Skip to main content

2019 | OriginalPaper | Buchkapitel

Integrated Cyber Physical Assessment and Response for Improved Resiliency

verfasst von : P. Sivils, C. Rieger, K. Amarasinghe, M. Manic

Erschienen in: The Internet of Things for Smart Urban Ecosystems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyber-physical systems (CPS) are control systems that facilitate the integration of physical systems and computer-based algorithms. These systems are commonly used in control system and critical infrastructure for control and monitoring applications. The internet-of-things (IoT) is a subset of CPS in which multiple physical embedded devices and sensors are connected via a distributed network to communicate and transfer data while being driven by computational algorithms for data delivery and decision-making tasks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat F. Alam, R. Mehmood, I. Katib, N.N. Albogami, A. Albeshri, Data-fusion and IoT for smart ubiquitous environments: a survey. IEEE Access 5, 9533–9554 (2017)CrossRef F. Alam, R. Mehmood, I. Katib, N.N. Albogami, A. Albeshri, Data-fusion and IoT for smart ubiquitous environments: a survey. IEEE Access 5, 9533–9554 (2017)CrossRef
2.
Zurück zum Zitat T. Vollmer, M. Manic, Cyber-physical system security with deceptive virtual hosts for industrial control networks. IEEE Trans. Ind. Inform. 10(2), 1337–1347 (2014)CrossRef T. Vollmer, M. Manic, Cyber-physical system security with deceptive virtual hosts for industrial control networks. IEEE Trans. Ind. Inform. 10(2), 1337–1347 (2014)CrossRef
3.
Zurück zum Zitat O. Linda, D. Wijayasekara, M. Manic, C. Rieger, Computational intelligence-based anomaly detection for building energy management systems, in 2012 5th International Symposium on Resilient Control Systems (2012), pp. 77–82 O. Linda, D. Wijayasekara, M. Manic, C. Rieger, Computational intelligence-based anomaly detection for building energy management systems, in 2012 5th International Symposium on Resilient Control Systems (2012), pp. 77–82
4.
Zurück zum Zitat D. Wijayasekara, M. Manic, C. Rieger, Fuzzy linguistic knowledge-based behavior extraction for building energy management systems, in 2013 6th International Symposium on Resilient Control Systems (ISRCS) (2013), pp. 80–85 D. Wijayasekara, M. Manic, C. Rieger, Fuzzy linguistic knowledge-based behavior extraction for building energy management systems, in 2013 6th International Symposium on Resilient Control Systems (ISRCS) (2013), pp. 80–85
5.
Zurück zum Zitat T. Vollmer, M. Manic, O. Linda, Autonomic intelligent cyber-sensor to support industrial control network awareness. IEEE Trans. Ind. Inform. 10(2), 1647–1658 (2014)CrossRef T. Vollmer, M. Manic, O. Linda, Autonomic intelligent cyber-sensor to support industrial control network awareness. IEEE Trans. Ind. Inform. 10(2), 1647–1658 (2014)CrossRef
6.
Zurück zum Zitat D.E. Denning, An intrusion-detection model. IEEE Trans. Softw. Eng. 13(2), 222–232 (1987)CrossRef D.E. Denning, An intrusion-detection model. IEEE Trans. Softw. Eng. 13(2), 222–232 (1987)CrossRef
7.
Zurück zum Zitat R. Sommer, V. Paxson, Outside the closed world: on using machine learning for network intrusion detection, in 2010 IEEE Symposium on Security and Privacy (2010), pp. 305–316 R. Sommer, V. Paxson, Outside the closed world: on using machine learning for network intrusion detection, in 2010 IEEE Symposium on Security and Privacy (2010), pp. 305–316
8.
Zurück zum Zitat N. Ádám, B. Madoš, A. Baláž, T. Pavlik, Artificial neural network-based IDS, in 2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI) (2017), pp. 000159–000164 N. Ádám, B. Madoš, A. Baláž, T. Pavlik, Artificial neural network-based IDS, in 2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI) (2017), pp. 000159–000164
9.
