Filters








5 Hits in 5.3 sec

A Bayesian model to treat within-category and crew-to-crew variability in simulator data for Human Reliability Analysis

Salvatore F. Greco, Luca Podofillini, Vinh N. Dang
2020 Reliability Engineering & System Safety  
The applicability of the proposed model to ongoing simulator data collection programs is also investigated.  ...  Numerical applications with both artificially-generated data and real simulator data are provided to demonstrate the effects of modelling variability in HEP estimates, to avoid potential overconfidence  ...  Acknowledgments The work was funded by the Swiss Federal Nuclear Safety Inspectorate (ENSI), under contract Nr. 101163. The views expressed in this work are solely those of the authors.  ... 
doi:10.1016/j.ress.2020.107309 fatcat:tf6fn3q3erh2hbv6oyncz3g5ay

HUMAN RELIABILITY ANALYSIS: EXPLORING THE INTELLECTUAL STRUCTURE OF A RESEARCH FIELD

Patriarca Riccardo, Ramos Marilia, Nicola Paltrinieri, Salvatore Massaiu, Francesco Costantino, Giulio Di Gravio, Ronald Laurids Boring
2020 Reliability Engineering & System Safety  
Rooted in reliability engineering, the discipline of Human Reliability Analysis (HRA) has been broadly applied in a variety of domains in order to understand, manage and prevent the potential for human  ...  This paper investigates the existing literature pertaining to HRA and aims to provide clarity in the research field by synthesizing the literature in a systematic way through systematic bibliometric analyses  ...  Indeed, data collection for use in HRA is the focus of two substantially large projects: SACADA [187] and HuREX [188] . SACADA is a database developed by the U.S.  ... 
doi:10.1016/j.ress.2020.107102 fatcat:hr2bcrcdibehpcisrll354lqtu

Cybersecurity for Industrial Control Systems: A Survey [article]

Deval Bhamare, Maede Zolanvari, Aiman Erbad, Raj Jain, Khaled Khan, Nader Meskin
2020 arXiv   pre-print
As a result, ICSs have been exposed to the attack vectors used in the majority of cyber-attacks. However, ICS devices are inherently much less secure against such advanced attack scenarios.  ...  A compromise to ICS can lead to enormous physical damage and danger to human lives. In this work, we have a close look at the shift of the ICS from stand-alone systems to cloud-based environments.  ...  [14] confirm that simulation experiments are a potential means of analyzing and assessing the security of SCADA systems.  ... 
arXiv:2002.04124v1 fatcat:xh464lhc6vgepmaow7x2crewby

Efficient deep learning algorithms for securing Industrial Control Systems from cyberattacks [article]

Sasanka Potluri, Universitäts- Und Landesbibliothek Sachsen-Anhalt, Martin-Luther Universität, Christian Diedrich, Andreas Wendemuth
2021
In order to identify the novel or unknown attack, anomaly-based intrusion detection technique is developed using different deep learning algorithms for classification of normal to anomalous behaviour and  ...  Out of them, NSL-KDD is popularly used by many researchers and is selected for the development of Intrusion Detection System (IDS) in ICS for network attacks.  ...  The traffic data is logged and can be used to analyze the behavior to be normal or abnormal traffic.  ... 
doi:10.25673/36528 fatcat:sl6fdy6sszgkzbp4aqqh2oavau

Homotextuality in the writing of Álvaro Pombo : a phenomenological perspective on existential dissonance and authentic being

Frederick John-Maria Fajardo
2009
Using the deconstructive methodology of queer theory (Edelman, Butler, Llamas, Dollimore, Hocquenghem, et al.) and the philosophical frameworks of Nietzsche, Heidegger, Merleau-Ponty, and Taylor, among  ...  Pombo spent eleven years in exile in England from Franco's National-Catholic Spain, and he returned to his homeland at the dawn of its transition to democracy in 1976.  ...  By using the term "existential leitmotif," I am referring to the literary and philosophical poetics that Pombo uses to rewrite the subject of homosexuality, and specifically how Pombo uses homosexuality  ... 
doi:10.14288/1.0067163 fatcat:if3vk7dzwrbtjlbvrxb4j74amq