Pub Date : 2012-09-24DOI: 10.1109/ISRCS.2012.6309301
H. Garcia, Wen-Chiao Lin, S. Meerkov
An architecture and supporting methods are presented for the implementation of a resilient condition assessment monitoring system that can adaptively accommodate both cyber and physical anomalies to a monitored system under observation. In particular, the architecture includes three layers: information, assessment, and sensor selection. The information layer estimates probability distributions of process variables based on sensor measurements and assessments of the quality of sensor data. Based on these estimates, the assessment layer then employs probabilistic reasoning methods to assess the plant health. The sensor selection layer selects sensors so that assessments of the plant condition can be made within desired time periods. Resilient features of the developed system are then illustrated by simulations of a simplified power plant model, where a large portion of the sensors are under attack.
{"title":"A resilient condition assessment monitoring system","authors":"H. Garcia, Wen-Chiao Lin, S. Meerkov","doi":"10.1109/ISRCS.2012.6309301","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309301","url":null,"abstract":"An architecture and supporting methods are presented for the implementation of a resilient condition assessment monitoring system that can adaptively accommodate both cyber and physical anomalies to a monitored system under observation. In particular, the architecture includes three layers: information, assessment, and sensor selection. The information layer estimates probability distributions of process variables based on sensor measurements and assessments of the quality of sensor data. Based on these estimates, the assessment layer then employs probabilistic reasoning methods to assess the plant health. The sensor selection layer selects sensors so that assessments of the plant condition can be made within desired time periods. Resilient features of the developed system are then illustrated by simulations of a simplified power plant model, where a large portion of the sensors are under attack.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124647302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/ISRCS.2012.6309308
Craig Rieger, K. Villez
In an increasingly connected world, critical infrastructure systems suffer from two types of vulnerability. The first is the traditionally recognized problem of monitoring the systems for faults and failures, recognizing and analyzing data, and responding with real understanding to the problems of the system. Increasingly complex systems create the opportunity for single points of failure to cascade when inaccurate assessment of system health increases response time or leads to faulty analysis of the problems involved. A second problem involves vulnerability to cyber intrusion, in which malignant actors can mask system degradation or present false data about system status. A resilient system will protect stability, efficiency, and security. To ensure these three states, the system must react to changing conditions within the system with coordination: no one component of the system can be allowed to react to problems without real consideration of the effects of that action on other components within the system. Systems with multi-agent design typically have three layers of action, a management layer, a coordination layer, and an execution layer. A resilient multi-agent system will emphasize functions of the execution layer, which has the responsibility of initiating actions, monitoring, analyzing, and controlling its own processes, while feeding information back to the higher levels of management and coordination. The design concept of a resilient control system execution agent (ReCoSEA) grows out of these underpinnings, and through the use of computational intelligence techniques, this paper suggests an associated design methodology.
{"title":"Resilient control system execution agent (ReCoSEA)","authors":"Craig Rieger, K. Villez","doi":"10.1109/ISRCS.2012.6309308","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309308","url":null,"abstract":"In an increasingly connected world, critical infrastructure systems suffer from two types of vulnerability. The first is the traditionally recognized problem of monitoring the systems for faults and failures, recognizing and analyzing data, and responding with real understanding to the problems of the system. Increasingly complex systems create the opportunity for single points of failure to cascade when inaccurate assessment of system health increases response time or leads to faulty analysis of the problems involved. A second problem involves vulnerability to cyber intrusion, in which malignant actors can mask system degradation or present false data about system status. A resilient system will protect stability, efficiency, and security. To ensure these three states, the system must react to changing conditions within the system with coordination: no one component of the system can be allowed to react to problems without real consideration of the effects of that action on other components within the system. Systems with multi-agent design typically have three layers of action, a management layer, a coordination layer, and an execution layer. A resilient multi-agent system will emphasize functions of the execution layer, which has the responsibility of initiating actions, monitoring, analyzing, and controlling its own processes, while feeding information back to the higher levels of management and coordination. The design concept of a resilient control system execution agent (ReCoSEA) grows out of these underpinnings, and through the use of computational intelligence techniques, this paper suggests an associated design methodology.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133279029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/ISRCS.2012.6309303
Salvatore Giorgi, F. Saleheen, F. Ferrese, Chang-Hee Won
In this paper, an Adaptive Neural Control (ANC) architecture is used for system replication and control within a Resilient Control framework. A dynamic model is chosen for our plant and a “maliciously attacked” plant. A Model Reference Adaptive Control (MRAC) architecture is used to replicate and control the plant to match an ideal reference system. At certain time, we replicate a malicious attack by changing plant parameters, injecting false data, or altering sensor data. This attacked plant is then replicated and controlled to match the reference system. Simulations were carried out to show that accurate system replication and resilient control is possible using adaptive neural networks.
