SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Yuning Jiang) srt2:(2018)"

Sökning: WFRF:(Yuning Jiang) > (2018)

  • Resultat 1-9 av 9
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Atif, Yacine, 1967-, et al. (författare)
  • Cyber-threat analysis for Cyber-Physical Systems : Technical report for Package 4, Activity 3 of ELVIRA project
  • 2018
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • Smart grid employs ICT infrastructure and network connectivity to optimize efficiency and deliver new functionalities. This evolu- tion is associated with an increased risk for cybersecurity threats that may hamper smart grid operations. Power utility providers need tools for assessing risk of prevailing cyberthreats over ICT infrastructures. The need for frameworks to guide the develop- ment of these tools is essential to define and reveal vulnerability analysis indicators. We propose a data-driven approach for design- ing testbeds to evaluate the vulnerability of cyberphysical systems against cyberthreats. The proposed framework uses data reported from multiple components of cyberphysical system architecture layers, including physical, control, and cyber layers. At the phys- ical layer, we consider component inventory and related physi- cal flows. At the control level, we consider control data, such as SCADA data flows in industrial and critical infrastructure control systems. Finally, at the cyber layer level, we consider existing secu- rity and monitoring data from cyber-incident event management tools, which are increasingly embedded into the control fabrics of cyberphysical systems.
  •  
2.
  • Atif, Yacine, 1967-, et al. (författare)
  • Multi-agent Systems for Power Grid Monitoring : Technical report for Package 4.1 of ELVIRA project
  • 2018
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • This document reports a technical description of ELVIRA project results obtained as part of Work- package 4.1 entitled “Multi-agent systems for power Grid monitoring”. ELVIRA project is a collaboration between researchers in School of IT at University of Skövde and Combitech Technical Consulting Company in Sweden, with the aim to design, develop and test a testbed simulator for critical infrastructures cybersecurity. This report outlines intelligent approaches that continuously analyze data flows generated by Supervisory Control And Data Acquisition (SCADA) systems, which monitor contemporary power grid infrastructures. However, cybersecurity threats and security mechanisms cannot be analyzed and tested on actual systems, and thus testbed simulators are necessary to assess vulnerabilities and evaluate the infrastructure resilience against cyberattacks. This report suggests an agent-based model to simulate SCADA- like cyber-components behaviour when facing cyber-infection in order to experiment and test intelligent mitigation mechanisms. 
  •  
3.
  • Jeusfeld, Manfred A., et al. (författare)
  • Taxonomy of Events and Components in the Power Grid : Technical description for work packages 3.1 and 3.2 of the ELVIRA Project
  • 2018
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • This document reports a technical description of ELVIRA project results obtained as part of Work-package 3.1&3.2 entitled “Taxonomy of Critical Infrastructure (Taxonomy of events + Taxonomy of CI component and relationship)”. ELVIRA project is a collaboration between researchers in School of IT at University of Skövde and Combitech Technical Consulting Company in Sweden, with the aim to design, develop and test a testbed simulator for critical infrastructures cybersecurity.
  •  
4.
  • Jiang, Yuning, 1993-, et al. (författare)
  • A Language and Repository for Cyber Security of Smart Grids
  • 2018
  • Ingår i: 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC 2018). - Los Alamitos, CA : IEEE. - 9781538641392 ; , s. 164-170
  • Konferensbidrag (refereegranskat)abstract
    • Power grids form the central critical infrastructure in all developed economies. Disruptions of power supply can cause major effects on the economy and the livelihood of citizens. At the same time, power grids are being targeted by sophisticated cyber attacks. To counter these threats, we propose a domain-specific language and a repository to represent power grids and related IT components that control the power grid. We apply our tool to a standard example used in the literature to assess its expressiveness.
  •  
5.
  • Jiang, Yuning, 1993-, et al. (författare)
  • Agent Based Testbed Design for Cyber Vulnerability Assessment in Smart-Grids
  • 2018
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • Smart grid employs Information and Communication Technology (ICT) infrastructure and network connectivity to optimize efficiency and deliver new functionalities. This evolution is associated with an increased risk for cybersecurity threats that may hamper smart grid operations. Power utility providers need tools for assessing risk of prevailing cyberthreats over ICT infrastructures. The need for frameworks to guide the development of these tools is essential to define and reveal vulnerability analysis indicators. We propose a data-driven approach for designing testbeds to allow the simulation of cyberattacks in order to evaluate the vulnerability and the impact of cyber threat attacks. The proposed framework uses data reported from multiple smart grid components at different smart grid architecture layers, including physical, control, and cyber layers. The multi-agent based framework proposed in this paper would analyze the conglomeration of these data reports to assert malicious attacks.
