Search scope:
排序: Display mode:
Muhammad Usman ALI, Shaukat Ali KHAN, Muhammad Yousaf ANWAR
Frontiers of Structural and Civil Engineering 2017, Volume 11, Issue 4, Pages 396-405 doi: 10.1007/s11709-017-0436-4
Keywords: Building Code of Pakistan earthquake engineering seismic effects vulnerability assessment of buildings vulnerability framework
Seismic vulnerability assessment of water supply network in Tianjin, China
Yanxi CHEN,Zhiguang NIU,Jiaqi BAI,Yufei WANG
Frontiers of Environmental Science & Engineering 2014, Volume 8, Issue 5, Pages 767-775 doi: 10.1007/s11783-014-0632-6
Keywords: water supply network seismic vulnerability assessment finite element fuzzy mathematics
Hazard and vulnerability evaluation of water distribution system in cases of contamination intrusion
Kunlun XIN, Tao TAO, Yong WANG, Suiqing LIU
Frontiers of Environmental Science & Engineering 2012, Volume 6, Issue 6, Pages 839-848 doi: 10.1007/s11783-012-0409-8
Keywords: water distribution network hazard vulnerability contaminant accident
Tiago Miguel FERREIRA, João ESTÊVÃO, Rui MAIO, Romeu VICENTE
Frontiers of Structural and Civil Engineering 2020, Volume 14, Issue 3, Pages 609-622 doi: 10.1007/s11709-020-0623-6
Keywords: Artificial Neural Networks seismic vulnerability masonry buildings damage estimation vulnerability curves
Chen Liqi
Strategic Study of CAE 2009, Volume 11, Issue 10, Pages 79-85
Keywords: carbon cycle variability and vulnerability Southern Ocean Arctic Ocean exploring engineering technology
Assessment of robustness of structures: Current state of research
Colin BRETT, Yong LU
Frontiers of Structural and Civil Engineering 2013, Volume 7, Issue 4, Pages 356-368 doi: 10.1007/s11709-013-0220-z
Keywords: structural robustness abnormal exposure vulnerability collapse consequence
Mahmood AHMAD, Xiao-Wei TANG, Jiang-Nan QIU, Feezan AHMAD, Wen-Jing GU
Frontiers of Structural and Civil Engineering 2020, Volume 14, Issue 6, Pages 1476-1491 doi: 10.1007/s11709-020-0670-z
Keywords: Bayesian belief network liquefaction-induced damage potential cone penetration test soil liquefaction structural learning and domain knowledge
Interpreting the vulnerability of power systems in cascading failures using multi-graph convolutional Research Article
Supaporn LONAPALAWONG, Changsheng CHEN, Can WANG, Wei CHEN
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 12, Pages 1848-1861 doi: 10.1631/FITEE.2200035
Keywords: Power systems Vulnerability Cascading failures Multi-graph convolutional networks Weighted line graph
Simplified seismic scenario analysis of existing masonry buildings accounting for local site effects
Frontiers of Structural and Civil Engineering 2024, Volume 18, Issue 2, Pages 309-318 doi: 10.1007/s11709-024-0982-5
Keywords: masonry buildings seismic vulnerability assessment cultural heritage local site effect
Sadegh REZAEI,Asskar Janalizadeh CHOOBBASTI
Frontiers of Structural and Civil Engineering 2014, Volume 8, Issue 3, Pages 292-307 doi: 10.1007/s11709-014-0256-8
Keywords: liquefaction microtremor vulnerability index artificial neural networks (ANN) microzonation
Seismic fragility assessment of revised MRT buildings considering typical construction changes
Rakesh DUMARU, Hugo RODRIGUES, Humberto VARUM
Frontiers of Structural and Civil Engineering 2020, Volume 14, Issue 1, Pages 241-266 doi: 10.1007/s11709-019-0560-4
Keywords: mid-rise buildings revised NBC 205: 2012 masonry infill walls configurations of infill walls vulnerability
CORMAND2: A Deception Attack Against Industrial Robots Article
Hongyi Pu,Liang He,Peng Cheng,Jiming Chen,Youxian Sun
Engineering 2024, Volume 32, Issue 1, Pages 186-201 doi: 10.1016/j.eng.2023.01.013
Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks, particularly with the dawn of the Industrial Internet-of-Things (IIoT). To gain a comprehensive understanding of these cyber risks, vulnerabilities of industrial robots were analyzed empirically, using more than three million communication packets collected with testbeds of two ABB IRB120 robots and five other robots from various Original Equipment Manufacturers (OEMs). This analysis, guided by the confidentiality–integrity–availability (CIA) triad, uncovers robot vulnerabilities in three dimensions: confidentiality, integrity, and availability. These vulnerabilities were used to design Covering Robot Manipulation via Data Deception (CORMAND2), an automated cyber–physical attack against industrial robots. CORMAND2 manipulates robot operation while deceiving the Supervisory Control and Data Acquisition (SCADA) system that the robot is operating normally by modifying the robot’s movement data and data deception. CORMAND2 and its capability of degrading the manufacturing was validated experimentally using the aforementioned seven robots from six different OEMs. CORMAND2 unveils the limitations of existing anomaly detection systems, more specifically the assumption of the authenticity of SCADA-received movement data, to which we propose mitigations for.
