Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A classification of cybersecurity strategies in the context of discrete event systems
In recent years, cybersecurity has received increasing attention due to the demand from a
large class of networked systems for resilience against cyberattacks that may compromise …
large class of networked systems for resilience against cyberattacks that may compromise …
Current-state opacity enforcement in discrete event systems under incomparable observations
In this paper we tackle the opacity enforcement problem in discrete event systems using
supervisory control theory. In particular, we consider the case where the intruder and the …
supervisory control theory. In particular, we consider the case where the intruder and the …
Decidability of opacity verification problems in labeled Petri net systems
A system is said to be opaque if an intruder that observes its evolution through a mask
cannot infer that the system's evolution belongs to a given secret behavior. Opacity …
cannot infer that the system's evolution belongs to a given secret behavior. Opacity …
Stealthy attacks for partially-observed discrete event systems
The problem of stealthy attacks for partially-observed discrete event systems is considered.
An operator observes the plant through an observation mask that does not allow him to …
An operator observes the plant through an observation mask that does not allow him to …
Joint state estimation under attack of discrete event systems
The problem of state estimation in the setting of partially-observed discrete event systems
subject to cyber attacks is considered. An operator observes a plant through a natural …
subject to cyber attacks is considered. An operator observes a plant through a natural …
Synthesis of Opacity-Enforcing Supervisory Strategies Using Reinforcement Learning
H Zhang, L Huang, W Huang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In the control of discrete-event systems for current-state opacity enforcement, it is difficult to
synthesize a supervisor by supervisory control theory (SCT) without explicit formal models of …
synthesize a supervisor by supervisory control theory (SCT) without explicit formal models of …
[PDF][PDF] Opacity-enforcing for Process Algebras.
Supervisory control as a way how to guarantee security of processes is discussed and
studied. We work with a security property called processes opacity and we investigate how it …
studied. We work with a security property called processes opacity and we investigate how it …
[PDF][PDF] OPACITY-BASED DEFENSE FOR DETERMINISTIC FINITE AUTOMATA AGAINST PASSIVE AND ACTUATOR-ENABLEMENT ATTACKS
In our rapidly evolving technological landscape, safeguarding systems against cyber threats
is imperative. This dissertation, part of the Master's program in Informatics Security, focuses …
is imperative. This dissertation, part of the Master's program in Informatics Security, focuses …
Security Enforcing
DP Gruska - … and Programming: Revised Selected Papers from the …, 2023 - Springer
Formal definitions of state-based and language-based security with respect to timing attacks
are proposed and studied. Then various ways how to secure systems with respect to such …
are proposed and studied. Then various ways how to secure systems with respect to such …
Contribution to the analysis of Discrete Event Systems
H Marchand - 2017 - inria.hal.science
Since the 90's, automatic systems take a growing place into our everyday lives. It might be
embedded systems, such as in robotic, automotive or avionic systems, telecommunication or …
embedded systems, such as in robotic, automotive or avionic systems, telecommunication or …