  •  
6.
  • Jiang, Yuning, 1993-, et al. (författare)
  • Complex Dependencies Analysis : Technical Description of Complex Dependencies in Critical Infrastructures, i.e. Smart Grids. Work Package 2.1 of the ELVIRA Project
  • 2018
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • This document reports a technical description of ELVIRA project results obtained as part of Work-package 2.1 entitled “Complex Dependencies Analysis”. In this technical report, we review attempts in recent researches where connections are regarded as influencing factors to  IT systems monitoring critical infrastructure, based on which potential dependencies and resulting disturbances are identified and categorized. Each kind of dependence has been discussed based on our own entity based model. Among those dependencies, logical and functional connections have been analysed with more details on modelling and simulation techniques.
  •  
7.
  • Jiang, Yuning, 1993-, et al. (författare)
  • Data Fusion Framework for Cyber Vulnerability Assessment in Smart Grid
  • 2018
  • Annan publikation (övrigt vetenskapligt/konstnärligt)abstract
    • Smart grid adopts ICT to enhance power-delivery management. However, these advanced technologies also introduce an increasing amount of cyber threats. Cyber threats occur because of vulnerabilities throughout smart-grid layers. Each layer is distinguished by typical data flows. For example, power-data stream flows along the physical layer; command data are pushed to and pulled from sensor-control devices, such as RTUs and PLCs. Vulnerabilities expose these data flows to cyber threat via communication networks, such as local control network, vendor network, corporate network and the wider internet. Thus, these data could be used to analyse vulnerabilities against cyber threats. After data collection, data analysis and modelling techniques would be used for vulnerability assessment.
  •  
8.
  • Jiang, Yuning, 1993-, et al. (författare)
  • Multi-Level Vulnerability Modeling of Cyber-Physical Systems
  • 2018
  • Konferensbidrag (refereegranskat)abstract
    • Vulnerability is defined as ”weakness of an asset or control that can be exploited by a threat” according to ISO/IEC 27000:2009, and it is a vital cyber-security issue to protect cyber-physical systems (CPSs) employed in a range of critical infrastructures (CIs). However, how to quantify both individual and system vulnerability are still not clear. In our proposed poster, we suggest a new procedure to evaluate CPS vulnerability. We reveal a vulnerability-tree model to support the evaluation of CPS-wide vulnerability index, driven by a hierarchy of vulnerability-scenarios resulting synchronously or propagated by tandem vulnerabilities throughout CPS architecture, and that could be exploited by threat agents. Multiple vulnerabilities are linked by boolean operations at each level of the tree. Lower-level vulnerabilities in the tree structure can be exploited by threat agents in order to reach parent vulnerabilities with increasing CPS criticality impacts. At the asset-level, we suggest a novel fuzzy-logic based valuation of vulnerability along standard metrics. Both the procedure and fuzzy-based approach are discussed and illustrated through SCADA-based smart power-grid system as a case study in the poster, with our goal to streamline the process of vulnerability computation at both asset and CPS levels.
  •  
9.
  • Shi, Jiahe, et al. (författare)
  • Distributed Control Algorithm for Vehicle Coordination at Traffic Intersections
  • 2018
  • Ingår i: 2018 European Control Conference, ECC 2018. - 9783952426982 ; , s. 1161-1171
  • Konferensbidrag (refereegranskat)abstract
    • This paper proposes a distributed closed-loop control algorithm for optimal coordination of autonomous vehicles at traffic intersections. The main contribution of the paper is a distributed plug-and-play closed-loop optimal control scheme with rear-end collision avoidance constraints enforced on each lane, which maintains recursive feasibility under the assumption that communication between neighboring vehicles is possible. The method is closely related to model predictive control, but at each sampling time new vehicles are allowed to enter the modeled region around the intersection while other vehicles are leaving. In contrast to human drivers, autonomous vehicles can collaboratively form the deceleration strategy before the intersection. Our numerical results indicate that, under certain assumptions, it is optimal for vehicles not allowed to directly pass the intersection to slow down much before the intersection area and then accelerate at the right time so that they can travel through the intersection faster.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-9 av 9

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy