National Open University Library

Cyber-security threats and response models in power plants / (Record no. 14150)

MARC details
000 -LEADER
fixed length control field 03738cam a2200325 i 4500
INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031127113
INTERNATIONAL STANDARD BOOK NUMBER
ISBN 3031127110
DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
MAIN ENTRY--AUTHOR NAME
Personal name Smidts, C.
TITLE STATEMENT
Title Cyber-security threats and response models in power plants /
Statement of responsibility, etc Carol Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao, Linan Huang, Xiaoxu Diao, Rakibul Talukdar, Michael C. Pietrykowski
Copyright Date
Place of publication Cham, Switzerland :
Name of publisher Springer,
Year of publication or production 2022
PHYSICAL DESCRIPTION
Number of Pages 1 online resource
SERIES STATEMENT
Series statement SpringerBriefs in Computer Science,
FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Probabilistic Risk Assessment: Nuclear Power Plants and Introduction to the Context of Cyber Security -- Machine Learning based Abnormal Event Detection and Classification -- Game-Theoretic Design of Response Systems -- Experimental Testbeds and Design of Experiments -- Conclusions
SUMMARY, ETC.
Summary, etc This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well. A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well. This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer security.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Nuclear power plants
ADDED ENTRY--PERSONAL NAME
Personal name Ray, Indrajit
ADDED ENTRY--PERSONAL NAME
Personal name Zhu, Quanyan,
ADDED ENTRY--PERSONAL NAME
Personal name Vaddi, Pavan Kumar,
ADDED ENTRY--PERSONAL NAME
Personal name Zhao, Yunfei,
ADDED ENTRY--PERSONAL NAME
Personal name Huang, Linan,
ADDED ENTRY--PERSONAL NAME
Personal name Diao, Xiaoxu,
ADDED ENTRY--PERSONAL NAME
Personal name Talukdar, Rakibul,
ADDED ENTRY--PERSONAL NAME
Personal name Pietrykowski, Michael C.,
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://rave.ohiolink.edu/ebooks/ebc2/9783031127113
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://link.springer.com/10.1007/978-3-031-12711-3
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://go.ohiolink.edu/goto?url=https://link.springer.com/10.1007/978-3-031-12711-3
ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Permanent Location Current Location Date acquired Full call number Accession Number Koha item type
Gabriel Afolabi Ojo Central Library (Headquarters). Gabriel Afolabi Ojo Central Library (Headquarters). 11/06/2024 U163 .65 2022 0194985 Books
Gabriel Afolabi Ojo Central Library (Headquarters). Gabriel Afolabi Ojo Central Library (Headquarters). 11/06/2024 U163 .65 2022 0194986 Books
Gabriel Afolabi Ojo Central Library (Headquarters). Gabriel Afolabi Ojo Central Library (Headquarters). 11/06/2024 U163 .65 2022 0195915 Books

Powered by Koha

//