alabaster 发表于 2025-3-25 05:57:46

http://reply.papertrans.cn/24/2400/239983/239983_21.png

Additive 发表于 2025-3-25 10:15:25

Security At What Cost?tween strengthening security and endangering civil liberties and personal privacy. The introduction of national identity cards and biometric passports, expansion of the National DNA Database and inter-departmental sharing of personal information raise a number of privacy issues. Human rights may als

Metamorphosis 发表于 2025-3-25 15:19:23

Foreign Direct Investment in an Era of Increased Threats to Critical Infrastructuresattempting to privatize critical infrastructure assets. In the post September 11, 2001 world, the notion that foreign direct investment positively contributes to an economy is being tempered by the realization that it can pose a threat to national security. This paper discusses the principal issues

接触 发表于 2025-3-25 18:19:28

http://reply.papertrans.cn/24/2400/239983/239983_24.png

foreign 发表于 2025-3-25 21:36:12

Modeling Control System Failures and Attacks – The Waterloo Campaign to Oil Pipelineslures and attacks are modeled using the notion of an attacker who can block and/or fabricate messages. These two attack mechanisms can cover a variety of scenarios ranging from control failures in the Waterloo Campaign to cyber attacks on oil pipelines. The model helps provide a comprehensive unders

亵渎 发表于 2025-3-26 02:33:23

High Security with Low Latency in Legacy SCADA Systems. Previous authentication solutions that examine single messages incur noticeable latency. This paper describes Predictive YASIR, a bump-in-the-wire device that reduces the latency by considering broader patterns of messages. The device predicts the incoming plaintext based on previous observations;

热心助人 发表于 2025-3-26 06:10:44

http://reply.papertrans.cn/24/2400/239983/239983_27.png

担心 发表于 2025-3-26 08:40:34

http://reply.papertrans.cn/24/2400/239983/239983_28.png

THE 发表于 2025-3-26 13:22:04

http://reply.papertrans.cn/24/2400/239983/239983_29.png

使显得不重要 发表于 2025-3-26 17:41:13

Security Analysis of the MPLS Label Distribution Protocolre technologies. The speed, flexibility, sophisticated traffic management and cost savings offered by MPLS have prompted service providers to converge existing and new technologies onto common MPLS backbones. Indeed, much of the world’s data, voice communications, video traffic and military applicat
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Critical Infrastructure Protection IV; Fourth Annual IFIP W Tyler Moore,Sujeet Shenoi Conference proceedings 2010 IFIP International Federa