Zurück zum Zitat N. Sen, R. Sen, M. Chattopadhyay, An effective back propagation neural network architecture for the development of an efficient anomaly-based intrusion detection system, in 2014 International Conference on Computational Intelligence and Communication Networks (2014), pp. 1052–1056 N. Sen, R. Sen, M. Chattopadhyay, An effective back propagation neural network architecture for the development of an efficient anomaly-based intrusion detection system, in 2014 International Conference on Computational Intelligence and Communication Networks (2014), pp. 1052–1056
10.
Zurück zum Zitat J. Esmaily, R. Moradinezhad, J. Ghasemi, Intrusion detection system based on multi-layer perceptron neural networks and decision tree, in 2015 7th Conference on Information and Knowledge Technology (IKT) (2015), pp. 1–5 J. Esmaily, R. Moradinezhad, J. Ghasemi, Intrusion detection system based on multi-layer perceptron neural networks and decision tree, in 2015 7th Conference on Information and Knowledge Technology (IKT) (2015), pp. 1–5
11.
Zurück zum Zitat Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, M. Sheikhan, Flow-based anomaly detection using neural network optimized with GSA algorithm, in 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (2013), pp. 76–81 Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, M. Sheikhan, Flow-based anomaly detection using neural network optimized with GSA algorithm, in 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (2013), pp. 76–81
12.
Zurück zum Zitat N. Mowla, I. Doh, K. Chae, Evolving neural network intrusion detection system for MCPS, in 2017 19th International Conference on Advanced Communication Technology (ICACT) (2017), pp. 183–187 N. Mowla, I. Doh, K. Chae, Evolving neural network intrusion detection system for MCPS, in 2017 19th International Conference on Advanced Communication Technology (ICACT) (2017), pp. 183–187
13.
Zurück zum Zitat C. Callegari, S. Giordano, M. Pagano, Neural network-based anomaly detection, in 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) (2014), pp. 310–314 C. Callegari, S. Giordano, M. Pagano, Neural network-based anomaly detection, in 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) (2014), pp. 310–314
14.
Zurück zum Zitat A.M. Kosek, Contextual anomaly detection for cyber-physical security in smart grids based on an artificial neural network model, in 2016 Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG) (2016), pp. 1–6 A.M. Kosek, Contextual anomaly detection for cyber-physical security in smart grids based on an artificial neural network model, in 2016 Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG) (2016), pp. 1–6
15.
Zurück zum Zitat M. Ghanbari, W. Kinsner, K. Ferens, Anomaly detection in a smart grid using wavelet transform, variance fractal dimension and an artificial neural network, in 2016 IEEE Electrical Power and Energy Conference (EPEC) (2016), pp. 1–6 M. Ghanbari, W. Kinsner, K. Ferens, Anomaly detection in a smart grid using wavelet transform, variance fractal dimension and an artificial neural network, in 2016 IEEE Electrical Power and Energy Conference (EPEC) (2016), pp. 1–6
16.
Zurück zum Zitat V. Ford, A. Siraj, W. Eberle, Smart-grid energy fraud detection using artificial neural networks, in 2014 IEEE Symposium on Computational Intelligence Applications in Smart Grid (CIASG) (2014), pp. 1–6 V. Ford, A. Siraj, W. Eberle, Smart-grid energy fraud detection using artificial neural networks, in 2014 IEEE Symposium on Computational Intelligence Applications in Smart Grid (CIASG) (2014), pp. 1–6
17.
Zurück zum Zitat S. Ntalampiras, Detection of integrity attacks in cyber-physical critical infrastructures using ensemble modeling. IEEE Trans. Ind. Inform. 11(1), 104–111 (2015)CrossRef S. Ntalampiras, Detection of integrity attacks in cyber-physical critical infrastructures using ensemble modeling. IEEE Trans. Ind. Inform. 11(1), 104–111 (2015)CrossRef
18.
