Showing 1 - 5 results of 5 for search '"triple redundancy"', query time: 0.07s Refine Results
  1. 1
  2. 2

    Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints by Ruyun ZHANG, Heyuan LI, Shunbin LI

    Published 2021-03-01
    “…Cyberspace mimic defense technology is an effective method to deal with backdoor attacks on unknown vulnerabilities in information systems.Its security is closely related to the number and the heterogeneity of the executors and the scheduling strategy.However, in the field of industrial control, the ecological resources of industrial application are relatively closed, and the number of realizable heterogeneous executors is limited.To solve the above problems, a mimic scheduling algorithm for industrial control under the constraints of limited heterogeneous resources was proposed.The experimental results show that the proposed algorithm for triple-redundancy mimic industrial control system was able to select a suitable executor to go online according to environmental characteristics adaptively.Even in a high-intensity attack environment, it can still maintain a high availability probability of 99.24%.…”
    Get full text
    Article
  3. 3

    Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints by Ruyun ZHANG, Heyuan LI, Shunbin LI

    Published 2021-03-01
    “…Cyberspace mimic defense technology is an effective method to deal with backdoor attacks on unknown vulnerabilities in information systems.Its security is closely related to the number and the heterogeneity of the executors and the scheduling strategy.However, in the field of industrial control, the ecological resources of industrial application are relatively closed, and the number of realizable heterogeneous executors is limited.To solve the above problems, a mimic scheduling algorithm for industrial control under the constraints of limited heterogeneous resources was proposed.The experimental results show that the proposed algorithm for triple-redundancy mimic industrial control system was able to select a suitable executor to go online according to environmental characteristics adaptively.Even in a high-intensity attack environment, it can still maintain a high availability probability of 99.24%.…”
    Get full text
    Article
  4. 4

    Basic principals of the tiltrotors flight control system architecture and algorithms by M. I. Myasnikov, I. R. Ilyin

    Published 2024-11-01
    “…Examples of the main control system architecture with triple redundancy for V-22 and AW609 convertiplanes are given. …”
    Get full text
    Article
  5. 5

    FRESH: Fully Reliable and Effective Protection Against Soft and Hard Errors by Daehoon Son, Hwisoo So, Jinhyo Jung, Yohan Ko, Aviral Shrivastava, Kyoungwoo Lee

    Published 2025-01-01
    “…First, a baseline software-level triple redundant multithreading (STRMT) scheme was implemented to serve as a baseline, pinpointing the ineffectiveness of the naïve STRMT, which makes the application even more vulnerable than the unprotected version due to the runtime overhead. …”
    Get full text
    Article