Gollmann, DieterDieterGollmann2020-08-032020-08-032013Mathematical and engineering methods in computer science : 8th international doctoral workshop, MEMICS 2012, Znojmo, Czech Republic, October 25 - 28, 2012 ; revised selected papers / Antonín Kuc̆era ... (eds.). - Berlin ; Heidelberg : Springer, 2013. - (Lecture notes in computer science ; 7721). - Seite 12-14http://hdl.handle.net/11420/6933Cyber-physical systems are characterized by an IT infrastructure controlling effects in the physical world. Attacks are intentional actions trying to cause undesired effects in the physical world. We examine to which extent traditional IT security techniques can protect against attacks on cyber-physical systems and which additional measures could be deployed to strengthen their security. Properties relevant in this context are the veracity and plausibility of the data being processed. © 2013 Springer-Verlag.enCritical infrastructuresplausibilitysecurity in cyber-physical systemsveracityInformatikSecurity for cyber-physical systemsConference Paper10.1007/978-3-642-36046-6_2Other