失眠症 发表于 2025-3-25 04:49:18

http://reply.papertrans.cn/24/2339/233835/233835_21.png

employor 发表于 2025-3-25 08:00:38

Sokratis K. Katsikas,Frédéric Cuppens,Stefanos GriIncludes supplementary material:

laparoscopy 发表于 2025-3-25 13:12:32

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233835.jpg

Irascible 发表于 2025-3-25 18:52:35

https://doi.org/10.1007/978-3-319-72817-9Cyber-physical systems security; industrial control networks security; SCADA security; cyberattacks; thr

GLUE 发表于 2025-3-25 23:06:13

978-3-319-72816-2Springer International Publishing AG 2018

elucidate 发表于 2025-3-26 02:55:59

Computer Security978-3-319-72817-9Series ISSN 0302-9743 Series E-ISSN 1611-3349

Cloudburst 发表于 2025-3-26 05:52:29

https://doi.org/10.1007/978-3-031-28210-2ream from the point of attack. Based on a mathematical model of the process, carefully crafted and executed attacks, are detected by deploying CUSUM and Bad-Data detectors. Extensive experiments are carried out and the results show the performance of the proposed scheme.

壮丽的去 发表于 2025-3-26 08:52:15

Multistage Downstream Attack Detection in a Cyber Physical Systemream from the point of attack. Based on a mathematical model of the process, carefully crafted and executed attacks, are detected by deploying CUSUM and Bad-Data detectors. Extensive experiments are carried out and the results show the performance of the proposed scheme.

亚麻制品 发表于 2025-3-26 13:34:54

http://reply.papertrans.cn/24/2339/233835/233835_29.png

充气女 发表于 2025-3-26 17:36:22

http://reply.papertrans.cn/24/2339/233835/233835_30.png
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Computer Security; ESORICS 2017 Interna Sokratis K. Katsikas,Frédéric Cuppens,Stefanos Gri Conference proceedings 2018 Springer Internation