Zurück zum Zitat D. Wijayasekara, O. Linda, M. Manic, C. Rieger, FN-DFE: fuzzy-neural data-fusion engine for enhanced resilient state-awareness of hybrid energy systems. IEEE Trans. Cybern. 44(11), 2065–2075 (2014)CrossRef D. Wijayasekara, O. Linda, M. Manic, C. Rieger, FN-DFE: fuzzy-neural data-fusion engine for enhanced resilient state-awareness of hybrid energy systems. IEEE Trans. Cybern. 44(11), 2065–2075 (2014)CrossRef
19.
Zurück zum Zitat E. Hatami, N. Vosoughi, H. Salarieh, Design of a fault tolerated intelligent control system for load following operation in a nuclear power plant. Int. J. Electr. Power Energy Syst. 78, 864–872 (2016)CrossRef E. Hatami, N. Vosoughi, H. Salarieh, Design of a fault tolerated intelligent control system for load following operation in a nuclear power plant. Int. J. Electr. Power Energy Syst. 78, 864–872 (2016)CrossRef
20.
Zurück zum Zitat J. Goh, S. Adepu, M. Tan, Z.S. Lee, Anomaly detection in cyber-physical systems using recurrent neural networks, in 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE) (2017), pp. 140–145 J. Goh, S. Adepu, M. Tan, Z.S. Lee, Anomaly detection in cyber-physical systems using recurrent neural networks, in 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE) (2017), pp. 140–145
21.
Zurück zum Zitat C.G. Cordero, S. Hauke, M. Mühlhäuser, M. Fischer, Analyzing flow-based anomaly intrusion detection using replicator neural networks, in 2016 14th Annual Conference on Privacy, Security and Trust (PST) (2016), pp. 317–324 C.G. Cordero, S. Hauke, M. Mühlhäuser, M. Fischer, Analyzing flow-based anomaly intrusion detection using replicator neural networks, in 2016 14th Annual Conference on Privacy, Security and Trust (PST) (2016), pp. 317–324
22.
Zurück zum Zitat T. Ince, S. Kiranyaz, L. Eren, M. Askar, M. Gabbouj, Real-time motor fault detection by 1-D convolutional neural networks. IEEE Trans. Ind. Electron. 63(11), 7067–7075 (2016)CrossRef T. Ince, S. Kiranyaz, L. Eren, M. Askar, M. Gabbouj, Real-time motor fault detection by 1-D convolutional neural networks. IEEE Trans. Ind. Electron. 63(11), 7067–7075 (2016)CrossRef
23.
Zurück zum Zitat Y. Zhou, R. Arghandeh, I. Konstantakopoulos, S. Abdullah, A. von Meier, C.J. Spanos, Abnormal event detection with high resolution micro-PMU data, in 2016 Power Systems Computation Conference (PSCC) (2016), pp. 1–7 Y. Zhou, R. Arghandeh, I. Konstantakopoulos, S. Abdullah, A. von Meier, C.J. Spanos, Abnormal event detection with high resolution micro-PMU data, in 2016 Power Systems Computation Conference (PSCC) (2016), pp. 1–7
24.
Zurück zum Zitat S. Brahma, R. Kavasseri, H. Cao, N.R. Chaudhuri, T. Alexopoulos, Y. Cui, Real-time identification of dynamic events in power systems using PMU data, and potential applications #8212: models, promises, and challenges. IEEE Trans. Power Deliv. 32(1), 294–301 (2017)CrossRef S. Brahma, R. Kavasseri, H. Cao, N.R. Chaudhuri, T. Alexopoulos, Y. Cui, Real-time identification of dynamic events in power systems using PMU data, and potential applications #8212: models, promises, and challenges. IEEE Trans. Power Deliv. 32(1), 294–301 (2017)CrossRef
25.
Zurück zum Zitat S.Y. Huang, Y.N. Huang, Network traffic anomaly detection based on growing hierarchical SOM, in 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2013), pp. 1–2 S.Y. Huang, Y.N. Huang, Network traffic anomaly detection based on growing hierarchical SOM, in 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2013), pp. 1–2
26.
Zurück zum Zitat M. Du, S. Ma, Q. He, A SCADA data-based anomaly detection method for wind turbines, in 2016 China International Conference on Electricity Distribution (CICED) (2016), pp. 1–6 M. Du, S. Ma, Q. He, A SCADA data-based anomaly detection method for wind turbines, in 2016 China International Conference on Electricity Distribution (CICED) (2016), pp. 1–6
27.
