001450193 000__ 04718cam\a2200565\a\4500 001450193 001__ 1450193 001450193 003__ OCoLC 001450193 005__ 20230310004513.0 001450193 006__ m\\\\\o\\d\\\\\\\\ 001450193 007__ cr\un\nnnunnun 001450193 008__ 221013s2022\\\\sz\\\\\\ob\\\\001\0\eng\d 001450193 020__ $$a9783031127113$$q(electronic bk.) 001450193 020__ $$a3031127110$$q(electronic bk.) 001450193 020__ $$z3031127102 001450193 020__ $$z9783031127106 001450193 0247_ $$a10.1007/978-3-031-12711-3$$2doi 001450193 035__ $$aSP(OCoLC)1347260852 001450193 040__ $$aYDX$$beng$$cYDX$$dGW5XE$$dN$T$$dOCLCF 001450193 049__ $$aISEA 001450193 050_4 $$aQA76.9.A25 001450193 08204 $$a005.8$$223/eng/20221020 001450193 1001_ $$aSmidts, Carol,$$eauthor. 001450193 24510 $$aCyber-security threats and response models in power plants/$$cCarol Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao, Linan Huang, Xiaoxu Diao, Rakibul Talukdar, Michael C. Pietrykowski. 001450193 260__ $$aCham, Switzerland :$$bSpringer,$$c2022. 001450193 300__ $$a1 online resource 001450193 4901_ $$aSpringerBriefs in Computer Science,$$x2191-5776 001450193 504__ $$aIncludes bibliographical references and index. 001450193 5050_ $$aIntroduction -- Probabilistic Risk Assessment: Nuclear Power Plants and Introduction to the Context of Cyber Security -- Machine Learning based Abnormal Event Detection and Classification -- Game-Theoretic Design of Response Systems -- Experimental Testbeds and Design of Experiments -- Conclusions. 001450193 506__ $$aAccess limited to authorized users. 001450193 520__ $$aThis SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well. A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well. This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide. 001450193 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed October 20, 2022). 001450193 650_0 $$aComputer security. 001450193 650_0 $$aNuclear power plants$$xSecurity measures. 001450193 655_0 $$aElectronic books. 001450193 7001_ $$aRay, Indrajit$$c(Computer scientist),$$eauthor. 001450193 7001_ $$aZhu, Quanyan,$$eauthor. 001450193 7001_ $$aVaddi, Pavan Kumar,$$eauthor. 001450193 7001_ $$aZhao, Yunfei,$$d1980-$$eauthor. 001450193 7001_ $$aHuang, Linan,$$eauthor. 001450193 7001_ $$aDiao, Xiaoxu,$$eauthor. 001450193 7001_ $$aTalukdar, Rakibul,$$eauthor. 001450193 7001_ $$aPietrykowski, Michael C.$$eauthor. 001450193 77608 $$iPrint version:$$z3031127102$$z9783031127106$$w(OCoLC)1333266304 001450193 830_0 $$aSpringerBriefs in computer science,$$x2191-5776 001450193 852__ $$bebk 001450193 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-12711-3$$zOnline Access$$91397441.1 001450193 909CO $$ooai:library.usi.edu:1450193$$pGLOBAL_SET 001450193 980__ $$aBIB 001450193 980__ $$aEBOOK 001450193 982__ $$aEbook 001450193 983__ $$aOnline 001450193 994__ $$a92$$bISE