940 Hits in 5.9 sec

Assessing Dependability and Resilience in Critical Infrastructures: Challenges and Opportunities [chapter]

Alberto Avritzer, Felicita Di Giandomenico, Anne Remke, Martin Riedl
2012 Resilience Assessment and Evaluation of Computing Systems  
Assessing resilience is thus a cornerstone for improving the dependability in critical infrastructures.  ...  Critical infrastructures (CI) are very complex and highly interdependent systems, networks and assets that provide essential services in our daily life.  ...  Section 3.5 focuses on how stochastic hybrid models can be used for the dependability evaluation of fluid critical infrastructures.  ... 
doi:10.1007/978-3-642-29032-9_3 fatcat:3e64y6jfgre4xpqqj75sspaybq

Constructing Models for Systems Resilience: Challenges, Concepts, and Formal Methods

Madni, Erwin, Sievers
2020 Systems  
This paper emphasizes the importance of systems modeling in engineering resilient systems and presents an overarching methodology that employs different modeling approaches for operational tasks as a function  ...  As systems continue to grow in scale and complexity and have to operate safely in challenging disruptive environments, system safety and resilience has become a critical requirement.  ...  The RC is a hybrid modeling construct that combines invariant and flexible assertions and is represented as a Partially Observable Markov Decision Process (POMDP).  ... 
doi:10.3390/systems8010003 fatcat:eprnvkkurjhqnksudbew4t3cf4

A fault diagnosis system for interdependent critical infrastructures based on HMMs

Stavros Ntalampiras, Yannis Soupionis, Georgios Giannopoulos
2015 Reliability Engineering & System Safety  
The proposed scheme is based on modeling the relationship between datastreams coming from two network nodes by means of a hidden Markov model (HMM) trained on the parameters of linear time-invariant dynamic  ...  This paper proposes a probabilistic modeling scheme for analyzing malicious events appearing in interdependent critical infrastructures.  ...  Hidden Markov models Hidden Markov models constitute an extension of the discrete Markov processes while the main focus is placed on real-world problems.  ... 
doi:10.1016/j.ress.2015.01.024 fatcat:hniknwrscfa3neq4jaied7y7qa

Quantitative analysis of power systems resilience: Standardization, categorizations, and challenges

A. Umunnakwe, H. Huang, K. Oikonomou, K.R. Davis
2021 Renewable & Sustainable Energy Reviews  
By integrating the Axiomatic Design Process, we provide a standard for comparison and analysis of the adequacy of reviewed quantitative metrics in power systems resilience quantification, while the categorizations  ...  Statistical resilience metric analysis Fragility curves Resilience quantification gaps and challenges Recommendations and future enhancement directions A B S T R A C T Power systems incur considerable  ...  Hao Huang: Other contribution, Verification of Metric Categorizations and thorough manuscript appraisal.  ... 
doi:10.1016/j.rser.2021.111252 fatcat:bav52pxctjblrmmnjtbdycoo2e

Resilience Quantification of Smart Distribution Networks—A Bird's Eye View Perspective

Youba Nait Belaid, Patrick Coudray, José Sanchez-Torres, Yi-Ping Fang, Zhiguo Zeng, Anne Barros
2021 Energies  
We conduct detailed analysis of existing quantitative resilience studies in both electric and telecommunication domains of a PDN, focusing on event type, metrics, temporal phases, uncertainty, and critical  ...  tools and methods for the power distribution network (PDN) to avoid catastrophic infrastructural and economical losses.  ...  Acknowledgments: Authors would like to thank the reviewers for their insightful comments and constructive suggestions. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/en14102888 fatcat:x3lq2bztjnburm5v7wrh2zi6bm

Verification of Networks of Smart Energy Systems over the Cloud [chapter]

Alessandro Abate
2017 Lecture Notes in Computer Science  
By "cloud" we denote an infrastructure (predominantly with digital features over physical qualities) allowing for seamless (mostly wireless) communication between devices, which thus give form to a network  ...  This contribution advocates the use of formal methods to verify and certifiably control the behaviour of computational devices interacting over a shared infrastructure.  ...  This is a position article accompanying a keynote talk at NSV 2016. It exclusively portrays the perspective of the author, without claims of generality or comprehensiveness.  ... 
doi:10.1007/978-3-319-54292-8_1 fatcat:h6uu3iojxvh45k6sorpxgse7tq

Proactive Maintenance Strategy Based on Resilience Empowerment for Complex Buildings [chapter]

Francesco Rota, Maria Cinzia Luisa Talamo, Giancarlo Paganin
2020 Smart Innovation, Systems and Technologies  
In this perspective, maintenance is therefore a key factor to assure building resilience by keeping systems and equipment in the required operational state.  ...  in the direction of a proactive maintenance approach.  ...  Introduction Proactive Maintenance Approaches in Support of Infrastructure Resilience Maintenance, in its general exception, ensures system performances over time.  ... 
doi:10.1007/978-3-030-52869-0_21 fatcat:4dgcbwsennbgxekozpdjzs4d3q

Author Index

2008 2008 IEEE International Symposium on Parallel and Distributed Processing  
for Water Spills Using DDDAS Li, Dong System-level, Thermal-aware, Fully-loaded Process Scheduling Li, Huaming ECG Segmentation in a Body Sensor Network Using Hidden Markov Models A Hash-TLB Approach  ...  and its Applications Tan, Jindong ECG Segmentation in a Body Sensor Network Using Hidden Markov Models Taneja, Kunal Improving Software Reliability and Productivity via Mining Program Source Code Tansey  ... 
doi:10.1109/ipdps.2008.4536576 fatcat:7unikf5ywjhjtdd6xtrmcom3gq


