標(biāo)題: Titlebook: Critical Information Infrastructures Security; 9th International Co Christos G. Panayiotou,Georgios Ellinas,Marios M. Conference proceedin [打印本頁] 作者: 偏差 時(shí)間: 2025-3-21 16:05
書目名稱Critical Information Infrastructures Security影響因子(影響力)
書目名稱Critical Information Infrastructures Security影響因子(影響力)學(xué)科排名
書目名稱Critical Information Infrastructures Security網(wǎng)絡(luò)公開度
書目名稱Critical Information Infrastructures Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Critical Information Infrastructures Security被引頻次
書目名稱Critical Information Infrastructures Security被引頻次學(xué)科排名
書目名稱Critical Information Infrastructures Security年度引用
書目名稱Critical Information Infrastructures Security年度引用學(xué)科排名
書目名稱Critical Information Infrastructures Security讀者反饋
書目名稱Critical Information Infrastructures Security讀者反饋學(xué)科排名
作者: 群居動(dòng)物 時(shí)間: 2025-3-21 23:34 作者: 2否定 時(shí)間: 2025-3-22 03:17
Exploitation of HART Wired Signal Distinct Native Attribute (WS-DNA) Features to Verify Field Deviceenges. A layered security strategy is addressed that exploits Physical (PHY) features to verify field device identity and infer normal-anomalous operating state using Distinct Native Attribute (DNA) features. The goal is inferential confirmation that Human Machine Interface (HMI) indicated condition作者: 說明 時(shí)間: 2025-3-22 06:37
Processing and Communications Rate Requirements in Sensor Networks for Physical Thread Assessment illegal activity over wide areas. In order to reach that potential, it is essential for the sensor network to operate efficiently by conducting processing and communication operations on a very limited power budget. In this work, it is shown that when sequentially assessing physical threats using a作者: Oafishness 時(shí)間: 2025-3-22 10:51 作者: 船員 時(shí)間: 2025-3-22 14:26
Decentralised Hierarchical Multi-rate Control of Large-Scale Drinking Water Networkscale system is partitioned into sub-systems each one of which is locally controlled by a stabilising linear controller which does not account for the prescribed constraints. A higher-layer controller commands reference signals at a lower uniform sampling frequency so as to enforce linear constraints作者: 船員 時(shí)間: 2025-3-22 21:00 作者: 火車車輪 時(shí)間: 2025-3-22 23:00 作者: 闡明 時(shí)間: 2025-3-23 02:18
Graph-Based Hydraulic Vulnerability Assessment of Water Distribution Networksismic assessment standards, as per the American Lifelines Alliance (ALA) guidelines, localized historical records of critical risk-of-failure metrics, and hydraulic simulations using adapted EPANET models. The proposed reliability assessment incorporates data of past non-seismic damage, the vulnerab作者: 持久 時(shí)間: 2025-3-23 05:34
Sensor Data Validation and Reconstruction in Water Networks: A Methodology and Software Implementatipresented. On the one hand, a validation approach based on quality levels is described to detect potential invalid and missing data. On the other hand, the reconstruction strategy is based on a set of temporal and spatial models used to estimate missing/invalid data with the model estimation providi作者: Cuisine 時(shí)間: 2025-3-23 12:25
Critical Infrastructure Online Fault Detection: Application in Water Supply Systemsn with a SCADA system. Then we implement an online fault detection algorithm based on a fault diagnosis architecture for nonlinear uncertain discrete-time systems, that we apply and test with the testbed. We finally present some experimental results illustrating the effectiveness of this approach.作者: 酷熱 時(shí)間: 2025-3-23 16:42
An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms media and device mobility undermine this assumption. A successful attack on a drilling operation could be devastating in human, environmental, economic and reputational terms. Several threat sources can easily be identified. We therefore propose the use of Causal Bayesian Networks to analyse probab作者: 我還要背著他 時(shí)間: 2025-3-23 19:04 作者: 陳舊 時(shí)間: 2025-3-23 23:38
CFD Simulation of Contaminant Transportation in High-Risk Buildings Using CONTAMis the design and evaluation of two building case studies using CONTAM coupled with the CFD0 Editor: (i) a conceptual office building with a large conference room surrounded by four smaller offices and (ii) the Pefkios Georgiades amphitheater which is a real building housed at the Cyprus University 作者: 有偏見 時(shí)間: 2025-3-24 05:31
