A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems
暂无分享,去创建一个
[1] Jaime A. Camelio,et al. Trojan Detection and Side-channel Analyses for Cyber-security in Cyber-physical Manufacturing Systems , 2015 .
[2] Jaime A. Camelio,et al. An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems , 2017 .
[3] Robert K. Abercrombie,et al. Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC) , 2015, J. Artif. Intell. Soft Comput. Res..
[4] C. Hauert,et al. Game theory and physics , 2005 .
[5] Jules White,et al. Cyber-physical security challenges in manufacturing systems , 2014 .
[6] Bradley Reaves,et al. Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems , 2012, Int. J. Crit. Infrastructure Prot..
[7] Jay Lee,et al. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .
[8] Sherif Abdelwahed,et al. Model-based autonomic security management for cyber-physical infrastructures , 2016, Int. J. Crit. Infrastructures.
[9] Banu Yetkin Ekren,et al. A simulation based experimental design to analyze factors affecting production flow time , 2008, Simul. Model. Pract. Theory.
[10] Przemyslaw Korytkowski,et al. Simulation-based efficiency analysis of an in-plant milk-run operator under disturbances , 2015, The International Journal of Advanced Manufacturing Technology.
[11] Kathryn E. Stecke,et al. Evaluation of the impact of information delays on flexible manufacturing systems performance in dynamic scheduling environments , 2013 .
[12] Amir H.D. Markazi,et al. Networked control of industrial automation systems—a new predictive method , 2012 .
[13] Jules White,et al. Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the .STL file with human subjects , 2017 .
[14] Mohammad Abdollahi Azgomi,et al. A game-theoretic approach to model and quantify the security of cyber-physical systems , 2017, Comput. Ind..
[15] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[16] Sherif Abdelwahed,et al. A Model-based Approach to Self-Protection in SCADA Systems , 2014, Feedback Computing.
[17] David Hutchison,et al. A survey of cyber security management in industrial control systems , 2015, Int. J. Crit. Infrastructure Prot..
[18] Lin Chen,et al. A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks , 2009, IEEE Transactions on Information Forensics and Security.
[19] H. Pierreval *,et al. A simulation-based optimization approach to size manufacturing systems , 2005 .
[20] Mason Rice,et al. Improving the cyber resilience of industrial control systems , 2017, Int. J. Crit. Infrastructure Prot..
[21] Yang Xiao,et al. Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.
[22] Nektarios Georgios Tsoutsos,et al. Manufacturing and Security Challenges in 3D Printing , 2016 .