Journal ArticleDOI
Problems of Security in Digital Production and Its Resistance to Cyber Threats
Reads0
Chats0
TLDR
To analyze the problem of ensuring the security of digital production, the concept of cyberphysical systems is used and the perspectives of using homeostatic control of the stability of such systems using self-similarity indicators are considered.Abstract:
This paper considers digital production as a stage of industrialization. One aspect of this process is the associated digital transformation of control systems. To analyze the problem of ensuring the security of digital production, the concept of cyberphysical systems is used. The perspectives of using homeostatic control of the stability of such systems using self-similarity indicators are considered.read more
Citations
More filters
Journal ArticleDOI
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things
TL;DR: The issues of cybersecurity of the industrial internet of things as the main driver for the development of Enterprise 4.0, compared with the staged protection approach used in automated process control systems are presented.
Journal ArticleDOI
Automatic cyber security risk assessment based on fuzzy fractional ordinary differential equations
TL;DR: The experimental results show that the model can quantitatively analyze the current security situation of the network in real time and make predictions about the risks faced by the network, and it is close to the actual risk situation, with high prediction accuracy.
Proceedings ArticleDOI
A Mini Literature Review on Integrating Cybersecurity for Business Continuity
TL;DR: In this article , the authors focus on falling the gaps between cybersecurity and business continuity and integrating them in order to establish resilience systems and enable organizations to ensure that the proper processes are being put in place and resources are allocated to help facilitate a smooth transition as they recover from cyber incidents.
Journal ArticleDOI
Benford’s Law in the Detection of DoS Attacks on Industrial Systems
TL;DR: Application of Benford’s law is proposed to detect DoS attacks on large-scale industrial system components using sensors within the Tennessee Eastman process.
Proceedings ArticleDOI
A Mini Literature Review on Integrating Cybersecurity for Business Continuity
TL;DR: In this article , the authors focus on falling the gaps between cybersecurity and business continuity and integrating them in order to establish resilience systems and enable organizations to ensure that the proper processes are being put in place and resources are allocated to help facilitate a smooth transition as they recover from cyber incidents.
References
More filters
Proceedings Article
SANE: a protection architecture for enterprise networks
Martin Casado,Tal Garfinkel,Aditya Akella,Michael J. Freedman,Dan Boneh,Nick McKeown,Scott Shenker +6 more
TL;DR: SANE offers strong attack resistance and containment in the face of compromise, yet is practical for everyday use, and can easily scale to networks of tens of thousands of nodes.
Journal ArticleDOI
Cyber physical systems security
Yosef Ashibani,Qusay H. Mahmoud +1 more
TL;DR: An analysis of the security issues at the various layers of CPS architecture, risk assessment and techniques for securing CPS is presented and possible solutions are presented.
Journal ArticleDOI
Doctrine for Cybersecurity
TL;DR: This essay discusses the failings of previous doctrines of cybersecurity and surveys the landscape of cybersecurity through the lens that a new doctrine, public cybersecurity, provides.
Journal ArticleDOI
Cyber-Physical Systems
TL;DR: This research presents a meta-modelling architecture that automates the very labor-intensive and therefore time-heavy and therefore expensive and expensive process of integrating digital and physical systems into one another.