Дисертації з теми "Industrial Control Systems (ICS)"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Industrial Control Systems (ICS)".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Es-Salhi, Khaoula. "Segmentation and segregation mechanisms and models to secure the integration of Industrial control Systems (ICS) with corporate system." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0143/document.
Повний текст джерелаSecuring ICS systems, and especially integrated ones, is becoming one of the most urgent issues that disquiets not only all industrial actors but also governments. Very important number of industrial entities and infrastructures are so critical that any non contained cyber attack on these entities can cause huge damage to business, to environment and more gravely to national security and people safety.This thesis studies the integration of ICS with Corporate systems from a security standpoint. Our goal is to study integrated ICS systems security vulnerabilities and suggest models and mechanisms to improve their security and protect them against ceyberattacks. After conducting a study on the vulnerabilities of integrated ICS systems (IICS) and the existing security solutions, we focused on the study of defence in depth technique and its applicability to integrated ICS systems. We defined a new generic segmentation method for IICS, SONICS, which simplifies the segmentation of IICS by focusing only on spects that are really significant for segmentation. We next developed an improved version of SONICS, RIICS (Risk based IICS Segmentation), a segmentation method for IICS systems that fills the SONICS gaps by focusing on risk on top of technical and industrial specifications. To complement the segmentation method, we studied segregation and access control solutions. We proposed a new DTE-based l (Domain Type Enforcement) flow control model for integrated ICS systems
Myers, David. "Detecting cyber attacks on industrial control systems using process mining." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/130799/1/David_Myers_Thesis.pdf.
Повний текст джерелаAbdulrazzaq, Mohammed, та Yuan Wei. "Industrial Control System (ICS) Network Asset Identification and Risk Management". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38198.
Повний текст джерелаElrod, Michael. "A Novel Approach to Determining Real-Time Risk Probabilities in Critical Infrastructure Industrial Control Systems." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1006.
Повний текст джерелаBenjuma, Nuria Mahmud. "An educational framework to support industrial control system security engineering." Thesis, De Montfort University, 2017. http://hdl.handle.net/2086/15494.
Повний текст джерелаWyman, Matthew Cody. "The SAP Link: A Controller Architecture for Secure Industrial Control Systems." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8815.
Повний текст джерелаAndersson, Dorothea. "Simulation of industrial control system field devices for cyber security." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202405.
Повний текст джерелаIndustriella informations- och styrsystem utgör en viktig delav vårt moderna samhälle, inte minst när det gäller kontroll och skydd avkritisk infrastruktur som elnät och vattenförsörjning. Det finns stora behov avatt säkerhetstesta dessa typer av system, vilket ofta är omöjligt iproduktionsmiljöer med realtidskrav som är erkänt känsliga för störningar, tilloch med från vanligt förekommande analysverktyg. Denna rapport presenterarhur vanliga komponenter i industriella informations- och styrsystem kansimuleras för att lura potentiella antagonister, och hur de kan användas ivirtualiserade styrsystem för cybersäkerhetsforskning. 8 olika komponentersimulerades med hjälp av Honeyd, och en generellt applicerbarsimuleringsmetodik utvecklades. Hur dessa simuleringar kan vidareutvecklasför att fungera som riktiga styrsystemskomponenter i virtualiserade miljöer harockså undersökts.
Kulhánek, Radek. "Návrh na zavedení průmyslového řešení ISMS ve výrobní společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241566.
Повний текст джерелаEriksson, Alma, and Oskar Lindh. "Modellering av en cyberattack på ett industriellt säkerhetssystem." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295620.
