Nothing Special   »   [go: up one dir, main page]

Giehl et al., 2019 - Google Patents

A framework to assess impacts of cyber attacks in manufacturing

Giehl et al., 2019

Document ID
11001083492498698925
Author
Giehl A
Wiedermann N
Plaga S
Publication year
Publication venue
Proceedings of the 2019 11th International Conference on Computer and Automation Engineering

External Links

Snippet

Recent trends in manufacturing and industry accelerate the interconnection of industrial control systems between each other and over public networks. This brings an increase of cyber attack impact with it as the number of potential targets rises and the consequences of …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2217/00Indexing scheme relating to computer aided design [CAD]

Similar Documents

Publication Publication Date Title
Lyu et al. Safety and security risk assessment in cyber‐physical systems
Li et al. Reliability assessment for systems suffering common cause failure based on Bayesian networks and proportional hazards model
Giehl et al. A framework to assess impacts of cyber attacks in manufacturing
Zhao et al. A hierarchical combinatorial reliability model for smart home systems
Silvestre et al. Set‐based fault detection and isolation for detectable linear parameter‐varying systems
Chockalingam et al. Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
Palleti et al. A contribution of axiomatic design principles to the analysis and impact of attacks on critical infrastructures
Chouchane et al. Diagnosis of partially observed Petri net based on analytical redundancy relationships
Dunn et al. Development of a hierarchical approach to analyse interdependent infrastructure system failures
Jawad et al. Modeling and simulation approaches for cybersecurity impact analysis: State-of-the-art
Khadidos et al. Integrating industrial appliances for security enhancement in data point using SCADA networks with learning algorithm
Carter et al. Systems‐theoretic security requirements modeling for cyber‐physical systems
Jia et al. Copula‐based reliability and safety analysis of safety‐critical systems with dependent failures
Benavides‐Serrano et al. Optimal placement of gas detectors: AP‐median formulation considering dynamic nonuniform unavailabilities
Tohidi et al. A continuous‐time Markov chain model for redundancy allocation problem: An economic analysis
Ding et al. Review of cybersecurity for integrated energy systems with integration of cyber‐physical systems
Nemati et al. Tri‐level transmission Expansion planning under intentional attacks: virtual attacker approach‐part II: case studies
Yun et al. An optimal reliability and maintainability design of a searching system
Omogoye et al. A review of power system predictive failure model for resilience enhancement against hurricane events
Teixeira et al. Cyber-secure and resilient architectures for industrial control systems
Baycik et al. Interdiction-based approaches to identify damage in disrupted critical infrastructures with dependencies
Daemi et al. Detailed reliability assessment of composite power systems considering load variation and weather conditions using the Bayesian network
O’Halloran et al. Assessing the consequence of cyber and physical malicious attacks in complex, cyber-physical systems during early system design
Wang et al. Analysis of cascading probabilistic common cause failures
Qin et al. Protection mechanism in reliability evaluation approach to multistate system with common cause failure