Journal ArticleDOI
Digital Manufacturing Security Indicators
Reads0
Chats0
TLDR
Security indicators specific to digital manufacturing are described, divided into self-similarity-based security indicators, sustainability indicators, and indicators characterizing the homeostatic ability of cyberphysical systems that form the basis of digital production.Abstract:
This paper describes security indicators specific to digital manufacturing. We divided the set of indicators into three groups: self-similarity-based security indicators, sustainability indicators, and indicators characterizing the homeostatic ability of cyberphysical systems that form the basis of digital production. Indicators can be applied to any type of digital production systems to detect security problems, control the sustainability of their operation, and maintain resilience.read more
Citations
More filters
Proceedings ArticleDOI
Using GRU neural network for cyber-attack detection in automated process control systems
TL;DR: An approach to the detection of information security breaches in automated process control systems (APCS), which consists in forecasting multivariate time series formed from the values of the operating parameters of the end system devices, is provided.
Proceedings ArticleDOI
Predicting cyber attacks on industrial systems using the Kalman filter
TL;DR: The use of a Kalman filter is proposed to solve the problem of forecasting time series describing the gasoil heating loop process and the limitations associated with this approach are described.
Journal ArticleDOI
Cyber Attack Prevention Based on Evolutionary Cybernetics Approach
TL;DR: The main conclusions and recommendations consist of the fact that using an evolutionary approach will not only increase the security of cyber–physical systems, but also define the principles of building systems that are resistant to cyber attacks.
Proceedings ArticleDOI
AI-based Security for the Smart Networks
TL;DR: This study sets a comprehensive approach that aggregates the artificial intelligence (AI) based protection erecting a multimodal intrusion prevention approach that has shown the higher effectiveness than a traditional technique of the intensive data processing.
Journal ArticleDOI
Approach to the Evaluation of the Efficiency of Information Security in Control Systems
Peter D. Zegzhda,Vladimir Anisimov,P. V. Sem’yanov,A. F. Suprun,E. G. Anisimov,T. N. Saurenko,V. P. Los +6 more
TL;DR: A methodological approach to evaluate the efficiency of information security in the information-control subsystem of a complex dynamic system is proposed in this paper, where the degree of realization of possibilities of the controlled dynamic system with consideration of damage prevention expressed in the change in the control cycle duration depending on the destructive actions that damage the completeness, integrity, accuracy, reliability, accessibility, and operability of processing of the information necessary for forming management decisions.
References
More filters
Journal ArticleDOI
Determining Lyapunov exponents from a time series
TL;DR: In this article, the authors present the first algorithms that allow the estimation of non-negative Lyapunov exponents from an experimental time series, which provide a qualitative and quantitative characterization of dynamical behavior.
Journal ArticleDOI
Characterization of Strange Attractors
TL;DR: In this article, a measure of strange attractors is introduced which offers a practical algorithm to determine their character from the time series of a single observable, and the relation of this measure to fractal dimension and information-theoretic entropy is discussed.
Book
Statistics for long-memory processes
TL;DR: Theorems of Stationary Processes with Long Memory Limit Theorems and Estimations of Long Memory-Heuristic Approaches, Forecasting Regression Goodness of Fit Tests, and Robust Estimation of Long memory estimates are presented.
Journal ArticleDOI
Predicting chaotic time series
TL;DR: An error estimate is presented for this forecasting technique for chaotic data, and its effectiveness is demonstrated by applying it to several examples, including data from the Mackey-Glass delay differential equation, Rayleigh-Benard convection, and Taylor-Couette flow.