Listing 1 - 10 of 15 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
From manufacturing to chemical and petroleum processing to municipal utilities, you will find an industrial control system at the heart of these industries. Yet they were rarely designed to be secure from tampering or other threats. They were designed to be practical--to permit instant access by the operator to the control system. Learn about serious electronic threats and the all-too-common lack of security in industrial control systems. You will learn about the differences between enterprise IT security and industrial control security. And you will learn about functional security--a set of practices adapted from the world's industrial safety standards.
Process control --- Automatic control --- Automation --- Safety measures. --- Industrial Control Systems --- SCADA --- Process Controls --- Cyber Security --- Critical Infrastructure Protection --- Smart Grid
Choose an application
This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues.
cybersecurity --- critical Infrastructures --- privacy preservation --- risk management --- big data --- Internet of Things --- blockchain --- cyber threats --- cyber security and privacy policy --- hybrid war --- cybercrime --- COVID-19 pandemic --- coronavirus --- smart grids --- cyber security modeling and simulation --- cyber–physical systems --- industrial control systems --- network security and protocols --- cyber threat intelligence --- resiliency and security of cyber systems --- hardware security solutions --- intrusion detection --- secure communication protocols --- malware analysis --- attribution of cyber attacks --- simulation and test beds for security evaluation of critical infrastructures
Choose an application
This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues.
Technology: general issues --- History of engineering & technology --- cybersecurity --- critical Infrastructures --- privacy preservation --- risk management --- big data --- Internet of Things --- blockchain --- cyber threats --- cyber security and privacy policy --- hybrid war --- cybercrime --- COVID-19 pandemic --- coronavirus --- smart grids --- cyber security modeling and simulation --- cyber–physical systems --- industrial control systems --- network security and protocols --- cyber threat intelligence --- resiliency and security of cyber systems --- hardware security solutions --- intrusion detection --- secure communication protocols --- malware analysis --- attribution of cyber attacks --- simulation and test beds for security evaluation of critical infrastructures
Choose an application
This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues.
Technology: general issues --- History of engineering & technology --- cybersecurity --- critical Infrastructures --- privacy preservation --- risk management --- big data --- Internet of Things --- blockchain --- cyber threats --- cyber security and privacy policy --- hybrid war --- cybercrime --- COVID-19 pandemic --- coronavirus --- smart grids --- cyber security modeling and simulation --- cyber–physical systems --- industrial control systems --- network security and protocols --- cyber threat intelligence --- resiliency and security of cyber systems --- hardware security solutions --- intrusion detection --- secure communication protocols --- malware analysis --- attribution of cyber attacks --- simulation and test beds for security evaluation of critical infrastructures
Choose an application
Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems.
Technology: general issues --- History of engineering & technology --- smart grids --- device authentication --- situational awareness --- home area networks --- time-delay switch attack --- networked control systems --- secure control design --- Lyapunov theory --- attack estimation --- hardware-in-the-loop testing --- machine learning --- industrial control systems --- anomaly detection --- fault detection --- intrusion detection system --- blockchain --- security --- privacy --- financial transactions --- transportation systems --- autonomous vehicles --- power system resilience --- disaster --- Federated Learning --- edge intelligence --- resilience management systems --- resource-limitations --- demand response --- remedial testing --- greybox fuzzing --- vulnerability detection --- enhanced security --- traffic microsimulation tool --- cooperative automated driving systems --- vehicle powertrain --- safety --- road capacity --- contested environments --- anomaly isolation --- artificial neural networks --- Cyber Physical System --- out-of-bounds --- vulnerable detection --- patch --- inverter-based energy resources --- islanded microgrids --- resilient control design --- secondary control --- false data injection
Choose an application
This Special Issue presents extended versions of selected top papers of the Mediterranean Conference on Power Generation, Transmission, Distribution and Energy Conversion (MEDPOWER), held in Dubrovnik in 2018. The 11th Mediterranean Conference on Power Generation, Transmission, Distribution and Energy Conversion (MEDPOWER 2018) was held in Cavtat, Dubrobnik, Croatia, from 12 to 15 November 2018. The conference gathered more than 200 scientists, researchers, and experts from all around the world. A total of 147 oral presentations were held during the conference, with an additional 50 papers presented in special sessions. The top 10 papers have been selected for this Special Issue in Energies, covering a variety of topics from end-user challenges, distribution and transmission network operation and planning, to generation planning and modeling.