{"title":"Adaptive Neural replication and resilient control despite malicious attacks","authors":"Salvatore Giorgi, F. Saleheen, F. Ferrese, Chang-Hee Won","doi":"10.1109/ISRCS.2012.6309303","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309303","url":null,"abstract":"In this paper, an Adaptive Neural Control (ANC) architecture is used for system replication and control within a Resilient Control framework. A dynamic model is chosen for our plant and a “maliciously attacked” plant. A Model Reference Adaptive Control (MRAC) architecture is used to replicate and control the plant to match an ideal reference system. At certain time, we replicate a malicious attack by changing plant parameters, injecting false data, or altering sensor data. This attacked plant is then replicated and controlled to match the reference system. Simulations were carried out to show that accurate system replication and resilient control is possible using adaptive neural networks.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122879819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/ISRCS.2012.6309314
A. Mohan, H. Khurana
Smart grid standards initiatives aim to coordinate the development of protocols and model standards for interoperability. The smart grid derives its functionality from several existing technologies and standards. At issue is that most of these base standards were developed for specific functionality and security was added later. As such, most standards do not have a unified and comprehensive approach to security, which results in security gaps in these standards. In this paper, we investigate common security issues in smart grid standards that employ communication protocols and the common causes for these issues. We then propose security considerations for developing these standards; to address them, we develop guidelines for drafting security into smart grid standards either when they are updated or when new standards are developed. We draw examples from the ZigBee Smart Energy Profile standard for security requirements, objectives, and to make recommendations for designing security in similar standards. We finally present a retrospective discussion of how following our recommendations would have improved the ZigBee Smart Energy Profile standard by including security in a unified and comprehensive way.
{"title":"Towards addressing common security issues in smart grid specifications","authors":"A. Mohan, H. Khurana","doi":"10.1109/ISRCS.2012.6309314","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309314","url":null,"abstract":"Smart grid standards initiatives aim to coordinate the development of protocols and model standards for interoperability. The smart grid derives its functionality from several existing technologies and standards. At issue is that most of these base standards were developed for specific functionality and security was added later. As such, most standards do not have a unified and comprehensive approach to security, which results in security gaps in these standards. In this paper, we investigate common security issues in smart grid standards that employ communication protocols and the common causes for these issues. We then propose security considerations for developing these standards; to address them, we develop guidelines for drafting security into smart grid standards either when they are updated or when new standards are developed. We draw examples from the ZigBee Smart Energy Profile standard for security requirements, objectives, and to make recommendations for designing security in similar standards. We finally present a retrospective discussion of how following our recommendations would have improved the ZigBee Smart Energy Profile standard by including security in a unified and comprehensive way.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131623554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/ISRCS.2012.6309286
B. Stark, C. Coopmans, Y. Chen
The human factors involved in an unmanned aerial system (UAS) come in a variety of forms that has largely gone poorly represented in literature. In this paper, a holistic approach is taken to identify not only the individual aspects but the interconnection of the human-UAS interaction. First, an examination of human factors involved in a UAS are presented. Next, the metrics of human performance, such as cognitive load, situational awareness and complacency are introduced. Finally, a framework is developed to form the interconnection of human factors with human performance metrics in a UAS. With this framework in place, the intended goal is that an optimal level of cognitive workload for the humans involved in an UAS can be designed and implemented by the utilization of this framework during the development of advanced automation systems and human interface devices.