Повний текст джерелаStuxnet, Havex, BlackEnergy, Crashoverride och Triton/Trisis är alla exempel på cybersäkerhetsincidenter där industrisystem blivit angripna. Händelsen Triton/Trisis är ny i sitt slag, eftersom angriparen kom hela vägen in i det industriella säkerhetssystemet i ett olje- och gasraffinaderi. Ä ven om det slutliga målet för attacken fortfarande är okänt, hade angriparen möjlighet att sätta människor i fara. Detaljer av attacken är fortfarande okända och forskning samt rekonstruktion av attacken pågår. Syftet med denna studie är att skapa en attackgraf över incidenten. Genom att samla in och kombinera information från allmänt tillgängligt material och betygsätta alla källor genom dess tillförlitlighet resulterade studien i en attackgraf med två lager. Varje nod och vektor i grafen har givits en tillförlitlighet och noderna innehåller relaterade källor, verktyg och nätverkssegment. Studien visar att det är möjligt att konstruera en attackgraf av incidenten även om det saknas detaljer. Dessutom visar den att den specifika skadliga koden var skräddarsydd, men stegen som behövdes för att nå det industriella säkerhetssystemet var till stor del möjliga med hjälp av offentligt tillgängliga verktyg. Som ett resultat behöver hela den industriella industrin förbereda sig för en upptrappning av cybersäkerhetsincidenter.
Kandidatexjobb i elektroteknik 2020, KTH, Stockholm
Kabir-Querrec, Maëlle. "Cyber sécurité des systèmes industriels pour les smart-grids : détection d'intrusion dans les réseaux de communication IEC 61850." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT032/document.
Повний текст джерелаInformation and Communication Technologies have been pervading Industrial Automation and Control Systems (IACS) for a few decades now. Initially, IACS ran proprietary protocols on closed networks, thus ensuring some level of security through obscurity and isolation. Technologies and usages have evolved and today this intrinsic security does not exist any longer, though. This transition is in progress in the electricity domain, the power infrastructure turning into the "smart grid".The IEC 61850 standard is key to the smart grid development. It is aimed at making interoperability possible in ``Communication networks and systems for power utility automation''. It thus defines a common data object model and a stack of protocols answering different purposes.Although the cyber risk in IACS is now widely acknowledged, IEC 61850 does not address cyber security in any way whatsoever.This work tackles the question of cyber security through network intrusion detection in IEC 61850 networks, and more specifically in real-time GOOSE communications. The idea is to get the most out of the protocol specifications and system configuration while developing a tailored NIDS. This enables detection accuracy
Amoah, Raphael. "Formal security analysis of the DNP3-Secure Authentication Protocol." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/93798/1/Raphael_Amoah_Thesis.pdf.
Повний текст джерелаCotter, S. M. "Industrial vision systems." Thesis, Cardiff University, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.352506.
Повний текст джерелаGoodhart, Sean Gary. "Self-tuning control of industrial systems." Thesis, Coventry University, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.303380.
Повний текст джерелаZhao, Xiaosha, and Lingjian Gan. "Industrial Control Systems On Multi-‐core." Thesis, Mälardalens högskola, Inbyggda system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28257.
Повний текст джерелаAshry, Mahmoud Mohamed. "Control of multivariable aerospace and industrial systems." Thesis, University of Manchester, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.504785.
Повний текст джерелаArnold, Chad. "Combating Integrity Attacks in Industrial Control Systems." Wright State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=wright1406586509.
Повний текст джерелаOliveira, Jose Paulo Barroso de Moura. "Evolutionary design of process control systems." Thesis, University of Salford, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.244935.
Повний текст джерелаAbbod, Maysam Fadhel. "Supervisory intelligent control for industrial and medical systems." Thesis, University of Sheffield, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.295758.
Повний текст джерелаMorris, Kerry John. "Power line communication systems for industrial control applications." Thesis, Open University, 2001. http://oro.open.ac.uk/58199/.
Повний текст джерелаCook, Allan. "Establishing cyber situational awareness in industrial control systems." Thesis, De Montfort University, 2018. http://hdl.handle.net/2086/17463.
Повний текст джерелаLeander, Björn. "Access Control for Secure Industry 4.0 Industrial Automation and Control Systems." Licentiate thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-50734.
