2020 IEEE International Symposium on Systems Engineering (ISSE) 2020
DOI: 10.1109/isse49799.2020.9272013
|View full text |Cite
|
Sign up to set email alerts
|

An Architecture-based Modeling Approach Using Data Flows for Zone Concepts in Industry 4.0

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…The commonly used domainspecific language modeling methods are unified modelling language (UML) [9], object constraint language (OCL) [10], extensible markup language (XML) [11], etc. Currently, researchers have developed scenario-oriented attack languages [12][13][14][15][16][17][18], relating them to existing security concepts, attack tactics, techniques, and practices. Arshad et al [12] constructed an attack-specific language to concisely provide information about attack techniques, which will streamline and automate the cyber range functions of threat and challenge execution.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The commonly used domainspecific language modeling methods are unified modelling language (UML) [9], object constraint language (OCL) [10], extensible markup language (XML) [11], etc. Currently, researchers have developed scenario-oriented attack languages [12][13][14][15][16][17][18], relating them to existing security concepts, attack tactics, techniques, and practices. Arshad et al [12] constructed an attack-specific language to concisely provide information about attack techniques, which will streamline and automate the cyber range functions of threat and challenge execution.…”
Section: Introductionmentioning
confidence: 99%
“…Briland and Bouquet [13] proposed a method that uses a domain-specific language to generate modified data, allowing simulated and tested attacks such as injecting forged data into the system. Kern et al [14] propose a domain-specific language for industrial automation and control systems that complies with international security standards. However, since many attack processes exhibit strong dynamics, these hard-coded modeling approaches are not applicable, because they are inflexible and hard to change and reuse.…”
Section: Introductionmentioning
confidence: 99%