scispace - formally typeset
Journal ArticleDOI

Digital Manufacturing Security Indicators

Dmitry P. Zegzhda, +1 more
- 01 Dec 2018 - 
- Vol. 52, Iss: 8, pp 1150-1159
Reads0
Chats0
TLDR
Security indicators specific to digital manufacturing are described, divided into self-similarity-based security indicators, sustainability indicators, and indicators characterizing the homeostatic ability of cyberphysical systems that form the basis of digital production.
Abstract
This paper describes security indicators specific to digital manufacturing. We divided the set of indicators into three groups: self-similarity-based security indicators, sustainability indicators, and indicators characterizing the homeostatic ability of cyberphysical systems that form the basis of digital production. Indicators can be applied to any type of digital production systems to detect security problems, control the sustainability of their operation, and maintain resilience.

read more

Citations
More filters
Proceedings ArticleDOI

Using GRU neural network for cyber-attack detection in automated process control systems

TL;DR: An approach to the detection of information security breaches in automated process control systems (APCS), which consists in forecasting multivariate time series formed from the values of the operating parameters of the end system devices, is provided.
Proceedings ArticleDOI

Predicting cyber attacks on industrial systems using the Kalman filter

TL;DR: The use of a Kalman filter is proposed to solve the problem of forecasting time series describing the gasoil heating loop process and the limitations associated with this approach are described.
Journal ArticleDOI

Cyber Attack Prevention Based on Evolutionary Cybernetics Approach

TL;DR: The main conclusions and recommendations consist of the fact that using an evolutionary approach will not only increase the security of cyber–physical systems, but also define the principles of building systems that are resistant to cyber attacks.
Proceedings ArticleDOI

AI-based Security for the Smart Networks

TL;DR: This study sets a comprehensive approach that aggregates the artificial intelligence (AI) based protection erecting a multimodal intrusion prevention approach that has shown the higher effectiveness than a traditional technique of the intensive data processing.
Journal ArticleDOI

Approach to the Evaluation of the Efficiency of Information Security in Control Systems

TL;DR: A methodological approach to evaluate the efficiency of information security in the information-control subsystem of a complex dynamic system is proposed in this paper, where the degree of realization of possibilities of the controlled dynamic system with consideration of damage prevention expressed in the change in the control cycle duration depending on the destructive actions that damage the completeness, integrity, accuracy, reliability, accessibility, and operability of processing of the information necessary for forming management decisions.
References
More filters
Journal ArticleDOI

Determining Lyapunov exponents from a time series

TL;DR: In this article, the authors present the first algorithms that allow the estimation of non-negative Lyapunov exponents from an experimental time series, which provide a qualitative and quantitative characterization of dynamical behavior.
Journal ArticleDOI

Characterization of Strange Attractors

TL;DR: In this article, a measure of strange attractors is introduced which offers a practical algorithm to determine their character from the time series of a single observable, and the relation of this measure to fractal dimension and information-theoretic entropy is discussed.
Book

Statistics for long-memory processes

TL;DR: Theorems of Stationary Processes with Long Memory Limit Theorems and Estimations of Long Memory-Heuristic Approaches, Forecasting Regression Goodness of Fit Tests, and Robust Estimation of Long memory estimates are presented.
Journal ArticleDOI

Predicting chaotic time series

TL;DR: An error estimate is presented for this forecasting technique for chaotic data, and its effectiveness is demonstrated by applying it to several examples, including data from the Mackey-Glass delay differential equation, Rayleigh-Benard convection, and Taylor-Couette flow.
Related Papers (5)