Recovery of Structural Controllability into Critical Infrastructures under Malicious Attacks

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Stealth Attacks in Critical Information Infrastructures

Current Critical Infrastructures (CIs) are complex interconnected industrial systems that, in recent years, have incorporated information and communications technologies such as connection to the Internet and commercial off-the-shelf components. This makes them easier to operate and maintain, but exposes them to the threats and attacks that inundate conventional networks and systems. This paper...

متن کامل

Recovery of Structural Controllability for Control Systems

Two of the fundamental problems of control systems theory are controllability and observability, and designing control systems so that these properties can be satisfied or approximated sufficiently. However, it is prudent to assume that attackers will not only be able to subvert measurements but also control. Moreover, advanced adversaries with an understanding of the control system may seek to...

متن کامل

Model-Based Evaluation of the Resilience of Critical Infrastructures Under Cyber Attacks

In this paper we report recent results on modelling the impact of cyber-attacks on the resilience of complex industrial systems. We use a hybrid model of the system under study in which the accidental failures and the malicious behaviour of the Adversary are modelled stochastically, while the consequences of failures and attacks are modelled in detail using deterministic models. This modelling ...

متن کامل

Simulative Evaluation of Security Attacks in Networked Critical Infrastructures

ICT is becoming a fundamental and pervasive component of critical infrastructures (CIs). Despite the advantages that it brings about, ICT also exposes CIs to a number of security attacks that can severely compromise human safety, service availability and business interests. Although it is vital to ensure an adequate level of security, it is practically infeasible to counteract all possible atta...

متن کامل

Robustness of the RaptorQ FEC Code Under Malicious Attacks

The RaptorQ code is the most advanced standardised fountain code. Its properties make it very attractive for forward error correction, offering great reliability even at low overheads (i.e., for a small amount of repair information), but also admirable encoding and decoding performance. Since the code is relatively recent and the standard is complex, we are in the process of developing the firs...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2020

ISSN: 2156-5570,2158-107X

DOI: 10.14569/ijacsa.2020.0110493