Zobrazeno 1 - 10
of 104
pro vyhledávání: '"industrial control network"'
Publikováno v:
Gong-kuang zidonghua, Vol 50, Iss 3, Pp 14-21 (2024)
With the continuous construction and promotion of intelligent mining information infrastructure, the switching of mine terminal equipment between private and public networks has introduced information security risks to the mine network. It is necessa
Externí odkaz:
https://doaj.org/article/ba9bb64a80ac4c39ad55e19f6a02e2d1
Publikováno v:
IEEE Access, Vol 11, Pp 135449-135462 (2023)
To solve the problem of industrial control network (ICN) security situation prediction, this paper proposes a security situation prediction model for ICN based on evidential reasoning (ER) and belief rule base (BRB). First, this paper analyzes multip
Externí odkaz:
https://doaj.org/article/a6d72fbda902431a94a1102ca489baf9
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
网络与信息安全学报, Vol 8, Pp 169-175 (2022)
Computer viruses keep evolving with the development of society and progress of technologies, and they become more complex and hidden.The worm virus is the earliest computer virus, which has evolved to an industrial control worm virus and caused a gre
Externí odkaz:
https://doaj.org/article/ffd4675f1be74f51a648dce6e73b4424
Publikováno v:
网络与信息安全学报, Vol 7, Pp 31-43 (2021)
In order to solve the problem of high time-consuming and resource-consuming quantitative calculation of large-scale industrial control network attack graphs, a key path analysis method for large-scale industrial control networks was proposed.Firstly,
Externí odkaz:
https://doaj.org/article/4add30a5883f4d5c83f325eceb36baa0
Publikováno v:
Tongxin xuebao, Vol 42, Pp 10-22 (2021)
In view of the fact that the existing network fault detection algorithms cannot meet the four requirements of determination of detection time, low detection overhead, multi-point fault detection ability and topology adaptability of industrial control
Externí odkaz:
https://doaj.org/article/c0a0ee6670b0423ea351bd472335a811
Publikováno v:
Revista Română de Informatică și Automatică, Vol 31, Iss 3, Pp 39-49 (2021)
The security of industrial control systems is increasingly prominent, and the performance of intrusion detection classifiers depends more on hyper-parameters. This paper proposes an improved multiple population genetic algorithm (IMPGA) used to intel
Externí odkaz:
https://doaj.org/article/1a25ae34566f4c21a15d1b588bc37807
Publikováno v:
网络与信息安全学报, Vol 7, Iss 6, Pp 31-43 (2021)
In order to solve the problem of high time-consuming and resource-consuming quantitative calculation of large-scale industrial control network attack graphs, a key path analysis method for large-scale industrial control networks was proposed. Firstly
Externí odkaz:
https://doaj.org/article/122fc02e7c4943728b851a5e25d8825c
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Symmetry, Vol 14, Iss 2, p 237 (2022)
In the Internet of Things (IoT), many devices can communicate with each other directly through the Internet, and there are already good applications in transportation systems, smart meters, and smart home appliances. Wireless sensor networks are used
Externí odkaz:
https://doaj.org/article/1ed04f6d51a942e8a1aba5a652b7dc4f