×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [6]
沈阳自动化研究所 [5]
软件研究所 [5]
厦门大学 [2]
兰州理工大学 [2]
北京航空航天大学 [1]
更多...
内容类型
期刊论文 [12]
会议论文 [5]
其他 [4]
学位论文 [4]
发表日期
2022 [1]
2021 [1]
2020 [2]
2019 [3]
2018 [2]
2017 [1]
更多...
学科主题
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共25条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Detection Methods in Smart Meters for Electricity Thefts: A Survey
期刊论文
PROCEEDINGS OF THE IEEE, 2022, 页码: 1-47
作者:
Xia XF(夏小芳)
;
Xiao Y(肖杨)
;
Liang W(梁炜)
;
Cui JT(崔江涛)
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/02/04
Power systems
Companies
Meters
Smart grids
Meter reading
Electric variables measurement
Distribution networks
Binary trees
cyber-physical systems
detection methods
electricity theft
Internet of Things (IoT)
machine learning
measurement mismatch
security
smart grid
smart meters
Characteristic Insights on Industrial Cyber Security and Popular Defense Mechanisms
期刊论文
CHINA COMMUNICATIONS, 2021, 卷号: 18, 期号: 1, 页码: 130-150
作者:
Wan M(万明)
;
Li JW(李嘉玮)
;
Liu Y(刘颖)
;
Zhao JM(赵剑明)
;
Wang, Jiushuang
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2021/03/14
industrial cyber threats
industrial characteristics
vulnerabilities
security mechanisms and viewpoints
内部人员异常行为检测分析及在金融领域的应用
学位论文
博士, 北京: 中国科学院大学, 2020
作者:
刘堃
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2021/01/05
内部威胁
规范建模
行为挖掘
异常检测
复杂事件
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
Context aware intrusion detection for building automation systems
期刊论文
COMPUTERS & SECURITY, 2019, 卷号: 85, 页码: 181-201
作者:
Pan, Zhiwen
;
Hariri, Salim
;
Pacheco, Jesus
收藏
  |  
浏览/下载:64/0
  |  
提交时间:2019/12/10
Internet of Things
Network security
Context awareness
Supervised learning
Data mining
Intrusion detection
Malicious code detection based on CNNs and multi-objective algorithm
期刊论文
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 卷号: 129, 页码: 50-58
作者:
Cui, Zhihua
;
Du, Lei
;
Wang, Penghong
;
Cai, Xingjuan
;
Zhang, Wensheng
收藏
  |  
浏览/下载:59/0
  |  
提交时间:2019/07/11
Malicious code
Deep learning
CNN
Imbalance data
NSGA-II
Inferring Patterns for Taint-Style Vulnerabilities With Security Patches
期刊论文
IEEE ACCESS, 2019, 卷号: Vol.7, 页码: 52339-52349
作者:
Song, T.a
;
Li, X.a
;
Feng, Z.b
;
Xu, G.a
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/21
Code change
static analysis
vulnerability detection
Coded grouping-based inspection algorithms to detect malicious meters in neighborhood area smart grid
期刊论文
Computers and Security, 2018, 卷号: 77, 页码: 547-564
作者:
Zheng M(郑萌)
;
Liang W(梁炜)
;
Xiao Y(肖杨)
;
Xia XF(夏小芳)
;
Fu XY(付兴银)
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2018/06/17
Smart grid
Malicious meter inspection
Theft of electricity
Grouping
Intrusion detection
Security
A novel security validation in embedded system
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS
作者:
Wang, X.
;
Xu, B.
;
Wang, W.
;
Li, L.
;
Du, P.
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/30
Hardware
Hardware security
Intrusion detection
Program compilers
execution behavior
Experimental analysis
Hardware-assisted
Memory access validations
Performance penalties
Response mechanisms
secure tag
Software vulnerabilities
Embedded systems
Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 卷号: 12, 期号: 12, 页码: 3011-3023
作者:
Shang WL(尚文利)
;
Zeng P(曾鹏)
;
Wan M(万明)
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2017/10/09
Function control behavior
process data behavior
one-class classification
networked control systems
©版权所有 ©2017 CSpace - Powered by
CSpace