×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
厦门大学 [1]
北京大学 [1]
兰州理工大学 [1]
大连理工大学 [1]
北京航空航天大学 [1]
上海电子信息职业技术... [1]
更多...
内容类型
会议论文 [3]
期刊论文 [2]
其他 [1]
学位论文 [1]
发表日期
2019 [1]
2017 [2]
2016 [2]
2011 [1]
2002 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共7条,第1-7条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
The Security Assessment on Programmable Logic Controller based on Attack Tree Model and FAHP
会议论文
Shenyang, China, July 12, 2019 - July 14, 2019
作者:
Feng, Tao
;
Shi, Yanxia
;
Gong, Renbin
;
Zhao, Qianchuan
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Analytic hierarchy process
Computation theory
Computer circuits
Controllers
Data acquisition
Decision making
Forestry
Intelligent computing
Probability
Programmable logic controllers
Programmed control systems
Security of data
Attack tree
Fuzzy analytic hierarchy process
Industrial control systems
Programmable logic controllers (PLC)
Protective measures
Security attributes
Shapiro-Wilk tests
Supervisory control and data acquisition
A Review of Security in Electrical Power Information System
会议论文
2017 5TH IEEE INTERNATIONAL CONFERENCE ON SMART ENERGY GRID ENGINEERING (SEGE), 2017-01-01
作者:
Mao, Tianyang
;
Zhao, Liang
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/03
electrical power information system
OSI
P2DR
IEC 62351
IEC 61850
fault tree
attack tree
A Study on Risk Analysis and Countermeasures of Electronic Financial Fraud
期刊论文
Journal of the Korea Institute of Information Security and Cryptology, 2017, 卷号: Vol.27 No.1, 页码: 115-128
作者:
Lee,Sangjin
;
Jeong,DaeYong
;
Kim,Gibum
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/24
Electronic
Financial
Fraud
Consumer
Financial
Information
Security
Threat
risk
modeling
Threat
modeling
Attack
tree
STRIDE
DREAD
Risk Assessment of Cyber Attacks in ECPS Based on Attack Tree and AHP
会议论文
作者:
Wang, Yufei
;
Liu, Kaipei
;
Yuan, Kai
;
Yang, Guotai
;
Liu, Jian
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
ECPS
cyber attack
risk assessment
attack tree
AHP
Collusion-resilient broadcast encryption based on dual-evolving one-way function trees
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2016, 卷号: 9, 页码: 3633-3645
作者:
Zhang, Yao
;
Zheng, Zhiming
;
Szalachowski, Pawel
;
Wang, Qi
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
broadcast encryption
collusion attack
one-way function tree
dual evolution
secure wireless sensor networks
Internet of things security
FATPET: AN ATTACK TREE-BASED FRAMEWORK OF PENETRATION TESTS IN DISTRIBUTED ENVIRONMENT
其他
2011-01-01
Liu, Heng
;
Wang, Hongbing
;
Wang, Zhao
;
Chen, Zhong
;
Jing, Qi
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2015/11/16
Attack tree
distributed environment
penetration test
基于攻击树的多层次入侵检测及其在Linux上的原型
学位论文
2002, 2002
庄朝晖
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2016/02/14
多层次入侵检测
攻击树
攻击说明语言
Z语言
形式化
Linux
事前分析
Multi-stage Intrusion Detection
Attack Tree
Attack Tree Specification Language
Z language
Formal
Linux
Analysis Beforehand
©版权所有 ©2017 CSpace - Powered by
CSpace