$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Extended multilevel flow model-based dynamic risk assessment for cybersecurity protection in industrial production systems 원문보기

International journal of distributed sensor networks, v.14 no.6, 2018년, pp.155014771877956 -   

Zhu, Qianxiang (Key Laboratory of Ministry of Education for Image Processing and Intelligent Control, School of Automation, Huazhong University of Science and Technology, Wuhan, China) ,  Qin, Yuanqing (Key Laboratory of Ministry of Education for Image Processing and Intelligent Control, School of Automation, Huazhong University of Science and Technology, Wuhan, China) ,  Zhou, Chunjie (Key Laboratory of Ministry of Education for Image Processing and Intelligent Control, School of Automation, Huazhong University of Science and Technology, Wuhan, China) ,  Gao, Weiwei (Key Laboratory of Ministry of Education for Image Processing and Intelligent Control, School of Automation, Huazhong University of Science and Technology, Wuhan, China)

Abstract AI-Helper 아이콘AI-Helper

Cybersecurity protection becomes an essential requirement for industrial production systems, while industrial production systems are moving from isolation to interconnection with the development of information and communication technology. Dynamic risk assessment plays an important role in cybersec...

참고문헌 (35)

  1. Idaho National Lab Pederson P 27 25 2006 

  2. Benali, M., Hammache, A., Aubé, F., Dipama, J., Cantave, R.. Dynamic multiobjective optimization of large-scale industrial production systems: An emerging strategy. International journal of energy research, vol.31, no.12, 1202-1225.

  3. Zaeh, Michael F., Reinhart, Gunther, Ostgathe, Martin, Geiger, Florian, Lau, Christian. A holistic approach for the cognitive control of production systems. Advanced engineering informatics, vol.24, no.3, 300-307.

  4. Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics Guan J 150 

  5. Langner, R. Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE security & privacy, vol.9, no.3, 49-51.

  6. Piggin, R.. Cyber security trends: What should keep CEOs awake at night. International journal of critical infrastructure protection, vol.13, 36-38.

  7. Shameli-Sendi, Alireza, Dagenais, Michel. ARITO: Cyber-attack response system using accurate risk impact tolerance. International Journal of Information Security : IJIS, vol.13, no.4, 367-390.

  8. Chunjie Zhou, Shuang Huang, Naixue Xiong, Shuang-Hua Yang, Huiyun Li, Yuanqing Qin, Xuan Li. Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation. IEEE transactions on systems, man, and cybernetics. Systems, vol.45, no.10, 1345-1360.

  9. Kaplan, Stanley, Garrick, B. John. On The Quantitative Definition of Risk. Risk analysis : an official publication of the Society for Risk Analysis, vol.1, no.1, 11-27.

  10. Henry, Matthew H., Haimes, Yacov Y.. A Comprehensive Network Security Risk Model for Process Control Networks. Risk analysis : an official publication of the Society for Risk Analysis, vol.29, no.2, 223-248.

  11. Zhang, Qi, Zhou, Chunjie, Xiong, Naixue, Qin, Yuanqing, Li, Xuan, Huang, Shuang. Multimodel-Based Incident Prediction and Risk Assessment in Dynamic Cybersecurity Protection for Industrial Control Systems. IEEE transactions on systems, man, and cybernetics. Systems, vol.46, no.10, 1429-1444.

  12. Chee-Wooi Ten, Manimaran, Govindarasu, Chen-Ching Liu. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling. IEEE transactions on systems, man, and cybernetics. a publication of the IEEE Systems, Man, and Cybernetics Society. Part A, Systems and humans, vol.40, no.4, 853-865.

  13. Garbolino, Emmanuel, Chery, Jean‐Pierre, Guarnieri, Franck. A Simplified Approach to Risk Assessment Based on System Dynamics: An Industrial Case Study. Risk analysis : an official publication of the Society for Risk Analysis, vol.36, no.1, 16-29.

  14. Genge, B., Kiss, I., Haller, P.. A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures. International journal of critical infrastructure protection, vol.10, 3-17.

  15. Li, Xuan, Zhou, Chunjie, Tian, Yu-Chu, Xiong, Naixue, Qin, Yuanqing. Asset-Based Dynamic Impact Assessment of Cyberattacks for Risk Analysis in Industrial Control Systems. IEEE transactions on industrial informatics, vol.14, no.2, 608-618.

  16. Abdo, H., Kaouk, M., Flaus, J.-M., Masse, F.. A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie – combining new version of attack tree with bowtie analysis. Computers & security, vol.72, 175-195.

  17. Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., Stoddart, K.. A review of cyber security risk assessment methods for SCADA systems. Computers & security, vol.56, 1-27.

  18. Teixeira, Andre, Kin Cheong Sou, Sandberg, Henrik, Johansson, Karl Henrik. Secure Control Systems: A Quantitative Risk Management Approach. IEEE control systems magazine, vol.35, no.1, 24-45.

  19. Sridhar, Siddharth, Hahn, Adam, Govindarasu, Manimaran. Cyber–Physical System Security for the Electric Power Grid. Proceedings of the IEEE, vol.100, no.1, 210-224.

  20. Tan, R. R., Lam, H. L., Kasivisvanathan, H., Ng, D. K. S., Foo, D. C. Y., Kamal, M., Hallaler, N., Klemeš, J. J.. An algebraic approach to identifying bottlenecks in linear process models of multifunctional energy systems. Theoretical foundations of chemical engineering, vol.46, no.6, 642-650.

  21. Larsson, Jan Eric. Diagnosis based on explicit means-end models. Artificial intelligence, vol.80, no.1, 29-93.

  22. Wu, J., Zhang, L., Liang, W., Hu, J.. A novel failure mode analysis model for gathering system based on Multilevel Flow Modeling and HAZOP. Process safety and environmental protection : transactions of the Institution of Chemical Engineers, Part B, vol.91, no.1, 54-60.

  23. Wang, W., Yang, M.. Implementation of an integrated real-time process surveillance and diagnostic system for nuclear power plants. Annals of nuclear energy, vol.97, 7-26.

  24. Chemical process: design and integration Smith R 2005 

  25. Proceedings of the 6th ACM symposium on information, computer and communications security (ASIACCS ’11) C’ardenas AA 355 

  26. Moral, Hakan, Aksoy, Aysegul, Gokcay, Celal F.. Modeling of the activated sludge process by using artificial neural networks with automated architecture screening. Computers & chemical engineering, vol.32, no.10, 2471-2478.

  27. Morad, Noor Azian, Mohd Zin, Rohani, Mohd Yusof, Khairiyah, Abdul Aziz, Mustafa Kamal. Process Modelling of Combined Degumming and Bleaching in Palm Oil Refining Using Artificial Neural Network. Journal of the American Oil Chemists' Society : JAOCS, vol.87, no.11, 1381-1388.

  28. Zarei, Esmaeil, Azadeh, Ali, Khakzad, Nima, Aliabadi, Mostafa Mirzaei, Mohammadfam, Iraj. Dynamic safety assessment of natural gas stations using Bayesian network. Journal of hazardous materials, vol.321, 830-840.

  29. Khakzad, Nima, Khan, Faisal, Amyotte, Paul. Safety analysis in process facilities: Comparison of fault tree and Bayesian network approaches. Reliability engineering & system safety, vol.96, no.8, 925-932.

  30. Dejaeger, K., Verbraken, T., Baesens, B.. Toward Comprehensible Software Fault Prediction Models Using Bayesian Network Classifiers. IEEE transactions on software engineering, vol.39, no.2, 237-257.

  31. Poolsappasit, N., Dewri, R., Ray, I.. Dynamic Security Risk Management Using Bayesian Attack Graphs. IEEE transactions on dependable and secure computing, vol.9, no.1, 61-74.

  32. Proceedings of the 4th ACM workshop on quality of protection Frigault M 23 

  33. International conference on neural networks Dan Foresee F 1930 

  34. Introduction to mathematical statistics Hogg RV 1995 5 

  35. Risk assessment: theory, methods, and applications Rausand M 115 2013 

섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로