扔掉掐死你 发表于 2025-3-28 17:16:51

http://reply.papertrans.cn/24/2400/239974/239974_41.png

oxidize 发表于 2025-3-28 20:16:41

On the Feasibility of Device Fingerprinting in Industrial Control Systemsommon security tools and methodologies to fit the industrial environment. Fingerprinting of industrial devices is still an unexplored research field. In this paper we provide an overview of standard device fingerprinting techniques and an assessment on the application feasibility in ICS infrastructu

Debate 发表于 2025-3-28 23:40:30

http://reply.papertrans.cn/24/2400/239974/239974_43.png

occurrence 发表于 2025-3-29 04:40:19

Optimization Models in a Smart Tool for the Railway Infrastructure Protection optimal covering integer programming models to be used in designing the security system for a Railway Infrastructure. Two models are presented and tested on a railway station scheme. The results highlight the role that the optimization models can fulfill in the design of an effective security syste

粗俗人 发表于 2025-3-29 10:46:05

Towards Automatic Critical Infrastructure Protection through Machine Learningtion to face every day’s threats. In order to make such protection holistic, covering all the needs of the systems from the point of view of security, prevention aspects and situational awareness should be considered. Researchers and Institutions stress the need of providing intelligent and automati

IRS 发表于 2025-3-29 14:25:43

Using NATO Labelling to Support Controlled Information Sharing between Partners The stakeholders are typically located in different information security domains or even different countries. We present a content labelling solution developed by NATO for the purpose of enabling information sharing between different communities of interest and coalition participants in NATO operat

呼吸 发表于 2025-3-29 18:01:25

Security Challenges for Cooperative and Interconnected Mobility Systemshallenges, overarching cyber security dilemmas are addressed, such as stimulating the economy vs. improving security. We expect that the discussed risks will be a challenge for research, industry and authorities in the coming years.

语源学 发表于 2025-3-29 22:02:24

A Plug and Play, Approximation-Based, Selective Load Shedding Mechanism for the Future Electrical Grg that the proposed scheme is compared with. Furthermore, the mechanism under consideration provides smooth and seamless load restoration, preventing oscillations between shedding and restoration. It is robust to functional approximation errors, measurement noise and sudden load disturbances.

黄油没有 发表于 2025-3-30 01:38:40

http://reply.papertrans.cn/24/2400/239974/239974_49.png

Painstaking 发表于 2025-3-30 05:06:04

Structural Controllability of Networks for Non-interactive Adversarial Vertex Removaltack strategies for multiple network models. As the construction of a PDS for a given graph is not unique, we further investigate different strategies for PDS construction, and provide a simulative evaluation.
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Critical Information Infrastructures Security; 8th International Wo Eric Luiijf,Pieter Hartel Conference proceedings 2013 Springer Internat