2021 IEEE 12th International Conference on Software Engineering and Service Science (ICSESS) 2021
DOI: 10.1109/icsess52187.2021.9522244
|View full text |Cite
|
Sign up to set email alerts
|

Research on Modeling and Simulation of CPPS and Its Cascading Failure Mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Step 2: According to Equation (7), calculate the estimated bandwidth usage of the CE and update the cost factor matrix W (k) . Step 3: Using the Dijkstra algorithm, determine the main channel matrix X (k) .…”
Section: Initial Communication Channel Planning For the Lcsmentioning
confidence: 99%
See 2 more Smart Citations
“…Step 2: According to Equation (7), calculate the estimated bandwidth usage of the CE and update the cost factor matrix W (k) . Step 3: Using the Dijkstra algorithm, determine the main channel matrix X (k) .…”
Section: Initial Communication Channel Planning For the Lcsmentioning
confidence: 99%
“…In the first stage of the game, defense resources are allocated to CEs. Among them, certain defense resources are allocated to CEs (6,4), (4,6), (7,6), (6,7), (9,7), (7,9), (13,15), (15,13), (14,7), (7,14), (14,15), (15,14), (16,8), (8,16), (16,17), (17,16), (17,20), (20,17), (18,19), (19,18), (19,20), and (20,19). The failure probabilities p ij during attack are 0.769, 0.769, 0.769, 0.769, 0.769, 0.833, 0.833, 0.833, 0.833, 0.472, 0.472, 0.833, 0.833, 0.714, 0.714, 0.769, 0.769, 0.909, 0.909, 0.625, 0.625, 0.556, and 0.556, respectively.…”
Section: Simulation Experiments On the Three-stage Process Of Cpps At...mentioning
confidence: 99%
See 1 more Smart Citation
“…Others focus on a single critical infrastructure (e.g. [44]- [49] [50]- [53]). Moreover, some of the contributions are specific to a type of threat (ransomware, malware [54], spoofing attack [46], terrorist attacks [40], etc.).…”
Section: B Incident Propagation Models and Approachesmentioning
confidence: 99%
“…[44], cyber and/or physical attacks [47]- [49], [51], [55], etc. Some research works concentrate on a type of asset whatever its granularity (healthcare [44], civil aviation [46], power systems [50], [51], [53], [56], port infrastructure [48], airport infrastructure [57], supply chain [56], ADS-B system [46], etc.). However, to our knowledge, no research work is dedicated to the definition of an approach for cyber or physical incident propagation in a healthcare infrastructure as a whole.…”
Section: B Incident Propagation Models and Approachesmentioning
confidence: 99%