Zurück zum Zitat M. Biswal, Y. Hao, P. Chen, S. Brahma, H. Cao, P.D. Leon, Signal features for classification of power system disturbances using PMU data, in 2016 Power Systems Computation Conference (PSCC) (2016), pp. 1–7 M. Biswal, Y. Hao, P. Chen, S. Brahma, H. Cao, P.D. Leon, Signal features for classification of power system disturbances using PMU data, in 2016 Power Systems Computation Conference (PSCC) (2016), pp. 1–7
28.
Zurück zum Zitat K. Wen, J. Yang, F. Cheng, C. Li, Z. Wang, H. Yin, Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly, in 2014 23rd International Conference on Computer Communication and Networks (ICCCN) (2014), pp. 1–6 K. Wen, J. Yang, F. Cheng, C. Li, Z. Wang, H. Yin, Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly, in 2014 23rd International Conference on Computer Communication and Networks (ICCCN) (2014), pp. 1–6
29.
Zurück zum Zitat M. Gu, The algorithm of information system anomaly detection, in 2013 3rd International Conference on Consumer Electronics, Communications and Networks (2013), pp. 653–657 M. Gu, The algorithm of information system anomaly detection, in 2013 3rd International Conference on Consumer Electronics, Communications and Networks (2013), pp. 653–657
30.
Zurück zum Zitat R.G. Kavasseri, Y. Cui, S.M. Brahma, A new approach for event detection based on energy functions, in 2014 IEEE PES General Meeting | Conference Exposition (2014), pp. 1–5 R.G. Kavasseri, Y. Cui, S.M. Brahma, A new approach for event detection based on energy functions, in 2014 IEEE PES General Meeting | Conference Exposition (2014), pp. 1–5
31.
Zurück zum Zitat M. Balchanos, D. Mavris, D.W. Brown, G. Georgoulas, G. Vachtsevanos, Incipient failure detection: a particle filtering approach with application to actuator systems, in 2017 13th IEEE International Conference on Control Automation (ICCA) (2017), pp. 64–69 M. Balchanos, D. Mavris, D.W. Brown, G. Georgoulas, G. Vachtsevanos, Incipient failure detection: a particle filtering approach with application to actuator systems, in 2017 13th IEEE International Conference on Control Automation (ICCA) (2017), pp. 64–69
32.
Zurück zum Zitat P. Angelov, Anomaly detection based on eccentricity analysis, in 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS) (2014), pp. 1–8 P. Angelov, Anomaly detection based on eccentricity analysis, in 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS) (2014), pp. 1–8
33.
Zurück zum Zitat S. Zhu, Y.C. Soh, L. Xie, Distributed inference for relay-assisted sensor networks with intermittent measurements over fading channels. IEEE Trans. Signal Process. 64(3), 742–756 (2016)MathSciNetCrossRef S. Zhu, Y.C. Soh, L. Xie, Distributed inference for relay-assisted sensor networks with intermittent measurements over fading channels. IEEE Trans. Signal Process. 64(3), 742–756 (2016)MathSciNetCrossRef
34.
Zurück zum Zitat H.E. Garcia, S.M. Meerkov, M.T. Ravichandran, Resilient plant monitoring systems: techniques, analysis, design, and performance evaluation. J. Process Control 32, 51–63 (2015)CrossRef H.E. Garcia, S.M. Meerkov, M.T. Ravichandran, Resilient plant monitoring systems: techniques, analysis, design, and performance evaluation. J. Process Control 32, 51–63 (2015)CrossRef
35.
Zurück zum Zitat X. Cao, P. Cheng, J. Chen, Y. Sun, An online optimization approach for control and communication co-design in networked cyber-physical systems. IEEE Trans. Ind. Inform. 9(1), 439–450 (2013)CrossRef X. Cao, P. Cheng, J. Chen, Y. Sun, An online optimization approach for control and communication co-design in networked cyber-physical systems. IEEE Trans. Ind. Inform. 9(1), 439–450 (2013)CrossRef
36.
