×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [21]
内容类型
期刊论文 [13]
会议论文 [8]
发表日期
2022 [3]
2021 [3]
2020 [2]
2019 [4]
2018 [1]
2016 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共21条,第1-10条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Research on cyber-physical system control strategy under false data injection attack perception
期刊论文
TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2022
作者:
Wang, Zhiwen
;
Zhang, Bin
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/03/01
Cyber-physical system
false data injection attacks
model predictive switching control
binary attack detector
Research on co-design of dual security control and communication for nonlinear CPS with actuator fault and FDI attacks
期刊论文
Measurement and Control (United Kingdom), 2022
作者:
Zhao, Li
;
Li, Wei
;
Li, YaJie
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2022/09/22
Actuators
Cyber Physical System
Cybersecurity
Delay control systems
Design
Embedded systems
Network security
Active fault
Active fault-tolerance
Active-passive attack-tolerance
Active/passive
Attack tolerances
Co-designs
Cybe-physical systems
Cyber-physical systems
Dual security control
False data injection attacks
Nonlinear cybe-physical system
Passive attacks
Security controls
Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach
期刊论文
Journal of Control Science and Engineering, 2022, 卷号: 2022
作者:
Zhao, Li
;
Li, Wei
;
Li, Yajie
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2022/04/21
Actuators
Delay control systems
Denial-of-service attack
Fault tolerance
Active/passive
Actuator fault
Attack tolerances
Codesign method
Cyber-physical systems
Denialof- service attacks
Multi objective
Non linear
Passive attacks
Security controls
Multi-image encryption algorithm based on image hash, bit-plane decomposition and dynamic DNA coding
期刊论文
IET Image Processing, 2021, 卷号: 15, 期号: 4, 页码: 885-896
作者:
Zhang, Qiuyu
;
Han, Jitian
;
Ye, Yutong
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2021/06/03
Bioinformatics
Chaotic systems
Cryptography
DNA
Image enhancement
Transmissions
Bit plane decompositions
Content security
Differential attacks
Hyper-chaotic systems
Internet transmission
Large data volumes
Strong securities
Transmission rates
Security and Efficient Authentication Scheme for Mobile Edge Computing
期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 卷号: 44, 期号: 1, 页码: 110-116
作者:
Xue, Jian-Bin
;
Bai, Zi-Mei
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2021/06/03
Authentication
Computer terminals
Cryptography
Edge computing
Mobile telecommunication systems
Security systems
Authentication scheme
Computing environments
Efficient authentication
Lightweight identity authentication protocol
Man in the middle attacks
Mutual authentication
Physical layer security
Symmetric crypto systems
Detection of False Data Injection Attacks in smart grids based on cubature Kalman Filtering
会议论文
Kunming, PEOPLES R CHINA, MAY 22-24, 2021
作者:
Wang, Zhiwen
;
Zhang, Qi
;
Sun, Hongtao
;
Hu, Jiqiang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2022/09/22
Smart grids
False Data Injection Attacks
Attack detection
Square root cubature Kalman filter
Cosine similarity
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
Dual-Terminal Event Triggered Control for Cyber-Physical Systems under False Data Injection Attacks
期刊论文
Kybernetika, 2020, 卷号: 56, 期号: 56, 页码: 323-339
作者:
Wang ZW(王志文)
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2020/11/13
cyber-physical system
FDI attacks
Event-triggered mechanisms
dynamic output feedback security control
Research on High-speed Water Ring in Bladeless Zone under Runaway Condition
期刊论文
Nongye Jixie Xuebao/Transactions of the Chinese Society for Agricultural Machinery, 2019, 卷号: 50, 期号: 5, 页码: 159-166
作者:
Li, Qifei
;
Zhao, Chaoben
;
Quan, Hui
;
Long, Shican
;
Wei, Xianzhu
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2022/02/17
Angle of attack
Computer simulation
Hydraulic turbines
Numerical models
Pumped storage power plants
Pumps
Vortex flow
Formation mechanism
High speed water
K-epsilon turbulent model
Large angle of attacks
Pump-turbines
Pumped storage power station
Random fluctuation
Runaway conditions
Research on High-speed Water Ring in Bladeless Zone under Runaway Condition
期刊论文
Nongye Jixie Xuebao/Transactions of the Chinese Society for Agricultural Machinery, 2019, 卷号: 50, 期号: 5, 页码: 159-166
作者:
Li, Qifei
;
Zhao, Chaoben
;
Quan, Hui
;
Long, Shican
;
Wei, Xianzhu
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/11/14
Angle of attack
Computer simulation
Hydraulic turbines
Numerical models
Pumped storage power plants
Pumps
Vortex flow
Formation mechanism
High speed water
K-epsilon turbulent model
Large angle of attacks
Pump-turbines
Pumped storage power station
Random fluctuation
Runaway conditions
©版权所有 ©2017 CSpace - Powered by
CSpace