• Aucun résultat trouvé

Cyber Security of the Railway wireless system: detection, decision and Human-in-the-Loop

N/A
N/A
Protected

Academic year: 2021

Partager "Cyber Security of the Railway wireless system: detection, decision and Human-in-the-Loop"

Copied!
11
0
0

Texte intégral

Loading

Figure

Fig. 2 Time-frequency representation of a jamming signal
Fig. 4 Required value of the ISR to interrupt the communication, as a function of the SP
Fig. 6 Cumulative curve of retransmitted frames
Fig. 7 Proposed architecture for attack identification from different signals and data
+3

Références

Documents relatifs

However, this research relies on a large dataset of labelled P&ID symbols[5], so applying this rich library of techniques to EWDs requires either a manually intensive amount

This suggests that the clock does not operate on the various stages of information processing which were sensitive to the factors we used nor were any of the three way

 The sge_job_usage table contains information about the resource usage made by a job, including its beginning and end date, the number of cores on which the job has been executed,

Bioelectronic sen- sor mimicking the human neuroendocrine system for the detection of hypothalamic-pituitary-adrenal axis hormones in human blood... Bioelectronic sensor mimicking

Hence, human-automation symbiosis by means of H-CPS and AA aims to take into account established principles of the design of operator-friendly working conditions [34] for aiding

This is even more problematic for actual tower cranes, as crane operators in their cabin are attached to the crane, and need to feel immediate response to a sudden change in

• The study incorporates the driving behaviour model, the wheelchair model and a feedback controller in a closed-loop system, to adapt the control of the wheelchair to the

1) It starts elaborating a list of threats and building related scenarios (ie. an external entity takes the control of the train, or of certain devices or the control of signals).