Повний текст джерелаSharif, Z. A. B. M. "Modelling and control of industrial robots." Thesis, City University London, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.356002.
Повний текст джерелаPaulsson, Johan. "Wireless Control of Industrial Robot." Thesis, Uppsala universitet, Solcellsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-415059.
Повний текст джерелаMok, Pik-yin. "Evolutionary optimisation of production-control systems /." Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2358936x.
Повний текст джерелаMuller, Steve. "Risk monitoring with intrusion detection for industrial control systems." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0082/document.
Повний текст джерелаCyber-attacks on critical infrastructure such as electricity, gas, and water distribution, or power plants, are more and more considered to be a relevant and realistic threat to the European society. Whereas mature solutions like anti-malwareapplications, intrusion detection systems (IDS) and even intrusion prevention or self-healing systems have been designed for classic computer systems, these techniques have only been partially adapted to the world of Industrial ControlSystems (ICS). As a consequence, organisations and nations fall back upon risk management to understand the risks that they are facing. Today's trend is to combine risk management with real-time monitoring to enable prompt reactions in case of attacks. This thesis aims at providing techniques that assist security managers in migrating from a static risk analysis to areal-time and dynamic risk monitoring platform. Risk monitoring encompasses three steps, each being addressed in detail in this thesis: the collection of risk-related information, the reporting of security events, and finally the inclusion of this real time information into a risk analysis. The first step consists in designing agents that detect incidents in the system. In this thesis, an intrusion detection system is developed to this end, which focuses on an advanced persistent threat (APT) that particularly targets critical infrastructures. The second step copes with the translation of the obtained technical information in more abstract notions of risk, which can then be used in the context of a risk analysis. In the final step, the information collected from the various sources is correlated so as to obtain the risk faced by the entire system. Since industrial environments are characterised by many interdependencies, a dependency model is elaborated which takes dependencies into account when the risk is estimated
Harshe, Omkar Anand. "Preemptive Detection of Cyber Attacks on Industrial Control Systems." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/54005.
Повний текст джерелаMaster of Science
Balasubramanian, Harish. "Incremental Design Migration Support in Industrial Control Systems Development." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/50990.
Повний текст джерелаMaster of Science
Bourget, Edwin. "Diagnosing accidental and malicious events in industrial control systems." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0179.
Повний текст джерелаThe convergence of information and industrial systems triggered a paradigm shift in the management of malicious and accidental events.Safety and security must now interact and it changes the perimeters and the issues of diagnosis. After defining this new perimeter, this thesis provides an analysis of existing models that provide necessary informations for diagnosis. It then proposes PROS²E, a new event model upon which safety and security diagnosis can be performed in industrial systems. It was specificaly designed to exploit experience already present in the fields of safety and security management. PROS²E is then improved to represent more complex incidents and provide more accurate information. Several examples illustrate the diagnosis capacities of the model
Bell, Michael Ray. "Fuzzy logic control of uncertain industrial processes." Thesis, Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/18998.
Повний текст джерелаTai, Hoi-lun Allen. "Quantitative analysis in monitoring and improvement of industrial systems." Click to view the E-thesis via HKUTO, 2010. http://sunzi.lib.hku.hk/hkuto/record/B4394193X.
Повний текст джерелаPáscoa, Flávio Gil Albano. "Lightweight robust behavior industrial agent methodology." Master's thesis, Faculdade de Ciências e Tecnologia, 2013. http://hdl.handle.net/10362/11232.
Повний текст джерелаAssembly systems today face significant pressure to provide highly adaptable and quickly deployable solutions in order to deal with unpredictable changes according to market trends. However, control of assembly processes are dominated by the use of Programmable Logical Controllers (PLC) which do not provide the necessary mechanisms to easily deal with these challenges. The concept of agent-based control has been introduced as a solution to deal these challenges and support new production paradigms based on the plug and produce concept. However, this solution has not yet been proven to be a real alternative to the traditional PLC approach in terms of performance. This work is investigating the use an approach that is able to benefit from the relative advantages of both PLC and agents solutions. A new hybrid architecture is presented which combines the functionalities of a PLC with those of industrial agents. The focus is on assessing the performance of this approach and help change the minds of an industry averse to changes.
