Vaidyan et al., 2023 - Google Patents
On fuzzy inference based supervisory control decision model with quantum artificial intelligence electromagnetic prediction modelsVaidyan et al., 2023
- Document ID
- 11750917950900118899
- Author
- Vaidyan V
- Tyagi A
- Publication year
- Publication venue
- International Journal of Cybernetics and Cyber-Physical Systems
External Links
Snippet
Robust Supervisory Control Systems that interface with programmable logic controllers (PLCs) are crucial components of Industrial Control Systems (ICS) to manage critical infrastructure. On the other hand, current industrial control systems consist of highly …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11689544B2 (en) | Intrusion detection via semantic fuzzing and message provenance | |
Zhang et al. | Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data | |
Chong et al. | A tutorial introduction to security and privacy for cyber-physical systems | |
El-Kady et al. | Analysis of safety and security challenges and opportunities related to cyber-physical systems | |
Bhamare et al. | Cybersecurity for industrial control systems: A survey | |
Fillatre et al. | Security of SCADA systems against cyber–physical attacks | |
Feng et al. | Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks | |
Ayodeji et al. | A new perspective towards the development of robust data-driven intrusion detection for industrial control systems | |
Krotofil et al. | Industrial control systems security: What is happening? | |
Yang et al. | Anomaly-based intrusion detection for SCADA systems | |
Wu et al. | Intrusion detection system for cyber-manufacturing system | |
Kaouk et al. | A review of intrusion detection systems for industrial control systems | |
Bou-Harb | A brief survey of security approaches for cyber-physical systems | |
CN115996146A (en) | Numerical control system security situation awareness and analysis system, method, equipment and terminal | |
Al-Hawawreh et al. | An efficient intrusion detection model for edge system in brownfield industrial internet of things | |
AU2020102142A4 (en) | Technique for multilayer protection from quantifiable vulnerabilities in industrial cyber physical system | |
Teng et al. | Deep learning-based risk management of financial market in smart grid | |
Erba et al. | Assessing model-free anomaly detection in industrial control systems against generic concealment attacks | |
Vaidyan et al. | Towards quantum artificial intelligence electromagnetic prediction models for ladder logic bombs and faults in programmable logic controllers | |
Wu et al. | Intrusion detection of cyber-physical attacks in manufacturing systems: A review | |
Alqurashi et al. | On the performance of isolation forest and multi layer perceptron for anomaly detection in industrial control systems networks | |
Monzer et al. | Model-based IDS design for ICSs | |
Akbarian et al. | Attack resilient cloud-based control systems for industry 4.0 | |
Liu et al. | SEAG: A novel dynamic security risk assessment method for industrial control systems with consideration of social engineering | |
Shyamasundar | Security and protection of SCADA: a bigdata algorithmic approach |