Nothing Special   »   [go: up one dir, main page]

Vaidyan et al., 2023 - Google Patents

On fuzzy inference based supervisory control decision model with quantum artificial intelligence electromagnetic prediction models

Vaidyan et al., 2023

Document ID
11750917950900118899
Author
Vaidyan V
Tyagi A
Publication year
Publication venue
International Journal of Cybernetics and Cyber-Physical Systems

External Links

Snippet

Robust Supervisory Control Systems that interface with programmable logic controllers (PLCs) are crucial components of Industrial Control Systems (ICS) to manage critical infrastructure. On the other hand, current industrial control systems consist of highly …
Continue reading at www.inderscienceonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition

Similar Documents

Publication Publication Date Title
US11689544B2 (en) Intrusion detection via semantic fuzzing and message provenance
Zhang et al. Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data
Chong et al. A tutorial introduction to security and privacy for cyber-physical systems
El-Kady et al. Analysis of safety and security challenges and opportunities related to cyber-physical systems
Bhamare et al. Cybersecurity for industrial control systems: A survey
Fillatre et al. Security of SCADA systems against cyber–physical attacks
Feng et al. Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks
Ayodeji et al. A new perspective towards the development of robust data-driven intrusion detection for industrial control systems
Krotofil et al. Industrial control systems security: What is happening?
Yang et al. Anomaly-based intrusion detection for SCADA systems
Wu et al. Intrusion detection system for cyber-manufacturing system
Kaouk et al. A review of intrusion detection systems for industrial control systems
Bou-Harb A brief survey of security approaches for cyber-physical systems
CN115996146A (en) Numerical control system security situation awareness and analysis system, method, equipment and terminal
Al-Hawawreh et al. An efficient intrusion detection model for edge system in brownfield industrial internet of things
AU2020102142A4 (en) Technique for multilayer protection from quantifiable vulnerabilities in industrial cyber physical system
Teng et al. Deep learning-based risk management of financial market in smart grid
Erba et al. Assessing model-free anomaly detection in industrial control systems against generic concealment attacks
Vaidyan et al. Towards quantum artificial intelligence electromagnetic prediction models for ladder logic bombs and faults in programmable logic controllers
Wu et al. Intrusion detection of cyber-physical attacks in manufacturing systems: A review
Alqurashi et al. On the performance of isolation forest and multi layer perceptron for anomaly detection in industrial control systems networks
Monzer et al. Model-based IDS design for ICSs
Akbarian et al. Attack resilient cloud-based control systems for industry 4.0
Liu et al. SEAG: A novel dynamic security risk assessment method for industrial control systems with consideration of social engineering
Shyamasundar Security and protection of SCADA: a bigdata algorithmic approach