2015
DOI: 10.1016/j.ifacol.2015.08.199
|View full text |Cite
|
Sign up to set email alerts
|

Revision of the Tennessee Eastman Process Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
130
0
3

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 271 publications
(134 citation statements)
references
References 3 publications
1
130
0
3
Order By: Relevance
“…We resort to the simulation model in [24] to quantify monetary losses of the TE process under sensor compromises. The TE process involves two irreversible reactions to produce two liquid (liq) products G, H from four gaseous (g) reactants A,C, D, E as shown in Fig.…”
Section: Final Stagementioning
confidence: 99%
“…We resort to the simulation model in [24] to quantify monetary losses of the TE process under sensor compromises. The TE process involves two irreversible reactions to produce two liquid (liq) products G, H from four gaseous (g) reactants A,C, D, E as shown in Fig.…”
Section: Final Stagementioning
confidence: 99%
“…The latest version of Eastman Tennessee simulator and its presented data, which is available in [30], have been used to simulate. In addition, up to date, there is another main reason to use this material is that both simulator and data are available on this site.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Finally, a fault-tolerant active control approach is proposed to combine output results. The importance of this research is from actual data of the TE process and complete simulation in MATLAB to detect four faults (which there is concurrency possibility for two of them) and five different working modes in the system as real-time by the fuzzy-neural fusion classifier and compare classification results with the presented sample in other reliable materials [18][19][20][21][22][23][24][25][26][27][28][29][30].…”
Section: Introductionmentioning
confidence: 99%
“…Then attackers can revise the reading to drive the system away from the reference point. Define a reward function r a : X T → R, then r a (x T ) will be the operation utility of the TE process under the state x T , which can be obtained from the simulation results of the process model [1]. We rank the output value of the function r a from high to low and index the states correspondingly, e.g., x T = 1 indicates the compromise of a secondary sensor and x T = 5 indicates the compromise of all the sensors in the TE process.…”
Section: Case Studymentioning
confidence: 99%
“…To investigate the effect of the defender's belief, we fix the system state x T = 3 and change the belief state (α T , β T ) from (9, 1) to (1,9), which means that the defender grows optimistically that the user is of a low threat level with a high probability. Since players' value functions are of different scales in terms of the attacking threshold and the probability, we normalize the value functions with respect to their maximum values to illustrate their trends and make them comparable to the threshold and the probability as shown in Fig.…”
Section: Case Studymentioning
confidence: 99%