Lyu et al., 2019 - Google Patents
Safety and security risk assessment in cyber‐physical systemsLyu et al., 2019
View PDF- Document ID
- 8926201209998316742
- Author
- Lyu X
- Ding Y
- Yang S
- Publication year
- Publication venue
- IET Cyber‐Physical Systems: Theory & Applications
External Links
Snippet
The term cyber physical systems (CPS) refers to a new generation of systems with integrated computational and physical capabilities through computation, communication, and control. In the past decades, related techniques for CPS have been well studied and developed, and …
- 238000000034 method 0 abstract description 56
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0635—Risk analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lyu et al. | Safety and security risk assessment in cyber‐physical systems | |
Giraldo et al. | Security and privacy in cyber-physical systems: A survey of surveys | |
Zio | The future of risk assessment | |
Asghar et al. | Cybersecurity in industrial control systems: Issues, technologies, and challenges | |
Wang et al. | Review of the false data injection attack against the cyber‐physical power system | |
Kriaa et al. | A survey of approaches combining safety and security for industrial control systems | |
Ibne Hossain et al. | Modeling and assessing cyber resilience of smart grid using Bayesian network-based approach: a system of systems problem | |
Kure et al. | Assets focus risk management framework for critical infrastructure cybersecurity risk management | |
US11418533B2 (en) | Multi-tiered security analysis method and system | |
kamal Kaur et al. | Dependability analysis of safety critical systems: Issues and challenges | |
Cassottana et al. | Resilience analysis of cyber‐physical systems: A review of models and methods | |
Campbell | Cybersecurity issues for the bulk power system | |
Wang et al. | A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities | |
Moya et al. | Developing correlation indices to identify coordinated cyber‐attacks on power grids | |
Kriaa et al. | A new safety and security risk analysis framework for industrial control systems | |
Rostami et al. | Reliability assessment of cyber-physical power systems considering the impact of predicted cyber vulnerabilities | |
Oates et al. | Security-aware, model-based systems engineering with SysML | |
Giehl et al. | A framework to assess impacts of cyber attacks in manufacturing | |
Yang et al. | Modelling cascading failure of a CPS for topological resilience enhancement | |
Kim et al. | Consider the consequences: a risk assessment approach for industrial control systems | |
Jawad et al. | Modeling and simulation approaches for cybersecurity impact analysis: State-of-the-art | |
Alanen et al. | Review of cybersecurity risk analysis methods and tools for safety critical industrial control systems | |
Ding et al. | Review of cybersecurity for integrated energy systems with integration of cyber‐physical systems | |
Wang et al. | Semantic analysis framework for protecting the power grid against monitoring‐control attacks | |
Farah et al. | High level Petri nets‐based proposal of an integrated intrusion detection and prevention mechanism in network controlled systems |