager-explosion-e9493409a0648b846fdcadffdb02d71e (visited on 09/24/2024).
|
[3] |
M. Yang, T. Ahmed, S. Inagaki, K. Sakiyama, Y. Li, et al., “Hardware/software cooperative design against power sidechannel attacks on IoT devices,” IEEE Internet Things J., 2024. doi: 10.1109/JIOT.2024.3355417
|
[4] |
G. Lin, S. Wen, Q.-L. Han, J. Zhang, and Y. Xiang, “Software vulnerability detection using deep neural networks: A survey,” Proc. IEEE, vol. 108, no. 10, pp. 1825–1848, 2020. doi: 10.1109/JPROC.2020.2993293
|
[5] |
X. Zhu, S. Wen, S. Camtepe, and Y. Xiang, “Fuzzing: A survey for roadmap,” ACM Comput. Surv. (CSUR), vol. 54, no. 11s, pp. 1–36, 2022.
|
[6] |
X. Feng, X. Zhu, Q.-L. Han, W. Zhou, S. Wen, et al., “Detecting vulnerability on IoT device firmware: A survey,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 1, pp. 25–41, 2022.
|
[7] |
L. M. Castiglione and E. C. Lupu, “Which attacks lead to hazards? combining safety and security analysis for cyberphysical systems,” IEEE Trans. Dependable Secure Comput., 2023. doi: 10.1109/TDSC.2023.3309778
|
[8] |
S. G. Abbas, M. O. Ozmen, A. Alsaheel, A. Khan, Z. B. Celik, et al., “SAIN: Improving ICS attack detection sensitivity via state-aware invariants,” in Proc. 33rd USENIX Secur. Symp. (USENIX Security 24), 2024, pp. 6597–6613.
|
[9] |
M. J. Assante and R. M. Lee, “The industrial control system cyber kill chain,” SANS Institute InfoSec Reading Room, vol. 1, no. 1, p. 2, 2015.
|
[10] |
C. Liu, B. Jiang, X. Wang, H. Yang, and S. Xie, “Distributed fault-tolerant consensus tracking of multi-agent systems under cyber-attacks,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 6, pp. 1037–1048, 2022. doi: 10.1109/JAS.2022.105419
|
[11] |
F. Teng, Y. Zhang, T. Yang, T. Li, Y. Xiao, et al., “Distributed optimal energy management for we-energy considering operation security,” IEEE Trans. Netw. Sci. Eng., 2023. doi: 10.1109/TNSE.2023.3295079
|
[12] |
N. Vashistha, M. M. Hossain, M. R. Shahriar, F. Farahmandi, F. Rahman, et al., “Echain: A blockchain-enabled ecosystem for electronic device authenticity verification,” IEEE Trans. Consumer Electron., vol. 68, no. 1, pp. 23–37, 2021.
|
[13] |
D. G. Dunn and E. Cosman, “Cybersecurity fundamentals are not just for industrial control systems: Guidance and direction are available,” IEEE Ind. Appl. Mag., pp. 2–10, 2024. doi: 10.1109/MIAS.2024.3395933
|
[14] |
L. Liang, R. Su, and H. Xu, “Distributed state and fault estimation for cyber-physical systems under DoS attacks,” IEEE/CAA J. Autom. Sinica, 2024. doi: 10.1109/JAS.2024.124527
|
[15] |
Y. Yang and C. Peng, “MPC-Based change management of supply chain under disruption risks: The case of battery industry.,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 9, pp. 1896–1898, 2023. doi: 10.1109/JAS.2023.123294
|
[16] |
S. Hart, B. Halak, and V. Sassone, “CIST: A serious game for hardware supply chain,” Comput. Secur., vol. 122, p. 102912, 2022. doi: 10.1016/j.cose.2022.102912
|
[17] |
L. Williams, “Narrowing the software supply chain attack vectors: The SSDF is wonderful but not enough,” IEEE Secur. Priv., vol. 22, no. 2, pp. 4–7, 2024. doi: 10.1109/MSEC.2024.3359798
|
[18] |
Q. Xu, C. Yu, X. Yuan, Z. Fu, and H. Liu, “A privacypreserving distributed subgradient algorithm for the economic dispatch problem in smart grid,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 7, pp. 1625–1627, 2022.
|
[19] |
M. Abuhamad, A. Abusnaina, D. Nyang, and D. Mohaisen, “Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: A contemporary survey,” IEEE Internet Things J., vol. 8, no. 1, pp. 65–84, 2020.
|
[20] |
J. Zhang, L. Pan, Q.-L. Han, C. Chen, S. Wen, et al., “Deep learning based attack detection for cyber-physical system cybersecurity: A survey,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 3, pp. 377–391, 2021.
|