Detection and Management of Large Scale Disturbances in Power Systements leads not only to PS collapse but also essentially affects the operation of other critical infrastructures. To prevent such situations special types of automation such as PS splitting and frequency control automation are employed. Taking into account the drawbacks of existing devices the new me作者: Thyroxine 時(shí)間: 2025-3-24 07:53 作者: 低能兒 時(shí)間: 2025-3-24 13:56
Conference proceedings 2016 in Limassol,Cyprus, in October 2014. ..The 20 fulland 19 short papers presented in this volume were carefully reviewed andselected from 74 submissions. They are organized in topical sections named:cyber-physical systems and sensor networks; security of water systems; powerand energy system security作者: Digest 時(shí)間: 2025-3-24 15:18 作者: 暫時(shí)別動(dòng) 時(shí)間: 2025-3-24 22:37 作者: ABOUT 時(shí)間: 2025-3-25 02:57
W. Bein and rate of variation of the reference signals to each lower-layer controller we prove that closed-loop stability is preserved and the fulfillment of the prescribed constraints is guaranteed. We apply the proposed methodology to Johansson’s quadraple-tank system and we compare it to a centralised control approach.作者: 有其法作用 時(shí)間: 2025-3-25 04:23
P. Thomass can be used to inform company representatives and operators of likely risks and highlight requirements for the successful diagnosis and recovery of well control incidents stemming from cyber causes.作者: abduction 時(shí)間: 2025-3-25 11:25 作者: majestic 時(shí)間: 2025-3-25 14:40
P. Thomasom various locations inside the building and recommendations were provided as to the number and locations of sensors that would guarantee prompt detection to ensure the safety of the people. A comparison of CFD to multi-zone and a study regarding the total computational time of CFD with respect to the grid size were also performed.作者: 哭得清醒了 時(shí)間: 2025-3-25 17:36 作者: esthetician 時(shí)間: 2025-3-25 23:40 作者: antidote 時(shí)間: 2025-3-26 01:21 作者: 滑稽 時(shí)間: 2025-3-26 05:17
Decentralised Hierarchical Multi-rate Control of Large-Scale Drinking Water Networks and rate of variation of the reference signals to each lower-layer controller we prove that closed-loop stability is preserved and the fulfillment of the prescribed constraints is guaranteed. We apply the proposed methodology to Johansson’s quadraple-tank system and we compare it to a centralised control approach.作者: antidote 時(shí)間: 2025-3-26 10:18
An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platformss can be used to inform company representatives and operators of likely risks and highlight requirements for the successful diagnosis and recovery of well control incidents stemming from cyber causes.作者: 委屈 時(shí)間: 2025-3-26 15:41 作者: musicologist 時(shí)間: 2025-3-26 20:06 作者: 長(zhǎng)矛 時(shí)間: 2025-3-26 21:23
Impact of a Surface Nuclear Blast on the Transient Stability of the Power Systemloss of the neighboring substations. The transient stability analysis shows that for the simulated event, the system stabilizes approximately 7?s after the occurrence of the event. The stability of the system can be attributed to the fact that the drop in load was relatively small compared to the generation capacity of the EI.作者: squander 時(shí)間: 2025-3-27 03:53 作者: Emg827 時(shí)間: 2025-3-27 07:57 作者: Outwit 時(shí)間: 2025-3-27 09:34
A Comprehensive Approach for Security Assessment in Transportess and maturity in operators belonging to transport sub-sectors. The final goal is to provide a relevant informative base, taking into consideration sub-sector differences useful to enhance awareness in security in the transport sector.作者: maudtin 時(shí)間: 2025-3-27 15:34 作者: outskirts 時(shí)間: 2025-3-27 17:48
Sensor Data Validation and Reconstruction in Water Networks: A Methodology and Software Implementating the best fit. A software tool implementing the proposed data validation and reconstruction methodology is also presented. Finally, results obtained applying the proposed methodology on raw data of flow meters gathered from a real water network are also included to illustrate the performance of the proposed approach.作者: transdermal 時(shí)間: 2025-3-28 00:18
0302-9743 er systems; powerand energy system security; security and recovery policies, cyber security; andsecurity tools and protocols.?.978-3-319-31663-5978-3-319-31664-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Nutrient 時(shí)間: 2025-3-28 04:46 作者: Excise 時(shí)間: 2025-3-28 07:13 作者: 消極詞匯 時(shí)間: 2025-3-28 13:02 作者: 凌辱 時(shí)間: 2025-3-28 15:30
Conference proceedings 2016s. They are organized in topical sections named:cyber-physical systems and sensor networks; security of water systems; powerand energy system security; security and recovery policies, cyber security; andsecurity tools and protocols.?.作者: 脆弱帶來 時(shí)間: 2025-3-28 22:12
