ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Survey based on Cyber Attacks in Closed Loop Control Systems

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.7, No. 3)

Publication Date:

Authors : ; ;

Page : 25-32

Keywords : Cyber attacks; cyber physical Systems; Wireless automation; secure control systems; DIDS; Networked control systems (NCS);

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In this paper, attacks caused in the shut circle control system is discussed. To keep the net-worked control systems safe, good, ready and hard to move, getting NCS from of the net attacks is very important. The marked power of thought attackers will not move after any made suggestion copies made to scale, they keep on changing their attack designs as if by chance and dynamically. Distributed go into discovery system (DIDS) is used to discover the of the net attacks in the shut circle control system. The end of this paper is to over-view different types of attacks that are taking place in the shut circle control systems. Different expert ways of art and so on, questions, discovery, putting a stop to of the net attacks in the control systems are high-lighted.

Other Latest Articles

Last modified: 2018-03-14 15:38:14