Zurück zum Zitat I. Friedberg, K. McLaughlin, P. Smith, D. Laverty, and S. Sezer, “STPA-SafeSec: Safety and security analysis for cyber-physical systems,” J. Inf. Secur. Appl I. Friedberg, K. McLaughlin, P. Smith, D. Laverty, and S. Sezer, “STPA-SafeSec: Safety and security analysis for cyber-physical systems,” J. Inf. Secur. Appl
37.
Zurück zum Zitat Y. Shoukry, P. Nuzzo, A. Puggelli, A.L. Sangiovanni-Vincentelli, S.A. Seshia, P. Tabuada, Secure state estimation for cyber-physical systems under sensor attacks: a satisfiability modulo theory approach. IEEE Trans. Autom. Control PP(99), 1–1 (2017) Y. Shoukry, P. Nuzzo, A. Puggelli, A.L. Sangiovanni-Vincentelli, S.A. Seshia, P. Tabuada, Secure state estimation for cyber-physical systems under sensor attacks: a satisfiability modulo theory approach. IEEE Trans. Autom. Control PP(99), 1–1 (2017)
38.
Zurück zum Zitat H. Fawzi, P. Tabuada, S. Diggavi, Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control 59(6), 1454–1467 (2014)MathSciNetCrossRef H. Fawzi, P. Tabuada, S. Diggavi, Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control 59(6), 1454–1467 (2014)MathSciNetCrossRef
39.
Zurück zum Zitat K. Amarasinghe, D. Wijayasekara, M. Manic, Neural network-based downscaling of building energy management system data, in 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE) (2014), pp. 2670–2675 K. Amarasinghe, D. Wijayasekara, M. Manic, Neural network-based downscaling of building energy management system data, in 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE) (2014), pp. 2670–2675
40.
Zurück zum Zitat D. Wijayasekara, M. Manic, Data-fusion for increasing temporal resolution of building energy management system data, in IECON 2015—41st Annual Conference of the IEEE Industrial Electronics Society (2015), pp. 004550–004555 D. Wijayasekara, M. Manic, Data-fusion for increasing temporal resolution of building energy management system data, in IECON 2015—41st Annual Conference of the IEEE Industrial Electronics Society (2015), pp. 004550–004555
41.
Zurück zum Zitat M.J. Ren, L.J. Sun, M.Y. Liu, C.F. Cheung, Y.H. Yin, A reconstruction-registration integrated data-fusion method for measurement of multi-scaled complex surfaces. IEEE Trans. Instrum. Meas. 66(3), 414–423 (2017)CrossRef M.J. Ren, L.J. Sun, M.Y. Liu, C.F. Cheung, Y.H. Yin, A reconstruction-registration integrated data-fusion method for measurement of multi-scaled complex surfaces. IEEE Trans. Instrum. Meas. 66(3), 414–423 (2017)CrossRef
42.
Zurück zum Zitat T.R. Bennett, N. Gans, R. Jafari, A data-driven synchronization technique for cyber-physical systems, in Proceedings of the Second International Workshop on the Swarm at the Edge of the Cloud, New York, NY, USA (2015), pp. 49–54 T.R. Bennett, N. Gans, R. Jafari, A data-driven synchronization technique for cyber-physical systems, in Proceedings of the Second International Workshop on the Swarm at the Edge of the Cloud, New York, NY, USA (2015), pp. 49–54
43.
Zurück zum Zitat J. Rehder, R. Siegwart, P. Furgale, A general approach to spatiotemporal calibration in multi-sensor systems. IEEE Trans. Robot. 32(2), 383–398 (2016)CrossRef J. Rehder, R. Siegwart, P. Furgale, A general approach to spatiotemporal calibration in multi-sensor systems. IEEE Trans. Robot. 32(2), 383–398 (2016)CrossRef
44.
Zurück zum Zitat L. Sorber, M.V. Barel, L.D. Lathauwer, Structured data-fusion. IEEE J. Sel. Top. Signal Process. 9(4), 586–600 (2015)CrossRef L. Sorber, M.V. Barel, L.D. Lathauwer, Structured data-fusion. IEEE J. Sel. Top. Signal Process. 9(4), 586–600 (2015)CrossRef
45.