2014 Procedia Computer Science  
Track 7: Modeling and Simulation in Transportation Sciences Modeling personal exposure to air pollution with AB²C: Environmental inequality Evi Semantic Context-aware Adaptation Platform Architecture Alti  ...  Architecture (IIA) for IPv6 Packet traversing and Inter-Connectivity over hybrid (IPv4/IPv6) Internet Tariq Saraj, Muhammad Yousaf, Sajjad Akbar, Amir Qayyum, Mudassir Tufail On defining information and  ...  algorithm development Nikos Zarkadis, Antonio Ridi and Nicolas Morel Hidden Markov Models for ILM appliance identification Antonio Ridi and Jean Hennebert Affective interaction in smart environments  ... 
doi:10.1016/j.procs.2014.05.386 fatcat:37gw5eesjfdpbj3cuwqz4cpjtu

Electric Power Grid Resilience to Cyber Adversaries: State of the Art

Tien Nguyen, Shiyuan Wang, Mohannad Alhazmi, Mostafa Nazemi, Abouzar Estebsari, Payman Dehghanian
2020 IEEE Access  
With the unprecedented complexity and heterogeneity in dynamic smart grid networks comes additional vulnerability to emerging threats such as cyber attacks.  ...  Rapid development and deployment of advanced network monitoring and communication systems on one hand, and the growing interdependence of the electric power grids to a multitude of lifeline critical infrastructures  ...  Reference [180] introduced a new model for malicious code detection using a new hybrid DL model.  ... 
doi:10.1109/access.2020.2993233 fatcat:bm6pdoj7j5g3xn4pea6egoqm2a

2019 Index IEEE Transactions on Systems, Man, and Cybernetics: Systems Vol. 49

2019 IEEE Transactions on Systems, Man & Cybernetics. Systems  
., +, TSMC Aug. 2019 1739-1748 Model-Based Diagnosis of Multiple Faults in Hybrid Dynamical Systems With Dynamically Updated Parameters.  ...  Que, H., +, TSMC July 2019 1399-1407 Model-Based Diagnosis of Multiple Faults in Hybrid Dynamical Systems With Dynamically Updated Parameters.  ...  Open loop systems  ... 
doi:10.1109/tsmc.2019.2956665 fatcat:xhplbanlyne7nl7gp2pbrd62oi

Investigating the Significance of Bellwether Effect to Improve Software Effort Estimation

Solomon Mensah, Jacky Keung, Stephen G. MacDonell, Michael F. Bosu, Kwabena E. Bennin
2017 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS)  
Bellwether effect refers to the existence of exemplary projects (called the Bellwether) within a historical dataset to be used for improved prediction performance.  ...  Empirical results show that Bellwether effect exist in chronological datasets with a set of exemplary and recently completed projects representing the Bellwether moving window.  ...  Hu, Feng Jin, Guigang Zhang, Jian Wang, and Yi Yang o A Novel Hidden Markov Model for Genome-Wide Association Studies Junli Yang, Bo Song, Bing Yan, and Guoqiang Li 16:00 -17:40 • Session VIII-D: Software  ... 
doi:10.1109/qrs.2017.44 dblp:conf/qrs/MensahKMBB17 fatcat:spwimrofprdtnlbondosmuez5u

Cyber-Physical Power System (CPPS): A Review on Modelling, Simulation, and Analysis with Cyber Security Applications

Rajaa Vikhram Yohanandhan, Rajvikram Madurai Elavarasan, Manoharan Premkumar, Lucian Mihet-Popa
2020 IEEE Access  
The vulnerability function of the state (S) transfer is defined as; FIGURE 15 . 15 Hidden Markov model states for predicting cyber attacks. Fig.  ...  shows an example of a Markov model for attack prediction, which is visualized as a graph [121] .  ... 
doi:10.1109/access.2020.3016826 fatcat:caax2ubyyrclhj37g5ynvlm66q

2020 Index IEEE Transactions on Smart Grid Vol. 11

2020 IEEE Transactions on Smart Grid  
Volt-VAR Control in Power Distribution Systems; TSG July 2020 3008-3018 Wang, W., see Gao, Y., TSG Nov. 2020 5357-5369 Wang, X., see Sheng, H., TSG Jan. 2020 95-105 Wang, X., Zhang, H., Shi, F., Wu  ...  Active Distribution Network in Deregulated Retail Power Market; 1476-1488 Wang, J., see Arif, A., TSG Jan. 2020 673-685 Wang, J., see Cao, X., TSG Jan. 2020 696-709 Wang, J., see Cao, X., TSG Jan  ...  ., +, TSG Sept. 2020 4299-4310 Markov Decision Process-Based Resilience Enhancement for Distribution Systems: An Approximate Dynamic Programming Approach.  ... 
doi:10.1109/tsg.2020.3044227 fatcat:qp5iogfnrnambc3qzuwvj4aega

A systems and control perspective of CPS security

Seyed Mehran Dibaji, Mohammad Pirani, David Bezalel Flamholz, Anuradha M. Annaswamy, Karl Henrik Johansson, Aranya Chakrabortty
2019 Annual Reviews in Control  
Parameter η evolves in discrete time, e.g., Markov jump model, in the cyber-layer which makes the overall hybrid system shown in Fig. 6 .  ...  Attacks on Kalman filters have been also analyzed in [229] . Moreover, in [230] a Hidden Markov and a Neural Network model are used to classify the attacks.  ... 
doi:10.1016/j.arcontrol.2019.04.011 fatcat:wvg2nfbz4jexfe6ev26fv7aezm
« Previous Showing results 1 — 15 out of 940 results