2015
DOI: 10.1016/j.ifacol.2015.06.269
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Safety Control Hierarchical Architecture for Prevention and Mitigation of Critical Faults in Process Industries based on Defense-in-depth, Reactive Systems and Safety-diagnosability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…This safety control hierarchical architecture is based on safety instrumented systems and the standards IEC61511 and IEC 61508, and it consists of four modules [79], as shown in Figure 11.…”
Section: Safety Control Hierarchical Architecturementioning
confidence: 99%
See 2 more Smart Citations
“…This safety control hierarchical architecture is based on safety instrumented systems and the standards IEC61511 and IEC 61508, and it consists of four modules [79], as shown in Figure 11.…”
Section: Safety Control Hierarchical Architecturementioning
confidence: 99%
“…The BPCS, namely the basic process control system, has a basic function, which is to impose the desired dynamic behavior on the process. It is composed of hardware factors, including a programmable logical controller, actuators, and sensors [79].…”
Section: Safety Control Hierarchical Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…The data application layer can build an intelligent functional application platform for business requirements, and provide solutions for different users after analyzing and processing data, such as using cloud computing, artificial intelligence, large data analysis and other technologies. There are different security problems in the hierarchical structure of IoT network, which we group into five aspects, according to the basic principles of deep security defense: application security, data security, control security, network security and device security [ 32 ].…”
Section: The Topology Design Strategy Of Iiot Network and Evaluatimentioning
confidence: 99%