,Unterstützungseinrichtungen für ?rzte,d Isolation (FDI) system able to detect such faults. This paper proposes a FDI mechanism that extends the classical Boolean fault signature matrix concept taking into account several fault signal properties to isolate faults in CIS. To exemplify the proposed FDI scheme in CIS, the Barcelona drinking water network is used as a case study.作者: 有助于 時(shí)間: 2025-3-29 01:16 作者: 泛濫 時(shí)間: 2025-3-29 05:59
,Aquae aromaticae — aromatische W?sser,ess and maturity in operators belonging to transport sub-sectors. The final goal is to provide a relevant informative base, taking into consideration sub-sector differences useful to enhance awareness in security in the transport sector.作者: 偉大 時(shí)間: 2025-3-29 11:07
ilities of the network components against seismic loading, hydraulic modeling, and the topology of a WDN. The network reliability is assessed using Graph Theory and Monte Carlo simulation (MCS), coupled with a hydraulic analysis.作者: endure 時(shí)間: 2025-3-29 12:12 作者: GRACE 時(shí)間: 2025-3-29 17:40
0302-9743 Infrastructures Security, CRITIS 2014, held in Limassol,Cyprus, in October 2014. ..The 20 fulland 19 short papers presented in this volume were carefully reviewed andselected from 74 submissions. They are organized in topical sections named:cyber-physical systems and sensor networks; security of wat作者: 報(bào)復(fù) 時(shí)間: 2025-3-29 22:59
pes of automation such as PS splitting and frequency control automation are employed. Taking into account the drawbacks of existing devices the new methods and technical solutions to increase sustainability to such events are discussed.作者: 變化 時(shí)間: 2025-3-30 00:00 作者: exceed 時(shí)間: 2025-3-30 04:02 作者: 花爭(zhēng)吵 時(shí)間: 2025-3-30 10:13
,Unterstützungseinrichtungen für ?rzte, that high performance can be achieved and maintained under adverse conditions. The global CIS Real-Time Control (RTC) need of operating in adverse conditions involves, with a high probability, sensor and actuator malfunctions (faults). This problem calls for the use of an on-line Fault Detection an作者: 折磨 時(shí)間: 2025-3-30 14:09
,Aquae aromaticae — aromatische W?sser,city infrastructure projects. Given the complexity of the systems architecture, and interactions between physical and cyber domains, this paper shows how a multi-disciplinary approach can be adopted to address the challenges. It introduces an analysis methodology for use by multi-disciplinary teams 作者: Malcontent 時(shí)間: 2025-3-30 17:59 作者: ethnology 時(shí)間: 2025-3-31 00:30
,Aquae aromaticae — aromatische W?sser, illegal activity over wide areas. In order to reach that potential, it is essential for the sensor network to operate efficiently by conducting processing and communication operations on a very limited power budget. In this work, it is shown that when sequentially assessing physical threats using a作者: inspired 時(shí)間: 2025-3-31 01:54
,Aquae aromaticae — aromatische W?sser,irective 2008/114/EC outlines the approach Member States are required to follow to identify, designate, and protect European Critical Infrastructures also in the transport sector. The paper illustrates a benchmarking methodology which could be used to assess security in terms of awareness, preparedn作者: 防御 時(shí)間: 2025-3-31 06:21 作者: seruting 時(shí)間: 2025-3-31 10:13
,Aquae aromaticae — aromatische W?sser,infection by-product in drinking water distribution networks under various conditions and uncertainties. The goal is to identify the risk-level at each node location, contributing in the enhancement of consumer safety. The use of the . software is demonstrated using a real water distribution network作者: harpsichord 時(shí)間: 2025-3-31 16:31
W. Block). For the predictive control strategy, system states in a finite horizon are generated by a DWN model and demands are regarded as system disturbances. The goal is to provide a demand estimation within a given confidence interval. For the sake of obtaining a desired forecasting performance, the fore作者: 不持續(xù)就爆 時(shí)間: 2025-3-31 18:08 作者: canvass 時(shí)間: 2025-4-1 01:01
W. Blockpresented. On the one hand, a validation approach based on quality levels is described to detect potential invalid and missing data. On the other hand, the reconstruction strategy is based on a set of temporal and spatial models used to estimate missing/invalid data with the model estimation providi