Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Cyber Attacks On Nuclear Power Plants

This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the op...

متن کامل

Computational fluid dynamics analysis and geometric optimization of solar chimney power plants by using of genetic algorithm

In this paper, a multi-objective optimization method is implemented by using of genetic algorithm techniques in order to determine optimum configuration of solar chimney power plant. The objective function which is simultaneously considered in the analysis is output power of the plant. Output power of the system is maximized. Design parameters of the considered plant include collector radius (R...

متن کامل

Pbnc 2012 Challenges of Cyber Security for Nuclear Power Plants

Nuclear Power Plants (NPPs) become one of the most important infrastructures in providing efficient and non-interrupted electricity in a country using radioactive elements due to global warming and shortage of fossil resources. To provide the higher reliability and better performance with additional diagnostic capabilities in operating NPPs, digital Instrumentation and Control (I&C) systems hav...

متن کامل

Challenges for Securing Cyber Physical Systems

We discuss three key challenges for securing cyberphysical systems: (1) understanding the threats, and possible consequences of attacks, (2) identifying the unique properties of cyber-physical systems and their differences from traditional IT security, and (3) discussing security mechanisms applicable to cyber-physical systems. In particular, we analyze security mechanisms for: prevention, dete...

متن کامل

Video Shot Cut Detection Using Least Square Approximation Method

Video shot boundary detection is the basic step in the area of content based video analysis and retrieval. Various automatic shot boundary detection techniques have been proposed and their performances are reliable, especially for video cut detection. However most of the proposed methods are sensitive to camera, object motion and lighting changes. In this paper, we have focused mainly on the im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nuclear Engineering and Technology

سال: 2017

ISSN: 1738-5733

DOI: 10.1016/j.net.2016.10.009