A computing data center that contains a set of physically isolatable units of computing resources for which a physical security exception action plan is to be provided. Upon determining that a security event has occurred for one or more physically isolatable units, the computing data center ...
Multimodal optical-materials are highly desirable due to their advantages in enhancing information security, though independent modulation is challenging. Here, the authors report a method using coloration and switchable fluorescence for information encryption. ...
methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems"... Q Zhu,T Basar - 《IEEE Control Systems》 被引量: 70发表: 2015年 A dynamic game-theoretic approach to resilient control system design ...
Geographically distributed datacenters enables Microsoft to be close to customers, to reduce network latency and allow for geo-redundant backup and failover. Physical security Microsoft designs, builds, and operates datacenters in a way that strictly controls physical access to the areas where your da...
The arc fault circuit interrupter (AFCI) is expected to be one of the most essential components in smart grid systems for providing physical security and safety against electrical fire hazards caused by arc faults. As AFCIs are widely deployed as a part of mandatory installation requirements, a ...
become more dependent on the internet of things (IoT) and edge computing, the need for digital and physical security grows. With IoT and edge computing providing industrial automation in manufacturing plants, remote offices and the field, a company's responsibility for physical security has expanded...
Five physical security layers of data center. As we can see in the diagram in Figure 10.6, each layer corresponds to a physical security zone. Physical protection means to protect every possible entry point for a data center. In other words, we should think about each entry gate and access...
A cloud computing based system for cyber security management The exponential increase of cyber security has led to an ever-increasing accumulation of big network data for cyber security applications. The big data ana... G Xu,Y Wei,Z Chen,... - 《Parallel Algorithms & Applications》 被引量:...
Traditional safety analysis methods, such as HAZOP, are ill-suited to assess these systems. Furthermore, cybersecurity vulnerabilities are often not considered critical, because their effects on the physical processes are not fully understood. In this work, we present STPA-SafeSec, a novel analysis...
Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilien... Critical infrastructures, such as power grids and transportation systems, are increasingly using open networks for operation. The use of open ...