2018
DOI: 10.1049/iet-cps.2018.0008
|View full text |Cite
|
Sign up to set email alerts
|

Modelling and evaluation of the security of cyber‐physical systems using stochastic Petri nets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…Petri nets use tokens to represent the state of systems or their components, and links to represent the influence between systems or components and simulate the interdependence relationships through the network token flow. 10 A behavioural Petri net model of the research object is constructed on the bases of some advanced Petri nets, such as stochastic Petri net, 11 coloured Petri net, 12 and fuzzy Petri net, 13 and the difference between the output of the object model and actual output is analyzed. By combining the actual attributes of the system, the process of failure propagation is studied and the failure root is found.…”
Section: Analysis Of Failure Propagation Based On Petri Netmentioning
confidence: 99%
“…Petri nets use tokens to represent the state of systems or their components, and links to represent the influence between systems or components and simulate the interdependence relationships through the network token flow. 10 A behavioural Petri net model of the research object is constructed on the bases of some advanced Petri nets, such as stochastic Petri net, 11 coloured Petri net, 12 and fuzzy Petri net, 13 and the difference between the output of the object model and actual output is analyzed. By combining the actual attributes of the system, the process of failure propagation is studied and the failure root is found.…”
Section: Analysis Of Failure Propagation Based On Petri Netmentioning
confidence: 99%
“…Rule‐C . Multi‐updating rule [26, 27]: Given any two versions of the model, V 1 and V 2, then the updating process from V 1 to V 2 is i = 0 V 2 V Ver V 1 + i i = 0 V 2 V 1 normalVer )(V 1 + i = mm u V 1 mm u V 1 + 1 mm u V 2 Rule‐D . Elimination rule : In the ith update mm u i of a model, a certain object o is added.…”
Section: Formal Definitions and Rulesmentioning
confidence: 99%
“…Vers V returns the corresponding mm u i , meaning the model version is V after the update of mm u i . Rule-C. Multi-updating rule [26,27]: Given any two versions of the model, V 1 and V 2 , then the updating process from…”
Section: Formal Definitions and Rulesmentioning
confidence: 99%
“…The vulnerability of smart grids and other CPSs to attackers prompted the need to safeguard, defend and repel such attacks. A stochastic Petri net (SPN) is proposed as model based on the behavioral characteristics of an attacker and defender to analyze the safety and security of CPSs [16]. Established on the backbone of a semi-Markov model, the system's security (attacks factors and mitigation measures) was quantitatively analyzed based on the mean-time-to-fail (MTTF) and availability.…”
Section: Introductionmentioning
confidence: 99%