Zurück zum Zitat Y. Li et al., Conflicts to Harmony: a framework for resolving conflicts in heterogeneous data by truth discovery. IEEE Trans. Knowl. Data Eng. 28(8), 1986–1999 (2016)CrossRef Y. Li et al., Conflicts to Harmony: a framework for resolving conflicts in heterogeneous data by truth discovery. IEEE Trans. Knowl. Data Eng. 28(8), 1986–1999 (2016)CrossRef
46.
Zurück zum Zitat B. Andò, S. Baglio, C.O. Lombardo, V. Marletta, A multi-sensor data-fusion approach for ADL and fall classification. IEEE Trans. Instrum. Meas. 65(9), 1960–1967 (2016)CrossRef B. Andò, S. Baglio, C.O. Lombardo, V. Marletta, A multi-sensor data-fusion approach for ADL and fall classification. IEEE Trans. Instrum. Meas. 65(9), 1960–1967 (2016)CrossRef
47.
Zurück zum Zitat Z. Shan, Y. Xia, P. Hou, J. He, Fusing incomplete multi-sensor heterogeneous data to estimate urban traffic. IEEE Multimed. 23(3), 56–63 (2016)CrossRef Z. Shan, Y. Xia, P. Hou, J. He, Fusing incomplete multi-sensor heterogeneous data to estimate urban traffic. IEEE Multimed. 23(3), 56–63 (2016)CrossRef
48.
Zurück zum Zitat J. Hu, A.V. Vasilakos, Energy big data analytics and security: challenges and opportunities. IEEE Trans. Smart Grid 7(5), 2423–2436 (2016)CrossRef J. Hu, A.V. Vasilakos, Energy big data analytics and security: challenges and opportunities. IEEE Trans. Smart Grid 7(5), 2423–2436 (2016)CrossRef
49.
Zurück zum Zitat J. Wang, J. Xie, R. Zhao, K. Mao, L. Zhang, A new probabilistic kernel factor analysis for multisensory data-fusion: application to tool condition monitoring. IEEE Trans. Instrum. Meas. 65(11), 2527–2537 (2016)CrossRef J. Wang, J. Xie, R. Zhao, K. Mao, L. Zhang, A new probabilistic kernel factor analysis for multisensory data-fusion: application to tool condition monitoring. IEEE Trans. Instrum. Meas. 65(11), 2527–2537 (2016)CrossRef
50.
Zurück zum Zitat A. Gautam, Y.C. Soh, Stabilizing model predictive control using parameter-dependent dynamic policy for nonlinear systems modeled with neural networks. J. Process Control 36, 11–21 (2015)CrossRef A. Gautam, Y.C. Soh, Stabilizing model predictive control using parameter-dependent dynamic policy for nonlinear systems modeled with neural networks. J. Process Control 36, 11–21 (2015)CrossRef
51.
Zurück zum Zitat G. Bernieri, S. Damiani, F.D. Moro, L. Faramondi, F. Pascucci, F. Tambone, A multiple-criteria decision-making method as support for critical infrastructure protection and intrusion detection system, in IECON 2016—42nd Annual Conference of the IEEE Industrial Electronics Society (2016), pp. 4871–4876 G. Bernieri, S. Damiani, F.D. Moro, L. Faramondi, F. Pascucci, F. Tambone, A multiple-criteria decision-making method as support for critical infrastructure protection and intrusion detection system, in IECON 2016—42nd Annual Conference of the IEEE Industrial Electronics Society (2016), pp. 4871–4876
52.
Zurück zum Zitat Y. Zhang, M. Qiu, C.W. Tsai, M.M. Hassan, A. Alamri, Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11(1), 88–95 (2017)CrossRef Y. Zhang, M. Qiu, C.W. Tsai, M.M. Hassan, A. Alamri, Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11(1), 88–95 (2017)CrossRef
53.
