首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1篇
  免费   2篇
自动化技术   3篇
  2020年   1篇
  2015年   1篇
  2014年   1篇
排序方式: 共有3条查询结果,搜索用时 15 毫秒
1
1.
The likelihood of cyber-attacks against information systems and related production control systems has increased. In order to lower the risk of cyber-attacks, OS makers release timely security updates. However, the amount of time that is available for applying patches is limited on production control systems and the possibility of side effects is a concern. Therefore, we focused on the patch application cycle and the period of pretest, and proposed optimal OS measures for production control systems. We presented the method for quantifying the risk of cyber-attacks on production control systems due to security patches not being applied and for expressing the risk as a monetary amount. This method was also proposed for deriving the patch application cycle, the number of applications, and the optimum test duration. We concluded that this method help to understand the patch management and related security measure and to protect production control systems from cyber-attacks.  相似文献   
2.
This paper examines the stabilization problem of a distributed networked control system under the effect of cyber-attacks by employing a hybrid aperiodic triggering mechanism. The cyber-attack considered in the paper is a stochastic deception attack at the sensor-controller end. The probability of the occurrence of attack on a subsystem is represented using a random variable. A decentralized hybrid sampled-data strategy is introduced to save energy consumption and reduce the transmission load of the network. In the proposed decentralized strategy, each subsystem can decide independently whether its state should be transmitted to the controller or not. The scheme of the hybrid triggering mechanism for each subsystem composed of two stages: In the first stage, the next sampling instant is computed using a self-triggering strategy. Subsequently, in the second stage, an event-triggering condition is checked at these sampling instants and the control signal is computed only if the event-triggering condition is violated. The self-triggering condition used in the first stage is dependent on the selection of event-triggering condition of the second stage. Finally, a comparison of the proposed approach with other triggering mechanisms existing in the literature is presented in terms of the sampling instants, transmission frequency and performance measures through simulation examples.   相似文献   
3.
In order to compromise a target control system successfully, hackers possibly attempt to launch multiple cyberattacks aiming at multiple communication channels of the control system. However, the problem of detecting multiple cyber-attacks has been hardly investigated so far. Therefore, this paper deals with the detection of multiple stochastic cyber-attacks aiming at multiple communication channels of a control system. Our goal is to design a detector for the control system under multiple cyberattacks. Based on frequency-domain transformation technique and auxiliary detection tools, an algebraic detection approach is proposed. By applying the presented approach, residual information caused by different attacks is obtained respectively and anomalies in the control system are detected. Sufficient and necessary conditions guaranteeing the detectability of the multiple stochastic cyber-attacks are obtained. The presented detection approach is simple and straightforward. Finally, two simulation examples are provided, and the simulation results show that the detection approach is effective and feasible.   相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号