Gollmann, DieterDieterGollmannKrotofil, MarinaMarinaKrotofil2020-06-092020-06-092016Lecture Notes in Computer Science (9100): 195-204 (2016)http://hdl.handle.net/11420/6291We argue that cyber-physical systems cannot be protected just by protecting their IT infrastructure and that the CIA approach to security is insufficient. Rather, the IT components should be treated as a control system, inputs to that control system should be checked for veracity, and control algorithms should be designed in a way that they can handle a certain amount of adversarial actions.enCyber-physical systems securityHard real timeIntegrityPlausibility veracitySafetyInformatikCyber-physical systems securityConference Paper10.1007/978-3-662-49301-4_14Other