Zurück zum Zitat E. Pariser, The filter Bubble: What the Internet is Hiding from you (Penguin, UK, 2011) E. Pariser, The filter Bubble: What the Internet is Hiding from you (Penguin, UK, 2011)
54.
Zurück zum Zitat G.A. Fink, C.L. North, A. Endert, S. Rose, Visualizing cybersecurity: usable workspaces, in 2009 6th International Workshop on Visualization for Cyber Security (2009), pp. 45–56 G.A. Fink, C.L. North, A. Endert, S. Rose, Visualizing cybersecurity: usable workspaces, in 2009 6th International Workshop on Visualization for Cyber Security (2009), pp. 45–56
55.
Zurück zum Zitat J.L. Lamothe, J. She, M. Cheung, Cyber-physical directory: a dynamic visualization of social media data, in 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing (2013), pp. 2007–2012 J.L. Lamothe, J. She, M. Cheung, Cyber-physical directory: a dynamic visualization of social media data, in 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing (2013), pp. 2007–2012
56.
Zurück zum Zitat M. Cheung, J. She, S. Park, Analytics-driven visualization on digital directory via screen-smart device interactions. IEEE Trans. Multimed. 18(11), 2303–2314 (2016)CrossRef M. Cheung, J. She, S. Park, Analytics-driven visualization on digital directory via screen-smart device interactions. IEEE Trans. Multimed. 18(11), 2303–2314 (2016)CrossRef
57.
Zurück zum Zitat D. Gürdür, J. El-Khoury, T. Seceleanu, L. Lednicki, Making interoperability visible: Data visualization of cyber-physical systems development tool chains. J. Ind. Inf. Integr. 4, 26–34 (2016) D. Gürdür, J. El-Khoury, T. Seceleanu, L. Lednicki, Making interoperability visible: Data visualization of cyber-physical systems development tool chains. J. Ind. Inf. Integr. 4, 26–34 (2016)
58.
Zurück zum Zitat S. Mittelstaedt, D. Spretke, D. Sacha, D.A. Keim, B. Heyder, J. Kopp, Visual analytics for critical infrastructures, in International ETG-Congress 2013; Symposium 1: Security in Critical Infrastructures Today (2013), pp. 1–8 S. Mittelstaedt, D. Spretke, D. Sacha, D.A. Keim, B. Heyder, J. Kopp, Visual analytics for critical infrastructures, in International ETG-Congress 2013; Symposium 1: Security in Critical Infrastructures Today (2013), pp. 1–8
59.
Zurück zum Zitat D. Jäckle, F. Fischer, T. Schreck, D.A. Keim, Temporal MDS plots for analysis of multivariate data. IEEE Trans. Vis. Comput. Graph. 22(1), 141–150 (2016)CrossRef D. Jäckle, F. Fischer, T. Schreck, D.A. Keim, Temporal MDS plots for analysis of multivariate data. IEEE Trans. Vis. Comput. Graph. 22(1), 141–150 (2016)CrossRef
60.
Zurück zum Zitat D. Wijayasekara, O. Linda, M. Manic, CAVE-SOM: immersive visual data mining using 3D self-organizing maps, in The 2011 International Joint Conference on Neural Networks (2011), pp. 2471–2478 D. Wijayasekara, O. Linda, M. Manic, CAVE-SOM: immersive visual data mining using 3D self-organizing maps, in The 2011 International Joint Conference on Neural Networks (2011), pp. 2471–2478
61.
Zurück zum Zitat H. Miyachi, K. Koyamada, D. Matsuoka, I. Kuroki, Fusion visualization system as an open science foundation, in 2016 19th International Conference on Network-Based Information Systems (NBiS) (2016), pp. 401–404 H. Miyachi, K. Koyamada, D. Matsuoka, I. Kuroki, Fusion visualization system as an open science foundation, in 2016 19th International Conference on Network-Based Information Systems (NBiS) (2016), pp. 401–404
Metadaten
Titel
Integrated Cyber Physical Assessment and Response for Improved Resiliency
verfasst von
P. Sivils
C. Rieger
K. Amarasinghe
M. Manic
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-96550-5_3

Neuer Inhalt