The study on the risk response of security cyber physical system (focusing on analysis of security access log and unstructured data)

0Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.

Abstract

Malicious hacking is evolving continuously malicious code attacks. It needs flexible solutions such as the prevention leakage of personal information, demanding the ability of institutions to prevent high level of infringement. But, typical simple's security control system is limited by responding only to the tertiary industry equipment in the ICT field. A CPS type security system is capable of responding to the transition from ICT to AI which is should be applied. This is time of reorganization from the current security domain to the artificial intelligent ICBM device, it should apply the digital twin model which we are considering the people and environment of CPS type system. In this paper, we have studied a model of how cyber - physical systems can be implemented using existing security system platform technology. We also propose a new security technology applying model through analyzing log form of security equipment that has occurred for many years.

Cite

CITATION STYLE

APA

Kang, J. M., Yoon, C. H., & Kwon, T. H. (2018). The study on the risk response of security cyber physical system (focusing on analysis of security access log and unstructured data). International Journal of Engineering and Technology(UAE), 7(3), 165–167. https://doi.org/10.14419/ijet.v7i3.33.18600

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free