GHAFFARI, MASOUD. "PERCEPTION-BASED CONTROL FOR INTELLIGENT SYSTEMS." University of Cincinnati / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1155739459.
Повний текст джерелаNyqvist, Jennifer. "Operational technology definition and differentiation : In the context of operational systems in Sweden." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18752.
Повний текст джерелаKnowles, Carl William. "Assurance techniques for assessing security control efficacy : an industrial control systems case study." Thesis, Lancaster University, 2016. http://eprints.lancs.ac.uk/79962/.
Повний текст джерелаShenassa, M. Hassan. "Expert tuners for PI control." Thesis, University of Salford, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.327897.
Повний текст джерелаLüders, Frank. "Use of component-based software architectures in industrial control systems /." Västerås : Mälardalen University, 2003. http://www.mrtc.mdh.se/publications/0607.pdf.
Повний текст джерелаDanielsson, Fredrik K. J. "Off-line programming, verification and optimisation of industrial control systems." Thesis, De Montfort University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.269247.
Повний текст джерелаGunjal, Abhinav Shivram. "Trusted Software Updates for Secure Enclaves in Industrial Control Systems." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/79130.
Повний текст джерелаMaster of Science
Pourvatan, Ladan. "Test Process Assessment of Industrial Control Systems via Safety Standards." Thesis, Mälardalens högskola, Inbyggda system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-54702.
Повний текст джерелаBreedon, Philip James. "Multiple axis fuzzy logic control of an industrial robot." Thesis, Nottingham Trent University, 2001. http://irep.ntu.ac.uk/id/eprint/10298/.
Повний текст джерелаTai, Hoi-lun Allen, and 戴凱倫. "Quantitative analysis in monitoring and improvement of industrial systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B4394193X.
Повний текст джерелаMok, Pik-yin, and 莫碧賢. "Evolutionary optimisation of production-control systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B29751020.
Повний текст джерелаPlummer, Andrew Robert. "Digital control techniques for electro-hydraulic servosystems." Thesis, University of Bath, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.280263.
Повний текст джерелаBiro, Robert Fuelep. "Visual servoing using industrial components." Thesis, Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/17985.
Повний текст джерелаKing, Roger Charles. "An integrated approach to the modelling, design and control of industrial systems." Thesis, Cardiff University, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.304858.
Повний текст джерелаEricsson, Niclas. "Improving Development of Communication Software in Industrial Control Systems using Simulation." Licentiate thesis, Mälardalens högskola, Inbyggda system, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-37212.
