Yang Li

Southwest Petroleum University

Copyright © 2022 by Cayley Nielson Press, Inc.

ISBN: 978-1-957274-00-3

Cayley Nielson Press Scholarly Monograph Series Book Code No.: 212-01-1






1.1 Introduction 1
1.2 Related Work 3
1.3 Formal Description of Factor State Space 5
1.3.1 Factor and Factor Space 5
1.3.2 Factors State Space Based on Object 6
1.3.3 Knowledge Factor Expression 6
1.3.4 Formal Description of Analysis Factor Neuron 8
1.3.5 Formal Description of Analog Factor Neuron 9
1.3.6 Formal Description of Combined Factor Neurons 10
1.4 Factor Neuron Network Model Based on Factor Space 11
1.4.1 Threshold Neuron Model Unrelated to Time 13
1.4.2 Linear Neuron Model Unrelated to Time 14
1.4.3 General Expression of Linear Neuron Model Unrelated to Time 14
1.5 Factor Neuron Model Based on Variable Weight 17
1.6 Architecture Model of Fnn-Based Scada Network Defence System 18
1.6.1 Logic Structure of FNN-based SCADA Network Defence System 18
1.6.2 Working Process 19
1.7 Simulation Experiment on Scada Network Attack and Defence 21
1.8 Conclusions 25
Chapter 2 A Supervisory Control and Data Acquisition Network Security Attack Recognition Method Based on Multi-Agent 26
2.1 Introduction 26
2.2 The Advantages of Multi Agent Systems in SCADA Network Security Defense 28
2.3 Multi-Agent Structure of SCADA Security Defense 29
2.3.1 Logic structure 29
2.3.2 Work flow of SCADA-IDS-AN 32
2.4 SCADA Network Attack Recognition Model Based on Data Mining 34
2.4.1 Neural network recognition model 34
2.4.2 Improved BP Algorithm 38
2.5 Simulation Experiment 42
2.5.1 Neural Network Structure 43
2.5.2 Experimental Results and Analysis 44
2.6 Conclusions 49
Chapter 3 A Security Architecture Model of Oil and Gas SCADA Network Based on Multi-Agent 50
3.1 Introduction 50
3.2 Related Works 52
3.3 SCADA network security defense architecture based on multi-Agent 54
3.3.1 Security defense formal description based on Multi-agent 54
3.4 Logic model of SCADA security overall framework 57
3.4.1 Structure model 57
3.4.2 Response method for multi-agent defense model 61
3.5 SCADA network security attack and defense simulation based on multi Agent 62
3.5.1 Attack simulation 63
3.5.2 Defense Simulation 66
3.6 Experimental Simulation Results 69
3.7 Conclusions 72
Chapter 4 A New Formal Description Model of Network Attacking and Defence Knowledge of Oil and Gas Field SCADA System 73
4.1 Introduction 73
4.2 Related Work 74
4.3 The Formal Description Model of SCADA Network Attacking and Defence Knowledge 75
4.3.1 Factors State Space Based on Object 75
4.3.2 SCADA Formal Description of Network Attack and Defense Factors Expression 76
4.3.3 Behavior of a Collection of Objects of Things Definition of Equivalence Class Partition 79
4.4 Attack and Defense Task Model 83
4.4.1 The knowledge model of network attacks 83
4.4.2 Experimental Verification 86
4.5 Conclusion 87
References 88



This book should be useful for students, scientists, engineers and professionals working in the areas of optoelectronic packaging, photonic devices, semiconductor technology, materials science, polymer science, electrical and electronics engineering. This book could be used for one semester course on adhesives for photonics packaging designed for both undergraduate and graduate engineering students.


Originality and Plagiarism

Prospective authors should note that only original and previously unpublished manuscripts will be considered. The authors should ensure that they have written entirely original works, and if the authors have used the work and/or words of others, that this has been appropriately cited or quoted. Furthermore, simultaneous submissions are not acceptable. Submission of a manuscript is interpreted as a statement of certification that no part of the manuscript is copyrighted by any other publication nor is under review by any other formal publication. It is the primary responsibility of the author to obtain proper permission for the use of any copyrighted materials in the manuscript, prior to the submission of the manuscript.