LARGE-SCALE, TIME-SENSITIVE SECURE DISTRIBUTED CONTROL SYSTEMS AND METHODS
First Claim
Patent Images
1. A method comprising:
- detecting an anomaly at a module among a plurality of modules in a network;
adjusting a reputation level of the module associated with the detected anomaly; and
controlling interaction of the module associated with the detected anomaly within the network based on the adjusted reputation level.
2 Assignments
0 Petitions
Accused Products
Abstract
Large-scale, time-sensitive secure distributed control systems and methods are disclosed. According to an aspect, a method includes detecting an anomaly at a module among a plurality of modules in a network. The method also includes adjusting a reputation level of the module associated with the detected anomaly. Further, the method includes controlling interaction of the module associated with the detected anomaly within the network based on the adjusted reputation level.
10 Citations
20 Claims
-
1. A method comprising:
-
detecting an anomaly at a module among a plurality of modules in a network; adjusting a reputation level of the module associated with the detected anomaly; and controlling interaction of the module associated with the detected anomaly within the network based on the adjusted reputation level. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
at least a processor and memory configured to; detect an anomaly at a module among a plurality of modules in a network; adjust a reputation level of the module associated with the detected anomaly; and control interaction of the module associated with the detected anomaly within the network based on the adjusted reputation level. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions readable by a computing device to cause the computing device to:
-
detect, by the computing device, an anomaly at a module among a plurality of modules in a network; adjust, by the computing device, a reputation level of the module associated with the detected anomaly; and control, by the computing device, interaction of the module associated with the detected anomaly within the network based on the adjusted reputation level. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification