최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기International journal of distributed sensor networks, v.14 no.6, 2018년, pp.155014771877956 -
Zhu, Qianxiang (Key Laboratory of Ministry of Education for Image Processing and Intelligent Control, School of Automation, Huazhong University of Science and Technology, Wuhan, China) , Qin, Yuanqing (Key Laboratory of Ministry of Education for Image Processing and Intelligent Control, School of Automation, Huazhong University of Science and Technology, Wuhan, China) , Zhou, Chunjie (Key Laboratory of Ministry of Education for Image Processing and Intelligent Control, School of Automation, Huazhong University of Science and Technology, Wuhan, China) , Gao, Weiwei (Key Laboratory of Ministry of Education for Image Processing and Intelligent Control, School of Automation, Huazhong University of Science and Technology, Wuhan, China)
Cybersecurity protection becomes an essential requirement for industrial production systems, while industrial production systems are moving from isolation to interconnection with the development of information and communication technology. Dynamic risk assessment plays an important role in cybersec...
Idaho National Lab Pederson P 27 25 2006
Benali, M., Hammache, A., Aubé, F., Dipama, J., Cantave, R.. Dynamic multiobjective optimization of large-scale industrial production systems: An emerging strategy. International journal of energy research, vol.31, no.12, 1202-1225.
Zaeh, Michael F., Reinhart, Gunther, Ostgathe, Martin, Geiger, Florian, Lau, Christian. A holistic approach for the cognitive control of production systems. Advanced engineering informatics, vol.24, no.3, 300-307.
Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics Guan J 150
Langner, R. Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE security & privacy, vol.9, no.3, 49-51.
Piggin, R.. Cyber security trends: What should keep CEOs awake at night. International journal of critical infrastructure protection, vol.13, 36-38.
Shameli-Sendi, Alireza, Dagenais, Michel. ARITO: Cyber-attack response system using accurate risk impact tolerance. International Journal of Information Security : IJIS, vol.13, no.4, 367-390.
Chunjie Zhou, Shuang Huang, Naixue Xiong, Shuang-Hua Yang, Huiyun Li, Yuanqing Qin, Xuan Li. Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation. IEEE transactions on systems, man, and cybernetics. Systems, vol.45, no.10, 1345-1360.
Kaplan, Stanley, Garrick, B. John. On The Quantitative Definition of Risk. Risk analysis : an official publication of the Society for Risk Analysis, vol.1, no.1, 11-27.
Henry, Matthew H., Haimes, Yacov Y.. A Comprehensive Network Security Risk Model for Process Control Networks. Risk analysis : an official publication of the Society for Risk Analysis, vol.29, no.2, 223-248.
Zhang, Qi, Zhou, Chunjie, Xiong, Naixue, Qin, Yuanqing, Li, Xuan, Huang, Shuang. Multimodel-Based Incident Prediction and Risk Assessment in Dynamic Cybersecurity Protection for Industrial Control Systems. IEEE transactions on systems, man, and cybernetics. Systems, vol.46, no.10, 1429-1444.
Chee-Wooi Ten, Manimaran, Govindarasu, Chen-Ching Liu. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling. IEEE transactions on systems, man, and cybernetics. a publication of the IEEE Systems, Man, and Cybernetics Society. Part A, Systems and humans, vol.40, no.4, 853-865.
Garbolino, Emmanuel, Chery, Jean‐Pierre, Guarnieri, Franck. A Simplified Approach to Risk Assessment Based on System Dynamics: An Industrial Case Study. Risk analysis : an official publication of the Society for Risk Analysis, vol.36, no.1, 16-29.
Genge, B., Kiss, I., Haller, P.. A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures. International journal of critical infrastructure protection, vol.10, 3-17.
Li, Xuan, Zhou, Chunjie, Tian, Yu-Chu, Xiong, Naixue, Qin, Yuanqing. Asset-Based Dynamic Impact Assessment of Cyberattacks for Risk Analysis in Industrial Control Systems. IEEE transactions on industrial informatics, vol.14, no.2, 608-618.
Abdo, H., Kaouk, M., Flaus, J.-M., Masse, F.. A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie – combining new version of attack tree with bowtie analysis. Computers & security, vol.72, 175-195.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., Stoddart, K.. A review of cyber security risk assessment methods for SCADA systems. Computers & security, vol.56, 1-27.
Teixeira, Andre, Kin Cheong Sou, Sandberg, Henrik, Johansson, Karl Henrik. Secure Control Systems: A Quantitative Risk Management Approach. IEEE control systems magazine, vol.35, no.1, 24-45.
Sridhar, Siddharth, Hahn, Adam, Govindarasu, Manimaran. Cyber–Physical System Security for the Electric Power Grid. Proceedings of the IEEE, vol.100, no.1, 210-224.
Tan, R. R., Lam, H. L., Kasivisvanathan, H., Ng, D. K. S., Foo, D. C. Y., Kamal, M., Hallaler, N., Klemeš, J. J.. An algebraic approach to identifying bottlenecks in linear process models of multifunctional energy systems. Theoretical foundations of chemical engineering, vol.46, no.6, 642-650.
Larsson, Jan Eric. Diagnosis based on explicit means-end models. Artificial intelligence, vol.80, no.1, 29-93.
Wu, J., Zhang, L., Liang, W., Hu, J.. A novel failure mode analysis model for gathering system based on Multilevel Flow Modeling and HAZOP. Process safety and environmental protection : transactions of the Institution of Chemical Engineers, Part B, vol.91, no.1, 54-60.
Wang, W., Yang, M.. Implementation of an integrated real-time process surveillance and diagnostic system for nuclear power plants. Annals of nuclear energy, vol.97, 7-26.
Chemical process: design and integration Smith R 2005
Proceedings of the 6th ACM symposium on information, computer and communications security (ASIACCS ’11) C’ardenas AA 355
Moral, Hakan, Aksoy, Aysegul, Gokcay, Celal F.. Modeling of the activated sludge process by using artificial neural networks with automated architecture screening. Computers & chemical engineering, vol.32, no.10, 2471-2478.
Morad, Noor Azian, Mohd Zin, Rohani, Mohd Yusof, Khairiyah, Abdul Aziz, Mustafa Kamal. Process Modelling of Combined Degumming and Bleaching in Palm Oil Refining Using Artificial Neural Network. Journal of the American Oil Chemists' Society : JAOCS, vol.87, no.11, 1381-1388.
Zarei, Esmaeil, Azadeh, Ali, Khakzad, Nima, Aliabadi, Mostafa Mirzaei, Mohammadfam, Iraj. Dynamic safety assessment of natural gas stations using Bayesian network. Journal of hazardous materials, vol.321, 830-840.
Khakzad, Nima, Khan, Faisal, Amyotte, Paul. Safety analysis in process facilities: Comparison of fault tree and Bayesian network approaches. Reliability engineering & system safety, vol.96, no.8, 925-932.
Dejaeger, K., Verbraken, T., Baesens, B.. Toward Comprehensible Software Fault Prediction Models Using Bayesian Network Classifiers. IEEE transactions on software engineering, vol.39, no.2, 237-257.
Poolsappasit, N., Dewri, R., Ray, I.. Dynamic Security Risk Management Using Bayesian Attack Graphs. IEEE transactions on dependable and secure computing, vol.9, no.1, 61-74.
Proceedings of the 4th ACM workshop on quality of protection Frigault M 23
International conference on neural networks Dan Foresee F 1930
Introduction to mathematical statistics Hogg RV 1995 5
Risk assessment: theory, methods, and applications Rausand M 115 2013
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.