In order to be flexible and handle complex scenarios, intelligentautomationsystems might benefit from automated planning techniques which rely on specifications and models describing their behavior. However, due to ...
详细信息
With the rapid growth of the Internet of Things, cyber-attacks have also been increasing. To identify and prevent these threats, Intrusion Detection systems analyze network data traffic patterns. However, processing r...
详细信息
Considering the problem concerning voltage beyond limit caused by the photovoltaic generators in low-voltage distribution network system, a power-voltage coordinated manage method about inverters is offered to deal wi...
详细信息
The article is devoted to decision support aimed at ensuring the reliability of cyber-physical systems and assessing the accuracy and timeliness of the implementation of human-operator and automation interaction proce...
详细信息
Due to the development of wireless networks, many secure remote state estimation algorithms have been studied by researchers. This paper proposed an improved Kalman filter method to deal with the secure remote state e...
详细信息
This study introduces a semi-automatic method that assists in Product Innovation (PI). The Smart Innovation Engineering System (SIES) facilitates choice-making by explicitly understanding formal decision processes. Th...
详细信息
intelligent substations, as an important part of modern power grids, have been widely used in the automationcontrol of power systems. Although the existing One-Key sequential controltechnology has significant result...
详细信息
To address the need for flexibility of production plants in the process industry modularization is a widely accepted approach. In particular, the Module Type Package Concept described in VDI/VDE/NAMUR 2658 is seen as ...
详细信息
ISBN:
(纸本)9781665493130
To address the need for flexibility of production plants in the process industry modularization is a widely accepted approach. In particular, the Module Type Package Concept described in VDI/VDE/NAMUR 2658 is seen as a possible core part for modularization. A clear separation of engineering efforts into plant-independent module engineering and plant-specific integration engineering as well as a fast integration of a module's automation system into a higher-level process control system changes the fundamental automation architecture. However, in the state-of-the-art technical literature which has been analyzed and applied by the authors, few security considerations are made for modularization and especially the Module Type Package. This is even more problematic considering that even with an extensive field of security analysis, standards, and guidelines to secure conventional operational technology recent reports found severe vulnerabilities in those. This paper elaborates on security standards and guidelines to which the Module Type Package Concept should be compliant to achieve a high coverage regarding security requirements in the context of industrial automation and controlsystems. Based on this a security analysis of the Module Type Package Concept is performed on the IEC 62443, VDI/VDE 2182, and NIST SP 800-82.
cyberbullying refers to the harassment, threatening or damage using online platforms. There was a significant increase in the number of cyberbullying cases mainly due to a spike in the number of people using the inter...
详细信息
To solve the Denial of service (DoS) attack problem in communication channel between sensor node and controller node in cyber physical system, a multi-step compensation control strategy was proposed. Firstly, a DoS at...
详细信息
暂无评论