- Full text PDF available (7)
- This year (1)
- Last 5 years (4)
- Last 10 years (8)
Journals and Conferences
Modern industrial communication networks are increasingly based on open protocols and platforms that are also used in the office IT and Internet environment. This reuse facilitates development and… (More)
X ML schemas convey the data syntax and semantics for various application domains, such as business-to-business transactions, medical records, and production status reports. However , these schemas… (More)
Over the past few years, IT security has become a dominant topic in the process control domain. The authors outline what they see as the core challenges, how industry is responding to them, and what… (More)
Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk of electronic attacks… (More)
When security incidents occur, several challenges exist for conducting an effective forensic investigation of SCADA systems, which run 24/7 to control and monitor industrial and infrastructure… (More)
Information system security for industrial plants is a topic of increasing importance. Effective and cost-efficient security solutions require some kind of industry consensus or standardization. This… (More)
Petri nets are an established and well researched means for systems modeling and simulation, but its use in the engineering community is not as widespread as the applicability of the formalism would… (More)
Seeking to improve information integration throughout the manufacturing process.
Based on the corresponding publications, a survey of tools for the evaluation of the timing behavior of real-time systems is presented. Both analytical and simulation-based tools are surveyed.
Embedded devices are today important elements of critical infrastructures like networking, telecommunications, electric/gas/water utility automation, and industrial automation. Access to these… (More)