2014
DOI: 10.1109/tsmc.2013.2277691
|View full text |Cite
|
Sign up to set email alerts
|

Probability-Based Location Aware Design and On-Demand Robotic Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…While connected with open IP networks, SCADA systems are facing a number of challenges in the absence of a security mechanism that provides protection against cyber-attacks. Several security solutions have been employed to enhance the level of SCADA security but these solutions also have disadvantages while providing protection against Internet attacks [9,37,52,[57][58][59][60][61][62][63][64][65][66]. Therefore, a security solution that provides protection while SCADA interacts with advanced networks or/and protocols (such as LAN/WAN) should be acquired [6,52,[59][60][61][62][67][68][69].…”
Section: Related Workmentioning
confidence: 99%
“…While connected with open IP networks, SCADA systems are facing a number of challenges in the absence of a security mechanism that provides protection against cyber-attacks. Several security solutions have been employed to enhance the level of SCADA security but these solutions also have disadvantages while providing protection against Internet attacks [9,37,52,[57][58][59][60][61][62][63][64][65][66]. Therefore, a security solution that provides protection while SCADA interacts with advanced networks or/and protocols (such as LAN/WAN) should be acquired [6,52,[59][60][61][62][67][68][69].…”
Section: Related Workmentioning
confidence: 99%
“…Assume there are n DMs. To satisfy the QoM requirements of all POIs g k ∈ G i within T constraint , the proposed TCWTP mechanism involves calculating (11) to determine the value of n …”
Section: ) Number Of Required Dmsmentioning
confidence: 99%
“…Assume that T constraint is 30 min and the number of DMs is 8. By calculating (11), the values of n Because N disp (= 7) is smaller than n(= 8), the remaining DM is dispatched to the path with the largest η i . In this case, η 1 = mod (16, 7) = 2 and η 2 = mod (40, 7) = 5; therefore, the remaining DM is dispatched to path H 2 .…”
Section: ) Number Of Required Dmsmentioning
confidence: 99%
“…The AOA algorithm uses a set of antenna arrays to determine the angle of the arrival signals and thus estimates the target position and orientation. The RSSI algorithm, which is discussed in this study, transforms the received signal strength into an equivalent distance between a signal sender and receiver pair and then calculates the target position by trilateration using at least two pairs of transmission devices (Azenha et al, 2010; Kim and Lee, 2006; Lee and Kim, 2014; Lin and Song, 2014; Montaser and Moselhi, 2014; Peng et al, 2009).…”
Section: Introductionmentioning
confidence: 99%