Search

Your search keyword '"INDUSTRIAL controls manufacturing"' showing total 1,303 results

Search Constraints

Start Over You searched for: Descriptor "INDUSTRIAL controls manufacturing" Remove constraint Descriptor: "INDUSTRIAL controls manufacturing"
1,303 results on '"INDUSTRIAL controls manufacturing"'

Search Results

1. A TabPFN-based intrusion detection system for the industrial internet of things.

2. An industrial network intrusion detection algorithm based on IGWO-GRU.

3. Parameter estimation methods for time‐invariant continuous‐time systems from dynamical discrete output responses based on the Laplace transforms.

4. Multi-Channel Multi-Scale Convolution Attention Variational Autoencoder (MCA-VAE): An Interpretable Anomaly Detection Algorithm Based on Variational Autoencoder.

5. False Data Injection Attack Detection, Isolation, and Identification in Industrial Control Systems Based on Machine Learning: Application in Load Frequency Control.

6. An online intrusion detection method for industrial control systems based on extended belief rule base.

7. Dynamic vulnerability severity calculator for industrial control systems.

8. Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation.

9. Network intrusion detection system for DDoS attacks in ICS using deep autoencoders.

10. Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems.

11. Development of a Novel Open Control System Implementation Method under Industrial IoT.

12. Design and multilevel reconstruction method of intelligent power industry control system based on digital twins.

13. Network Security Prediction of Industrial Control Based on Projection Equalization Optimization Algorithm.

14. System-level operational cyber risks identification in industrial control systems.

15. Semi-supervised attack detection in industrial control systems with deviation networks and feature selection.

16. Optimal Design of I-PD and PI-D Industrial Controllers Based on Artificial Intelligence Algorithm.

17. Faking smart industry: exploring cyber-threat landscape deploying cloud-based honeypot.

18. A safety fault diagnosis method on industrial intelligent control equipment.

19. Effective application of operator training simulator in experiential education.

20. Digital Forensics for Analyzing Cyber Threats in the XR Technology Ecosystem within Digital Twins.

21. Guide to developing case-based attack scenarios and establishing defense strategies for cybersecurity exercise in ICS environment.

22. Design and Development Considerations of a Cyber Physical Testbed for Operational Technology Research and Education.

23. Efficient Cyberattack Detection Methods in Industrial Control Systems.

24. An Overview of the Security of Programmable Logic Controllers in Industrial Control Systems.

25. Meta learning-based few-shot intrusion detection for 5G-enabled industrial internet.

26. Edge Computing-Based Modular Control System for Industrial Environments.

27. A New Industrial Intrusion Detection Method Based on CNN-BiLSTM.

28. Data-Driven ICS Network Simulation for Synthetic Data Generation.

29. Mitigating Missing Rate and Early Cyberattack Discrimination Using Optimal Statistical Approach with Machine Learning Techniques in a Smart Grid.

30. Two-Phase Industrial Control System Anomaly Detection Using Communication Patterns and Deep Learning.

31. ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks.

32. A survey and characterization of Close Access Cyberspace Operations.

33. Generating ICS vulnerability playbooks with open standards.

34. Design and Implementation of Chopper Control System for HIAF.

35. Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques.

36. Advancing IoT Cybersecurity: Adaptive Threat Identification with Deep Learning in Cyber-Physical Systems.

37. An Industrial Control System for Cement Sulfates Content Using a Feedforward and Feedback Mechanism.

38. Security Assessment of Industrial Control System Applying Reinforcement Learning.

39. The Effect of Key Nodes on the Malware Dynamics in the Industrial Control Network.

40. Another approach to modeling of fuzzy drive control system based on vector-matrix description.

41. Main steps in the process of upgrade of existing systems for automation and control of industrial and manufacturing processes in order to fulfill the requirements of the concept "industry 4.0".

42. Deriving Exact Mathematical Models of Malware Based on Random Propagation.

43. Risk assessment for industrial control systems based on asymmetric connection cloud and Choquet integral.

44. Graph Attention Network and Informer for Multivariate Time Series Anomaly Detection.

45. SAKMR: Industrial control anomaly detection based on semi-supervised hybrid deep learning.

46. Strategies for Software and Hardware Compatibility Testing in Industrial Controllers.

47. APPLICATION OF IMPROVED PSO AND BP HYBRID OPTIMIZATION ALGORITHM IN ELECTRICAL AUTOMATION INTELLIGENT CONTROL SYSTEM.

48. ConGraph: Advanced Persistent Threat Detection Method Based on Provenance Graph Combined with Process Context in Cyber-Physical System Environment.

49. Industrial Control Systems Security Validation Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge Framework.

50. Bridging the Cybersecurity Gap: A Comprehensive Analysis of Threats to Power Systems, Water Storage, and Gas Network Industrial Control and Automation Systems.

Catalog

Books, media, physical & digital resources