Giehl et al., 2019 - Google Patents
A framework to assess impacts of cyber attacks in manufacturingGiehl et al., 2019
- Document ID
- 11001083492498698925
- Author
- Giehl A
- Wiedermann N
- Plaga S
- Publication year
- Publication venue
- Proceedings of the 2019 11th International Conference on Computer and Automation Engineering
External Links
Snippet
Recent trends in manufacturing and industry accelerate the interconnection of industrial control systems between each other and over public networks. This brings an increase of cyber attack impact with it as the number of potential targets rises and the consequences of …
- 238000004519 manufacturing process 0 title abstract description 68
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0635—Risk analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2217/00—Indexing scheme relating to computer aided design [CAD]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lyu et al. | Safety and security risk assessment in cyber‐physical systems | |
Li et al. | Reliability assessment for systems suffering common cause failure based on Bayesian networks and proportional hazards model | |
Giehl et al. | A framework to assess impacts of cyber attacks in manufacturing | |
Zhao et al. | A hierarchical combinatorial reliability model for smart home systems | |
Silvestre et al. | Set‐based fault detection and isolation for detectable linear parameter‐varying systems | |
Chockalingam et al. | Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates | |
Palleti et al. | A contribution of axiomatic design principles to the analysis and impact of attacks on critical infrastructures | |
Chouchane et al. | Diagnosis of partially observed Petri net based on analytical redundancy relationships | |
Dunn et al. | Development of a hierarchical approach to analyse interdependent infrastructure system failures | |
Jawad et al. | Modeling and simulation approaches for cybersecurity impact analysis: State-of-the-art | |
Khadidos et al. | Integrating industrial appliances for security enhancement in data point using SCADA networks with learning algorithm | |
Carter et al. | Systems‐theoretic security requirements modeling for cyber‐physical systems | |
Jia et al. | Copula‐based reliability and safety analysis of safety‐critical systems with dependent failures | |
Benavides‐Serrano et al. | Optimal placement of gas detectors: AP‐median formulation considering dynamic nonuniform unavailabilities | |
Tohidi et al. | A continuous‐time Markov chain model for redundancy allocation problem: An economic analysis | |
Ding et al. | Review of cybersecurity for integrated energy systems with integration of cyber‐physical systems | |
Nemati et al. | Tri‐level transmission Expansion planning under intentional attacks: virtual attacker approach‐part II: case studies | |
Yun et al. | An optimal reliability and maintainability design of a searching system | |
Omogoye et al. | A review of power system predictive failure model for resilience enhancement against hurricane events | |
Teixeira et al. | Cyber-secure and resilient architectures for industrial control systems | |
Baycik et al. | Interdiction-based approaches to identify damage in disrupted critical infrastructures with dependencies | |
Daemi et al. | Detailed reliability assessment of composite power systems considering load variation and weather conditions using the Bayesian network | |
O’Halloran et al. | Assessing the consequence of cyber and physical malicious attacks in complex, cyber-physical systems during early system design | |
Wang et al. | Analysis of cascading probabilistic common cause failures | |
Qin et al. | Protection mechanism in reliability evaluation approach to multistate system with common cause failure |