{"title":"A framework for analyzing human factors in unmanned aerial systems","authors":"B. Stark, C. Coopmans, Y. Chen","doi":"10.1109/ISRCS.2012.6309286","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309286","url":null,"abstract":"The human factors involved in an unmanned aerial system (UAS) come in a variety of forms that has largely gone poorly represented in literature. In this paper, a holistic approach is taken to identify not only the individual aspects but the interconnection of the human-UAS interaction. First, an examination of human factors involved in a UAS are presented. Next, the metrics of human performance, such as cognitive load, situational awareness and complacency are introduced. Finally, a framework is developed to form the interconnection of human factors with human performance metrics in a UAS. With this framework in place, the intended goal is that an optimal level of cognitive workload for the humans involved in an UAS can be designed and implemented by the utilization of this framework during the development of advanced automation systems and human interface devices.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117312868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/ISRCS.2012.6309287
D. Gertman
Although the argument has been made quite strongly and perhaps convincingly that advanced, highly automated control rooms consisting of advanced digital information and control systems will be simpler to operate and maintain; the case can be made that this potential benefit will only be true to the extent that we successfully control the amount of complexity present for the operating crew. Borrowing from complexity theory and human reliability analysis literature, we review the aspects of complexity that should be considered, discuss the implications, and review the extent to which we find current human reliability analysis (HRA) methods sensitivity to complexity in advanced digital environments. Next, we identify 3 complexity factors related to human performance and propose a rating scale approach that allows the analyst to more clearly allocate complexity levels for HRA purposes. These factor scores are used to form the basis of a composite complexity score (CCS) that can be used to support HRA. Although one method, the Simplified Plant Analysis Risk Model Human Reliability Analysis (SPAR-H), is selected for purposes of mapping the 3 complexity elements, the results are thought to support the qualitative and quantitative portions of most HRA methods.
{"title":"Complexity: Application to human performance modeling and HRA for dynamic environments","authors":"D. Gertman","doi":"10.1109/ISRCS.2012.6309287","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309287","url":null,"abstract":"Although the argument has been made quite strongly and perhaps convincingly that advanced, highly automated control rooms consisting of advanced digital information and control systems will be simpler to operate and maintain; the case can be made that this potential benefit will only be true to the extent that we successfully control the amount of complexity present for the operating crew. Borrowing from complexity theory and human reliability analysis literature, we review the aspects of complexity that should be considered, discuss the implications, and review the extent to which we find current human reliability analysis (HRA) methods sensitivity to complexity in advanced digital environments. Next, we identify 3 complexity factors related to human performance and propose a rating scale approach that allows the analyst to more clearly allocate complexity levels for HRA purposes. These factor scores are used to form the basis of a composite complexity score (CCS) that can be used to support HRA. Although one method, the Simplified Plant Analysis Risk Model Human Reliability Analysis (SPAR-H), is selected for purposes of mapping the 3 complexity elements, the results are thought to support the qualitative and quantitative portions of most HRA methods.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131192335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/ISRCS.2012.6309285
J. Blythe
We describe an agent-based model of individual human behavior that combines a dual-process architecture with reactive planning and mental models in order to capture a wide range of human behavior, including both behavioral and conceptual errors. Human operator behavior is an important factor in resilient control of systems that has received relatively little attention. Models of human behavior and decision making are needed in order to test existing control systems under a range of conditions or analyze possible new approaches. While the model we describe has been developed and applied in the area of cyber security, it is relevant to a wide range of resilient control systems that include human operation. We discuss an application to modeling operator behavior in a nuclear power plant.
{"title":"A dual-process cognitive model for testing resilient control systems","authors":"J. Blythe","doi":"10.1109/ISRCS.2012.6309285","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309285","url":null,"abstract":"We describe an agent-based model of individual human behavior that combines a dual-process architecture with reactive planning and mental models in order to capture a wide range of human behavior, including both behavioral and conceptual errors. Human operator behavior is an important factor in resilient control of systems that has received relatively little attention. Models of human behavior and decision making are needed in order to test existing control systems under a range of conditions or analyze possible new approaches. While the model we describe has been developed and applied in the area of cyber security, it is relevant to a wide range of resilient control systems that include human operation. We discuss an application to modeling operator behavior in a nuclear power plant.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123241254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/ISRCS.2012.6309317
Anthony L. Crawford
Natural movements and force feedback are important elements in using teleoperated equipment if complex and speedy manipulation tasks are to be accomplished in remote and/or hazardous environments, such as hot cells, glove boxes, decommissioning, explosive disarmament, and space to name a few. In order to achieve this end the research presented in this paper has developed an admittance-type exoskeleton like multi-fingered haptic hand user interface that secures the user's palm and provides 3-dimensional force feedback to the user's fingertips. Atypical to conventional haptic hand user interfaces that limit themselves to integrating the human hand's characteristics just into the system's mechanical design, this system also perpetuates that inspiration into the designed user interface's controller. This is achieved by manifesting the property differences of manipulation and grasping activities as they pertain to the resilient human hand into a nonlinear master-slave force relationship. The results presented in this paper show that the admittance-type system has sufficient bandwidth such that it appears nearly transparent to the user when in free motion. Also, when executing a manipulation or grasping task, increased performance is achieved using the nonlinear force relationship compared to the traditional linear scaling techniques implemented in the vast majority of systems.
