Nothing Special   »   [go: up one dir, main page]

Lyu et al., 2019 - Google Patents

Safety and security risk assessment in cyber‐physical systems

Lyu et al., 2019

View PDF @Full View
Document ID
8926201209998316742
Author
Lyu X
Ding Y
Yang S
Publication year
Publication venue
IET Cyber‐Physical Systems: Theory & Applications

External Links

Snippet

The term cyber physical systems (CPS) refers to a new generation of systems with integrated computational and physical capabilities through computation, communication, and control. In the past decades, related techniques for CPS have been well studied and developed, and …
Continue reading at ietresearch.onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass

Similar Documents

Publication Publication Date Title
Lyu et al. Safety and security risk assessment in cyber‐physical systems
Giraldo et al. Security and privacy in cyber-physical systems: A survey of surveys
Zio The future of risk assessment
Asghar et al. Cybersecurity in industrial control systems: Issues, technologies, and challenges
Wang et al. Review of the false data injection attack against the cyber‐physical power system
Kriaa et al. A survey of approaches combining safety and security for industrial control systems
Ibne Hossain et al. Modeling and assessing cyber resilience of smart grid using Bayesian network-based approach: a system of systems problem
Kure et al. Assets focus risk management framework for critical infrastructure cybersecurity risk management
US11418533B2 (en) Multi-tiered security analysis method and system
kamal Kaur et al. Dependability analysis of safety critical systems: Issues and challenges
Cassottana et al. Resilience analysis of cyber‐physical systems: A review of models and methods
Campbell Cybersecurity issues for the bulk power system
Wang et al. A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities
Moya et al. Developing correlation indices to identify coordinated cyber‐attacks on power grids
Kriaa et al. A new safety and security risk analysis framework for industrial control systems
Rostami et al. Reliability assessment of cyber-physical power systems considering the impact of predicted cyber vulnerabilities
Oates et al. Security-aware, model-based systems engineering with SysML
Giehl et al. A framework to assess impacts of cyber attacks in manufacturing
Yang et al. Modelling cascading failure of a CPS for topological resilience enhancement
Kim et al. Consider the consequences: a risk assessment approach for industrial control systems
Jawad et al. Modeling and simulation approaches for cybersecurity impact analysis: State-of-the-art
Alanen et al. Review of cybersecurity risk analysis methods and tools for safety critical industrial control systems
Ding et al. Review of cybersecurity for integrated energy systems with integration of cyber‐physical systems
Wang et al. Semantic analysis framework for protecting the power grid against monitoring‐control attacks
Farah et al. High level Petri nets‐based proposal of an integrated intrusion detection and prevention mechanism in network controlled systems