期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Systematic Design and Coordination Acts of Ecological Security in Upper Yangtze River in China 被引量:1
1
作者 Fang Yi-ping, Chen Quo-jieInstitute of Mountain Hazards and Environment, Chinese Academy of Sciences, Chengdu 610041, Sichuan. China School of Management, University of Electronic Science and Technology of China, Chengdu 610054, Sichuan, China 《Wuhan University Journal of Natural Sciences》 CAS 2003年第03B期987-995,共9页
In this paper, systematic design and act of eco-security is discussed as a focal point of conflict and unrest. The situation of ecosystem, the schematic framework of eco-security design, the main acts of ecosystem imp... In this paper, systematic design and act of eco-security is discussed as a focal point of conflict and unrest. The situation of ecosystem, the schematic framework of eco-security design, the main acts of ecosystem improvement, major difficulties and challenges have also been analyzed. The purpose of this study was to formulate the systematic framework of eco-security maintenance, to highlight systematic idea or philosophy of ecological rehabilitation and eco-security. A three-dimensional schematic model is applied to design the security of ecosystem. It was concluded that: 1) maintaining ecological security requires far better and sophisticated resource management skill and ecological improvement measures, and is also a continuing and multifac-eted task. It cannot be permanently accomplished by a single action and program; 2) at present, technical system and policy and law system dimensions of ecological security are not enough even in short; 3) development of ecological industries is beneficial to local economic development and ecosystem protection. 展开更多
关键词 upper Yangtze basin ecological security systematic design eco-security maintenance
下载PDF
Deriving invariant checkers for critical infrastructure using axiomatic design principles
2
作者 Cheah Huei Yoong Venkata Reddy Palleti +2 位作者 Rajib Ranjan Maiti Arlindo Silva Christopher M Poskitt 《Cybersecurity》 EI CSCD 2021年第1期67-90,共24页
Cyber-physical systems(CPSs)in critical infrastructure face serious threats of attack,motivating research into a wide variety of defence mechanisms such as those that monitor for violations of invariants,i.e.logical p... Cyber-physical systems(CPSs)in critical infrastructure face serious threats of attack,motivating research into a wide variety of defence mechanisms such as those that monitor for violations of invariants,i.e.logical properties over sensor and actuator states that should always be true.Many approaches for identifying invariants attempt to do so automatically,typically using data logs,but these can miss valid system properties if relevant behaviours are not well-represented in the data.Furthermore,as the CPS is already built,resolving any design flaws or weak points identified through this process is costly.In this paper,we propose a systematic method for deriving invariants from an analysis of a CPS design,based on principles of the axiomatic design methodology from design science.Our method iteratively decomposes a high-level CPS design to identify sets of dependent design parameters(i.e.sensors and actuators),allowing for invariants and invariant checkers to be derived in parallel to the implementation of the system.We apply our method to the designs of two CPS testbeds,SWaT and WADI,deriving a suite of invariant checkers that are able to detect a variety of single-and multi-stage attacks without any false positives.Finally,we reflect on the strengths and weaknesses of our approach,how it can be complemented by other defence mechanisms,and how it could help engineers to identify and resolve weak points in a design before the controllers of a CPS are implemented. 展开更多
关键词 Cyber-physical systems Critical infrastructure Industrial control systems systematic design framework Axiomatic design INVARIANTS Anomaly detection Supervised machine learning
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部