메뉴 건너뛰기




Volumn 367, Issue , 2011, Pages 47-56

A plant-wide industrial process control security problem

Author keywords

Industrial control systems; Subversion detection

Indexed keywords

ANOMALY DETECTION; INTRUSION DETECTION; PUBLIC WORKS; STATE ESTIMATION;

EID: 84958755281     PISSN: 18684238     EISSN: 1868422X     Source Type: Book Series    
DOI: 10.1007/978-3-642-24864-1_4     Document Type: Conference Paper
Times cited : (18)

References (18)
  • 4
    • 35148864072 scopus 로고    scopus 로고
    • Performance analysis of probabilistic packet marking in IPv6
    • X. Dang, E. Albright and A. Abonamah, Performance analysis of probabilistic packet marking in IPv6, Computer Communications, vol. 30(16), pp. 3193–3202, 2007.
    • (2007) Computer Communications , vol.30 , Issue.16 , pp. 3193-3202
    • Dang, X.1    Albright, E.2    Abonamah, A.3
  • 5
    • 0027561446 scopus 로고
    • A plant-wide industrial process control problem
    • J. Downs and E. Vogel, A plant-wide industrial process control problem, Computers and Chemical Engineering, vol. 17(3), pp. 245–255, 1993.
    • (1993) Computers and Chemical Engineering , vol.17 , Issue.3 , pp. 245-255
    • Downs, J.1    Vogel, E.2
  • 8
    • 0034351040 scopus 로고    scopus 로고
    • Plant-wide control – A review and a new design procedure
    • T. Larsson and S. Skogestad, Plant-wide control – A review and a new design procedure, Modeling, Identification and Control, vol. 21(4), pp. 209–240, 2000.
    • (2000) Modeling, Identification and Control , vol.21 , Issue.4 , pp. 209-240
    • Larsson, T.1    Skogestad, S.2
  • 11
    • 0028431355 scopus 로고
    • Base control for the Tennessee Eastman problem
    • T. McAvoy and N. Ye, Base control for the Tennessee Eastman problem, Computers and Chemical Engineering, vol. 18(5), pp. 383–413, 1994.
    • (1994) Computers and Chemical Engineering , vol.18 , Issue.5 , pp. 383-413
    • McAvoy, T.1    Ye, N.2
  • 12
    • 0030217795 scopus 로고    scopus 로고
    • Decentralized control of the Tennessee Eastman challenge process
    • N. Ricker, Decentralized control of the Tennessee Eastman challenge process, Journal of Process Control, vol. 6(4), pp. 205–221, 1996.
    • (1996) Journal of Process Control , vol.6 , Issue.4 , pp. 205-221
    • Ricker, N.1
  • 15
    • 47149112288 scopus 로고    scopus 로고
    • Context information-based cyber security defense of protection system
    • S. Su, X. Duan, X. Zeng, W. Chan and K. Li, Context information-based cyber security defense of protection system, IEEE Transactions on Power Delivery, vol. 22(3), pp. 1477–1481, 2007.
    • (2007) IEEE Transactions on Power Delivery , vol.22 , Issue.3 , pp. 1477-1481
    • Su, S.1    Duan, X.2    Zeng, X.3    Chan, W.4    Li, K.5
  • 16
    • 84856339254 scopus 로고    scopus 로고
    • Critical Infrastructure Protection III, C. Palmer and S. Shenoi (Eds.), Springer, Heidelberg, Germany
    • N. Svendsen and S. Wolthusen, Using physical models for anomaly detection in control systems, in Critical Infrastructure Protection III, C. Palmer and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 139–149, 2009.
    • (2009) Using Physical Models for Anomaly Detection in Control Systems , pp. 139-149
    • Svendsen, N.1    Wolthusen, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.