×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
清华大学 [6]
沈阳自动化研究所 [4]
兰州理工大学 [3]
北京航空航天大学 [3]
西安交通大学 [2]
厦门大学 [1]
更多...
内容类型
期刊论文 [11]
会议论文 [9]
学位论文 [1]
发表日期
2022 [1]
2021 [1]
2020 [3]
2019 [1]
2018 [4]
2015 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共21条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Survey of Industrial Control Systems Security
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 卷号: 59, 期号: 5, 页码: 1035-1053
作者:
Yang, Ting
;
Zhang, Jiayuan
;
Huang, Zaiqi
;
Chen, Yujie
;
Huang, Chenglong
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/08/09
Computer architecture
Control systems
Digital devices
Firmware
Industrial research
Industrial water treatment
Internet of things
Network architecture
Network security
Attack
Communications security
Control system security
Countermeasure
Digital technologies
Energy
Industrial control system security
Industrial control systems
Manufacturing industries
Security research
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:
Yu, Keping
;
Tan, Liang
;
Aloqaily, Moayad
;
Yang, Hekun
;
Jararweh, Yaser
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2021/12/01
Industrial Internet of Things
Smart manufacturing
Blockchain
Security
Access control
Encryption
Cloud computing
Big data
blockchain
data sharing
industrial Internet-of-Thing (IIoT)
smart factory
traceable and revocation
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
Authentication Technology in Industrial Control System Based on Identity Password
会议论文
Shenyang, China, July 27-29, 2020
作者:
Yang LY(杨路瑶)
;
Shang WL(尚文利)
;
Chen CY(陈春雨)
;
Wang TY(王天宇)
;
Liu ZB(刘周斌)
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/10/10
Industrial control security
digital signature
identity authentication
SSL/TLS handshake protocol
Security monitoring method for ICS based on information gain ratio and maximum entropy model
会议论文
Shanghai, China, November 6-8, 2020
作者:
Li SG(李声刚)
;
Shang WL(尚文利)
;
Chen CY(陈春雨)
;
Lu, Yan
;
Dong, Zhiwei
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2021/03/14
Industrial control system
Information gain ratio
Maximum entropy model
Security monitoring
The Security Assessment on Programmable Logic Controller based on Attack Tree Model and FAHP
会议论文
Shenyang, China, July 12, 2019 - July 14, 2019
作者:
Feng, Tao
;
Shi, Yanxia
;
Gong, Renbin
;
Zhao, Qianchuan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/15
Analytic hierarchy process
Computation theory
Computer circuits
Controllers
Data acquisition
Decision making
Forestry
Intelligent computing
Probability
Programmable logic controllers
Programmed control systems
Security of data
Attack tree
Fuzzy analytic hierarchy process
Industrial control systems
Programmable logic controllers (PLC)
Protective measures
Security attributes
Shapiro-Wilk tests
Supervisory control and data acquisition
Physical intrusion detection for industrial control system
会议论文
作者:
Liu, Pengfei
;
Liu, Ting
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/11/19
Communication signals
Industrial control systems
Intrusion detection method
Physical layers
RS485
RS485 communications
Security
Voltage signals
Physical Intrusion Detection for Industrial Control System
会议论文
作者:
Liu, Pengfei
;
Liu, Ting
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/11/26
Security
RS485
Industrial Control System
Physical Intrusion Detection
DiPot: A distributed industrial honeypot system
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10699 LNCS, 页码: 300-309
作者:
Cao, J.
;
Li, W.
;
Li, J.
;
Li, B.
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/30
Control systems
Embedded systems
Network security
Visualization
Advanced visualizations
Cyber-physical systems (CPS)
Distributed
Effectiveness and efficiencies
Honeypots
Industrial control systems
Industrial devices
Security situation
Intelligent control
Comprehensive security management system for Hadoop platforms
会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:
Shang, T.
;
Zhuang, H.
;
Liu, J.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Authentication
Big data
Cryptography
Data mining
Industrial management
Robotics
Authorization and access control
Big data platforms
Big data technologies
Management systems
Security management systems
Security protection
Security requirements
Security services
Network security
©版权所有 ©2017 CSpace - Powered by
CSpace