id author title date pages extension mime words sentences flesch summary cache txt cord-336599-r8xgnz87 Yaacoub, Jean-Paul A. Cyber-Physical Systems Security: Limitations, Issues and Future Trends 2020-07-08 .txt text/plain 22485 1405 45 However, none of the existing works presented a comprehensive view of CPS security in terms of threats, vulnerabilities, and attacks based on the targeted domain (cyber, physical, or hybrid). • Jamming: In this case, attackers usually aim at changing the device's state and the expected operations to cause Sold with PLC-like features Digital computers designed for output arrangements and multiple inputs Electronic device controlled by a microprocessor Automates electro-mechanical processes Interfaces SCADA physical objects Physical media with process, relays, motion control and networking Uses supervisory system messages to control objects Does support control loops and algorithms Does not support control loops and algorithms Immune to electrical noise, resistant to vibration Low to null immunity against electrical noise and vibration Suitable for local geographical areas Suitable for wider geographical telemetry areas Mainly IEC Standards Wired/Wireless Communications damage by launching waves of de-authentication or wireless jamming signals, which would result into denial of device and system services [73] . ./cache/cord-336599-r8xgnz87.txt ./txt/cord-336599-r8xgnz87.txt