Keywords: Industrial robots Vulnerability analysis Deception attacks Defenses
SHM-based F-AHP bridge rating system with application to Tsing Ma Bridge
Qi LI, You-lin XU, Yue ZHENG, An-xin GUO, Kai-yuen WONG, Yong XIA
Frontiers of Structural and Civil Engineering 2011, Volume 5, Issue 4, Pages 465-478 doi: 10.1007/s11709-011-0135-5
Keywords: health monitoring (SHM) bridge rating method fuzzy based analytic hierarchy approach criticality and vulnerability
Efficient vulnerability detection based on an optimized rule-checking static analysis technique Article
Deng CHEN,Yan-duo ZHANG,Wei WEI,Shi-xun WANG,Ru-bing HUANG,Xiao-lin LI,Bin-bin QU,Sheng JIANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3, Pages 332-345 doi: 10.1631/FITEE.1500379
Keywords: Rule-based static analysis Software quality Software validation Performance improvement
Zhang Zhongwen,Wu Qiang,Fu Enjun,Fan Zhenli
Strategic Study of CAE 2011, Volume 13, Issue 11, Pages 94-101
Keywords: three maps method vulnerability index method water hazards of coal mine prevented measures of water
Title Author Date Type Operation
Application of BCP-2007 and UBC-97 in seismic vulnerability assessment of gravity designed RC buildings
Muhammad Usman ALI, Shaukat Ali KHAN, Muhammad Yousaf ANWAR
Journal Article
Seismic vulnerability assessment of water supply network in Tianjin, China
Yanxi CHEN,Zhiguang NIU,Jiaqi BAI,Yufei WANG
Journal Article
Hazard and vulnerability evaluation of water distribution system in cases of contamination intrusion
Kunlun XIN, Tao TAO, Yong WANG, Suiqing LIU
Journal Article
The use of Artificial Neural Networks to estimate seismic damage and derive vulnerability functions for
Tiago Miguel FERREIRA, João ESTÊVÃO, Rui MAIO, Romeu VICENTE
Journal Article
Variability and vulnerability of carbon pools in Southern Ocean and western Arctic Ocean and their exploratory
Chen Liqi
Journal Article
Assessment of robustness of structures: Current state of research
Colin BRETT, Yong LU
Journal Article
A step forward towards a comprehensive framework for assessing liquefaction land damage vulnerability
Mahmood AHMAD, Xiao-Wei TANG, Jiang-Nan QIU, Feezan AHMAD, Wen-Jing GU
Journal Article
Interpreting the vulnerability of power systems in cascading failures using multi-graph convolutional
Supaporn LONAPALAWONG, Changsheng CHEN, Can WANG, Wei CHEN
Journal Article
Simplified seismic scenario analysis of existing masonry buildings accounting for local site effects
Journal Article
Liquefaction assessment using microtremor measurement, conventional method and artificial neural network (Case study: Babol, Iran)
Sadegh REZAEI,Asskar Janalizadeh CHOOBBASTI
Journal Article
Seismic fragility assessment of revised MRT buildings considering typical construction changes
Rakesh DUMARU, Hugo RODRIGUES, Humberto VARUM
Journal Article
CORMAND2: A Deception Attack Against Industrial Robots
Hongyi Pu,Liang He,Peng Cheng,Jiming Chen,Youxian Sun
Journal Article
SHM-based F-AHP bridge rating system with application to Tsing Ma Bridge
Qi LI, You-lin XU, Yue ZHENG, An-xin GUO, Kai-yuen WONG, Yong XIA
Journal Article
Efficient vulnerability detection based on an optimized rule-checking static analysis technique
Deng CHEN,Yan-duo ZHANG,Wei WEI,Shi-xun WANG,Ru-bing HUANG,Xiao-lin LI,Bin-bin QU,Sheng JIANG
Journal Article