2020
DOI: 10.1016/j.ifacol.2020.12.2295
|View full text |Cite
|
Sign up to set email alerts
|

Discrete Control of Response for Cybersecurity in Industrial Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…To simplify equation ( 14), we assume that the dependence π (C) has an exponential character: π (C) = exp (−ξ C), where the coefficient ξ > 0 characterizes the effect of investing in cybersecurity of RIS several resources equal to C. Let us refine expression (14), taking into account the just presented interpretation of the function π (C):…”
Section: B Mathematical Model Of the Studied Processmentioning
confidence: 99%
See 1 more Smart Citation
“…To simplify equation ( 14), we assume that the dependence π (C) has an exponential character: π (C) = exp (−ξ C), where the coefficient ξ > 0 characterizes the effect of investing in cybersecurity of RIS several resources equal to C. Let us refine expression (14), taking into account the just presented interpretation of the function π (C):…”
Section: B Mathematical Model Of the Studied Processmentioning
confidence: 99%
“…When formalizing such models, only the failure is taken into account without analyzing the causes of its occurrence and possible consequences. Models [14]- [17] focused on the description of the second performance indicator. It is assumed that a specific distribution law (most often Poisson's) with a continuous or discrete intensity function describes the stochastic parameter, which characterizes the number of time failures.…”
Section: Introductionmentioning
confidence: 99%
“…By taking a series of measures to restore the system to the average business state, the system is installed and reinforced in strict accordance with the initialization security policy of the system Technology is not omnipoten, therefore the best countermeasures are determined on a basis of the analysis of the attack types. In particular, depending on the nature of the attack, on the current state of the system, and the available protection actions, a decision problem needs to be solved in the feedback loop [48]. This model draws upon the literature in information security, incident response, theory of planned behavior, and security awareness to expand and improve overall industrial organization cyber security performance.…”
mentioning
confidence: 99%