{"title":"Force control and nonlinear master-slave force profile to manage an admittance type multi-fingered haptic user interface","authors":"Anthony L. Crawford","doi":"10.1109/ISRCS.2012.6309317","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309317","url":null,"abstract":"Natural movements and force feedback are important elements in using teleoperated equipment if complex and speedy manipulation tasks are to be accomplished in remote and/or hazardous environments, such as hot cells, glove boxes, decommissioning, explosive disarmament, and space to name a few. In order to achieve this end the research presented in this paper has developed an admittance-type exoskeleton like multi-fingered haptic hand user interface that secures the user's palm and provides 3-dimensional force feedback to the user's fingertips. Atypical to conventional haptic hand user interfaces that limit themselves to integrating the human hand's characteristics just into the system's mechanical design, this system also perpetuates that inspiration into the designed user interface's controller. This is achieved by manifesting the property differences of manipulation and grasping activities as they pertain to the resilient human hand into a nonlinear master-slave force relationship. The results presented in this paper show that the admittance-type system has sufficient bandwidth such that it appears nearly transparent to the user when in free motion. Also, when executing a manipulation or grasping task, increased performance is achieved using the nonlinear force relationship compared to the traditional linear scaling techniques implemented in the vast majority of systems.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133422049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/ISRCS.2012.6309310
M. Balchanos, Yongchang Li, D. Mavris
System survivability is one of the key requirements for the conceptual design of an Integrated Reconfigurable Intelligent (IRIS) system. Current approaches in survivability engineering may not effectively address the challenges in designing revolutionary, large scale complex and multi-capable systems. The main objective of this study is to investigate the concept of resilience in the context of system safety and survivability and suggest a technique for assessing resilience in systems engineering. Resilience is expected to be the enabler for integrating safety and survivability in the early conceptual design. For this purpose, a small scale cooling network system architecture has been utilized to demonstrate the technique, both for a 32-valve baseline, as well as for six other configurations. The application of the technique allowed for the comparative assessment and tradeoff investigation of resilience function capacities, as well for the identification of solution feasibility, under adaptability and robustness constraints.
{"title":"Towards a method for assessing resilience of complex dynamical systems","authors":"M. Balchanos, Yongchang Li, D. Mavris","doi":"10.1109/ISRCS.2012.6309310","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309310","url":null,"abstract":"System survivability is one of the key requirements for the conceptual design of an Integrated Reconfigurable Intelligent (IRIS) system. Current approaches in survivability engineering may not effectively address the challenges in designing revolutionary, large scale complex and multi-capable systems. The main objective of this study is to investigate the concept of resilience in the context of system safety and survivability and suggest a technique for assessing resilience in systems engineering. Resilience is expected to be the enabler for integrating safety and survivability in the early conceptual design. For this purpose, a small scale cooling network system architecture has been utilized to demonstrate the technique, both for a 32-valve baseline, as well as for six other configurations. The application of the technique allowed for the comparative assessment and tradeoff investigation of resilience function capacities, as well for the identification of solution feasibility, under adaptability and robustness constraints.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131370830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/ISRCS.2012.6309288
B. Caldwell, J. Onken
This paper describes a recently completed project to develop a human factors informed simulation of team-based expert coordination and knowledge sharing tasks in a complex and resilient control system. The project explores processes of anomaly response in NASA spaceflight mission control teams, using as a baseline example the mission profile and anomalies experienced during the final Space Shuttle flight, STS-135. While controllers in this simulation work to detect and resolve anomalies using technical decision criteria, their performance is subject to stochastic and non-rational dynamics of information availability and flow affecting situation awareness and hypothesis generation. The initial goal of this work is to assist in analysis of alternatives for future mission control room designs, and to develop increased simulation capability in the area of distributed expertise and problem solving in teams.
{"title":"Simulation and human factors in modeling of spaceflight mission control teams","authors":"B. Caldwell, J. Onken","doi":"10.1109/ISRCS.2012.6309288","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309288","url":null,"abstract":"This paper describes a recently completed project to develop a human factors informed simulation of team-based expert coordination and knowledge sharing tasks in a complex and resilient control system. The project explores processes of anomaly response in NASA spaceflight mission control teams, using as a baseline example the mission profile and anomalies experienced during the final Space Shuttle flight, STS-135. While controllers in this simulation work to detect and resolve anomalies using technical decision criteria, their performance is subject to stochastic and non-rational dynamics of information availability and flow affecting situation awareness and hypothesis generation. The initial goal of this work is to assist in analysis of alternatives for future mission control room designs, and to develop increased simulation capability in the area of distributed expertise and problem solving in teams.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115841615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}