-
Chapter and Conference Paper
Process Mining with Programmable Logic Controller Memory States
This paper presents novel contributions to the field of process mining in Programmable Logic Controllers (PLCs). One significant contribution is the proposal of a new event source for process mining, which can...
-
Chapter and Conference Paper
A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models
Ensuring the security of large language models (LLMs) is an ongoing challenge despite their widespread popularity. Developers work to enhance LLMs security, but vulnerabilities persist, even in advanced versio...
-
Article
Open AccessUnimon qubit
Superconducting qubits seem promising for useful quantum computers, but the currently wide-spread qubit designs and techniques do not yet provide high enough performance. Here, we introduce a superconducting-q...
-
Chapter and Conference Paper
Security Analysis of Software Updates for Industrial Robots
Robots are widely deployed in industrial manufacturing environments. Cyber compromises of industrial robots pose threats to products and services, to the robots as well as to human workers. Previous security s...
-
Article
Competing magnetic orders in a bilayer Hubbard model with ultracold atoms
Fermionic atoms in optical lattices have served as a useful model system in which to study and emulate the physics of strongly correlated matter. Driven by the advances of high-resolution microscopy, the curre...
-
Chapter and Conference Paper
Forensic Investigation of A Hacked Industrial Robot
Industrial robots are playing a key role in the Fourth Industrial Revolution (Industry 4.0). This latest generation of robots incorporates smart technologies and networking to support machine-to-machine and ma...
-
Chapter and Conference Paper
Detecting Anomalies in Programmable Logic Controllers Using Unsupervised Machine Learning
Supervisory control and data acquisition systems have been employed for decades to communicate with and coordinate industrial processes. These systems incorporate numerous programmable logic controllers that m...
-
Chapter and Conference Paper
Defining Attack Patterns for Industrial Control Systems
Attack patterns have been used to specify security test cases for traditional information technology systems in order to mitigate cyber attacks. However, the attack patterns for traditional information technol...
-
Article
Majorana fermions in semiconducting nanowire and Fulde–Ferrell superconductor hybrid structures
The novel idea that spin-orbit coupling (SOC) and an s-wave pairing system can lead to induced pwave pairing with a strong magnetic limit, has stimulated widespread interest in searching for Majorana fermions ...
-
Chapter and Conference Paper
Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers
Industrial control systems are used to monitor and operate critical infrastructures. For decades, the security of industrial control systems was preserved by their use of proprietary hardware and software, and...