Cyber security, building automation, and the intelligent building

نویسنده

  • David Fisk
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

(in)security in building automation how to create dark buildings with light speed

The usage of building automation, regardless if in private homes or corporate buildings, aims to optimize comfort, energy efficiency and physical access for its users. Is cyber security part of the equation? Unfortunately, not to the extent one might expect, cyber security is quite often sacrificed either for comfort or efficiency. The higher number of small and large-scale installations combin...

متن کامل

Addressing Safety and Security Contradictions in Cyber-Physical Systems

Modern cyber-physical systems are found in important domains such as automobiles, medical devices, building automation, avionics, etc.. Hence, they are increasingly prone to security violations. Often such vulnerabilities occur as a result of contradictory requirements between the safety/real-time properties and the security needs of the system. In this paper we propose a formal framework that ...

متن کامل

INTELLIGENT BUILDING ASSESSMENT BASED ON AN INTEGRATED MODEL OF FUZZY ANALYTIC HIERARCHY PROCESS AND FUZZY PREFERENCE DEGREE APPROACH (FAHP-FPDA)

Intelligent building (IB) technologies have widespread applications in the building design and development. In this regard, it is necessary to develop intelligent building assessment models in order to satisfy the clients, professionals, and occupants' growing demands. To this end, this paper proposes an integrated analytic hierarchy process (AHP) and preference degree approach (PDA) under the ...

متن کامل

Could your Building Catch a Virus? Measuring the Impact of Cyber Security Threats on Building Management Systems

The close control of building services is seen as essential component for delivering low energy performance. This inevitably means some form of supervisory control and data acquisition (SCADA) system. To increase the penetration of this technology into the market place, it is inevitable that internet communication will be employed increasingly in the future. However, it can be very challenging ...

متن کامل

On the Interplay Between Cyber and Physical Spaces for Adaptive Security

Ubiquitous computing is resulting in a proliferation of cyber-physical systems that host or manage valuable physical and digital assets. These assets can be harmed by malicious agents through both cyber-enabled or physically-enabled attacks, particularly ones that exploit the often ignored interplay between the cyber and physical world. The explicit representation of spatial topology is key to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012