Повний текст джерелаInom industrin förväntar sig slutkunderna att produkterna har en livslängd på 10–20 år med hög tillförlitlighet och tillgänglighet. De flesta industriella styrsystem automatiserar säkerhetskritiska processer. Detta gör att aspekter som förutbestämt beteende med små fördröjningar och variationer är avgörande för att skydda person, miljö och egendom. Trender som den nya digitaliseringen, sakernas internet, molnet, 5G, maskininlärning och artificiell intelligens, bidrar till att antalet styrsystem som ansluts till Internet ökar. Ökningen beror mycket på att slutkunder börjar förvänta sig nya tjänster, samt tillgång till affärs- och diagnostikinformation även utanför arbetsplatserna. Att introducera nya kommunikationslösningar inom industrin är ofta en stor investering. Riskerna är oftast höga samtidigt som befintliga kommunikationsteknologier och protokoll behöver stödjas även i framtiden. Att få ut produkterna snabbt på marknaden med bibehållen kvalitet är av stor betydelse. Under forsknings- och utvecklingsarbete spenderas mycket tid på isolerade aktiviteter som till exempel simuleringar, uppdateringar av verktyg, insamling av krav, design, programmering, felsökning, dokumentation, testning och granskningar. Att snabbt byta mellan dessa aktiviteter är ofta inte helt enkelt, på grund av att olika metoder och verktyg inte automatiskt kan utbyta eller överföra information. Fokus i denna avhandling är att förbättra effektiviteten vid forskning och utveckling av kommunikationsmjukvara. Effektiviteten är viktig av flera skäl, till exempel att snabbt integrera nya och innovativa forskningsresultat, snabbare nå marknaden med produkter och förbättra produktkvalitet. Initialt studeras olika metoder för att utvärdera kommunikationsfunktionalitet. Metodernas användbarhet kartläggs i förhållande till aktiviteter under forsknings- och utvecklingsarbete, samt viktiga industriella utmaningar identifieras. Trots stora forskningsinsatser inom nätverkssimulatorer, emulatorer och virtualisering, så finns det fortfarande utmaningar kvar för ökad användbarhet och nytta inom industrin. Vidare föreslås en flexibel kommunikationsstackdesign som stöder olika typer av egenskaper och implementationer, från realtidsoperativsystem till enheter helt utan operativsystem, samt olika typer av kommunikationsprotokoll, från realtid till icke-realtid. Slutligen föreslås en reducerad uppsättning nyckelfunktioner till nätverkssimulatorer, vilka implementerats och använts i en fallstudie i ett forskningsprojekt. Dessa bidrag tillsammans medför en förenkling och ökad automatisering vilket gör att mängden manuellt arbete minskar under forsknings- och utvecklingsarbete.
Liu, Jessamyn. "Anomaly detection methods for detecting cyber attacks in industrial control systems." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/129055.
Повний текст джерелаCataloged from PDF version of thesis.
Includes bibliographical references (pages 119-123).
Industrial control systems (ICS) are pervasive in modern society and increasingly under threat of cyber attack. Due to the critical nature of these systems, which govern everything from power and wastewater plants to refineries and manufacturing, a successful ICS cyber attack can result in serious physical consequences. This thesis evaluates multiple anomaly detection methods to quickly and accurately detect ICS cyber attacks. Two fundamental challenges in developing ICS cyber attack detection methods are the lack of historical attack data and the ability of attackers to make their malicious activity appear normal. The goal of this thesis is to develop methods which generalize well to anomalies that are not included in the training data and to increase the sensitivity of detection methods without increasing the false alarm rate. The thesis presents and analyzes a baseline detection method, the multivariate Shewhart control chart, and four extensions to the Shewhart chart which use machine learning or optimization methods to improve detection performance. Two of these methods, stationary subspace analysis and maximized ratio divergence analysis, are based on dimensionality reduction techniques, and an additional model-based method is implemented using residuals from LASSO regression models. The thesis also develops an ensemble method which uses an optimization formulation to combine the output of multiple models in a way that minimizes detection delay. When evaluated on 380 samples from the Kasperskey Tennessee Eastman process dataset, a simulated chemical process that includes disruptions from cyber attacks, the ensemble method reduced detection delay on attack data by 12% (55 minutes) on average when compared to the baseline method and was 9% (42 minutes) faster on average than the method which performed best on training data.
by Jessamyn Liu.
S.M.
S.M. Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center
Rajković, Kostadin. "MEASURING THE COMPLEXITY OF NATURAL LANGUAGE REQUIREMENTS IN INDUSTRIAL CONTROL SYSTEMS." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-44703.
Повний текст джерелаHargrove, Walter Edward. "THE use of a feedback systems incorporated with a morphological matrix for product/system development." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/16249.
Повний текст джерелаNaidoo, Puramanathan. "The control of a multi-variable industrial process, by means of intelligent technology." Thesis, Port Elizabeth Technikon, 2001. http://hdl.handle.net/10948/48.
Повний текст джерела