Research & information: general --- Technology: general issues --- balancing market design --- congestion management --- optimization methods --- power system modeling --- multi-agent modelling --- distribution networks --- distributed generation integration --- power system economics --- regulation --- optimisation --- electric vehicle --- forecasting model --- scenario generation --- probabilistic evaluation --- Active distribution systems --- voltage asymmetry --- converter control --- enhanced geothermal systems --- economic assessment --- environmental assessment --- optimization --- levelized cost of energy --- security of supply --- LOLP optimization --- VOLL --- generation expansion planning --- reliability --- phase shifters --- network reduction --- power system operation --- transmission network --- power transfer distribution factor --- NPP Krško --- CILRT --- GOTHIC code --- containment --- mass point method measurement --- weighting factors --- load morphing --- NSGA-II --- smart grid --- grid partition --- multi-objective optimization --- Pareto theory --- forensic investigations --- forensic evidence substation --- wide area monitoring protection and control --- phasor measurement units (PMUs) --- industrial control systems --- sandboxing
Choose an application
The Industrial Internet of Things (Industrial IoT—IIoT) has emerged as the core construct behind the various cyber-physical systems constituting a principal dimension of the fourth Industrial Revolution. While initially born as the concept behind specific industrial applications of generic IoT technologies, for the optimization of operational efficiency in automation and control, it quickly enabled the achievement of the total convergence of Operational (OT) and Information Technologies (IT). The IIoT has now surpassed the traditional borders of automation and control functions in the process and manufacturing industry, shifting towards a wider domain of functions and industries, embraced under the dominant global initiatives and architectural frameworks of Industry 4.0 (or Industrie 4.0) in Germany, Industrial Internet in the US, Society 5.0 in Japan, and Made-in-China 2025 in China. As real-time embedded systems are quickly achieving ubiquity in everyday life and in industrial environments, and many processes already depend on real-time cyber-physical systems and embedded sensors, the integration of IoT with cognitive computing and real-time data exchange is essential for real-time analytics and realization of digital twins in smart environments and services under the various frameworks’ provisions. In this context, real-time sensor networks and systems for the Industrial IoT encompass multiple technologies and raise significant design, optimization, integration and exploitation challenges. The ten articles in this Special Issue describe advances in real-time sensor networks and systems that are significant enablers of the Industrial IoT paradigm. In the relevant landscape, the domain of wireless networking technologies is centrally positioned, as expected.
History of engineering & technology --- anomaly detection --- recurrent neural networks --- neural networks compression --- LHC --- WirelessHART network --- delay analysis --- real-time systems --- multi-channel processing --- simulation modeling --- transmission scheduling scheme --- industrial internet of things --- wireless networks --- industrial control systems --- wireless networked control systems --- industrial IoT --- security --- legacy production machinery --- real-time condition monitoring --- wireless local area network --- IEEE 802.11ah --- medium access control --- timeliness --- Wireless Sensor and Actuator Networks (WSANs) --- multipath retransmission --- resource scheduling --- realtime wireless communication --- monitoring and control system --- virtualization --- controller area network --- fieldbus --- real-time --- container --- Industrial Internet of Things (IIoT) --- LoRa --- WiFi HaLow --- Time Slotted Channel Hopping (TSCH) --- Narrowband IoT (NB-IoT) --- Bluetooth Low Energy (BLE) --- BLE Long Range --- WirelessHART --- ISA100.11a --- deep sparse coding --- convolutional neural networks --- signal analysis --- respiratory diseases --- medication adherence --- hardware design --- trust --- cryptography --- n/a
Choose an application
This Special Issue presents extended versions of selected top papers of the Mediterranean Conference on Power Generation, Transmission, Distribution and Energy Conversion (MEDPOWER), held in Dubrovnik in 2018. The 11th Mediterranean Conference on Power Generation, Transmission, Distribution and Energy Conversion (MEDPOWER 2018) was held in Cavtat, Dubrobnik, Croatia, from 12 to 15 November 2018. The conference gathered more than 200 scientists, researchers, and experts from all around the world. A total of 147 oral presentations were held during the conference, with an additional 50 papers presented in special sessions. The top 10 papers have been selected for this Special Issue in Energies, covering a variety of topics from end-user challenges, distribution and transmission network operation and planning, to generation planning and modeling.
Research & information: general --- Technology: general issues --- balancing market design --- congestion management --- optimization methods --- power system modeling --- multi-agent modelling --- distribution networks --- distributed generation integration --- power system economics --- regulation --- optimisation --- electric vehicle --- forecasting model --- scenario generation --- probabilistic evaluation --- Active distribution systems --- voltage asymmetry --- converter control --- enhanced geothermal systems --- economic assessment --- environmental assessment --- optimization --- levelized cost of energy --- security of supply --- LOLP optimization --- VOLL --- generation expansion planning --- reliability --- phase shifters --- network reduction --- power system operation --- transmission network --- power transfer distribution factor --- NPP Krško --- CILRT --- GOTHIC code --- containment --- mass point method measurement --- weighting factors --- load morphing --- NSGA-II --- smart grid --- grid partition --- multi-objective optimization --- Pareto theory --- forensic investigations --- forensic evidence substation --- wide area monitoring protection and control --- phasor measurement units (PMUs) --- industrial control systems --- sandboxing
Listing 1 - 10 of 15 | << page >> |
Sort by
|