0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

Cyber-Security Threats and Response Models in Nuclear Power Plants (Paperback, 1st ed. 2022): Carol Smidts, Indrajit Ray,... Cyber-Security Threats and Response Models in Nuclear Power Plants (Paperback, 1st ed. 2022)
Carol Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao, …
R1,061 Discovery Miles 10 610 Ships in 9 - 17 working days

This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well. A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well. This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Flexible Bayesian Regression Modelling
Yanan Fan, David Nott, … Paperback R2,427 Discovery Miles 24 270
Essential Methods for Design Based…
Danny Pfeffermann, C.R. Rao Paperback R1,389 Discovery Miles 13 890
Rabi N. Bhattacharya - Selected Papers
Manfred Denker, Edward C. Waymire Hardcover R4,892 Discovery Miles 48 920
Markov Chains - Theory and Applications
B Sericola Hardcover R3,785 Discovery Miles 37 850
Numbers, Hypotheses & Conclusions - A…
Colin Tredoux, Kevin Durrheim Paperback R969 R856 Discovery Miles 8 560
Generalized Method of Moments
Alastair R. Hall Hardcover R4,489 Discovery Miles 44 890
Time Series Analysis: Methods and…
Tata Subba Rao, Suhasini Subba Rao, … Hardcover R4,435 Discovery Miles 44 350
BI Statistical Methods - Volume I…
Peter Walley Hardcover R2,666 Discovery Miles 26 660
Functional Gaussian Approximation for…
Florence Merlevede, Magda Peligrad, … Hardcover R3,197 Discovery Miles 31 970
Spectral Analysis and Time Series…
M.B. Priestley Paperback R2,455 Discovery Miles 24 550

 

Partners