System and method for protecting technical systems from cyber attacks
A technical system and control system technology, applied in the direction of transmission system, knowledge-based computer system, instrument, etc., can solve the problem of not allowing monitoring and control
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] Exemplary aspects are described herein in the context of systems, methods and computer program products for protecting technical systems (TS) from cyber-attacks. Those skilled in the art will appreciate that the following description is illustrative only and is not intended to be limiting in any way. Other aspects will suggest to those skilled in the art with knowledge of the invention. Reference will now be made in detail to embodiments of exemplary aspects as shown in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings and the following description to refer to the same or like items.
[0028] A number of definitions and concepts will then be introduced, which will be used to describe various exemplary aspects of the disclosed systems and methods.
[0029] An object of control is a technical object against which an external action (control and / or disturbance) is directed to change its state, in one exemplary a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com