宽大 发表于 2025-3-23 10:59:56

Political and Economic Implications of Authoritarian Control of the Internet case of Noor’s role in the Egyptian Revolution and, in the process, a model is developed for future examination of the general case of the potential for loss of critical Internet infrastructure service under authoritarian governments.

合唱队 发表于 2025-3-23 17:27:55

ZigBee Device Verification for Securing Industrial Control and Building Automation Systemsralized relevance learning vector quantization improved (GRLVQI) relevance ranking. A true verification rate greater than 90% and a false verification rate less than 10% were obtained when assessing authorized device IDs. When additional rogue devices were introduced that attempted to gain unauthori

panorama 发表于 2025-3-23 20:23:32

http://reply.papertrans.cn/24/2400/239988/239988_13.png

讥讽 发表于 2025-3-24 01:47:01

A Distributed Real-Time Event Correlation Architecture for SCADA Security capture, correlation and dissemination. The architecture employs a publish/subscribe mechanism, which decentralizes limited computing resources to distributed field agents in order to enhance real-time attack detection while limiting unnecessary communications overhead.

追逐 发表于 2025-3-24 04:37:17

http://reply.papertrans.cn/24/2400/239988/239988_15.png

Accomplish 发表于 2025-3-24 08:38:08

http://reply.papertrans.cn/24/2400/239988/239988_16.png

Aids209 发表于 2025-3-24 13:28:30

Factors Impacting Attacker Decision-Making in Power Grid Cyber AttacksISKS framework: prevention measures (P); attacks and alliances (A); result (R); ease of access (E); response (R); interconnectedness and interdependencies (I); security testing and audits (S); knowledge and research (K); and system weaknesses (S). This paper makes the case that infrastructure attack

无底 发表于 2025-3-24 14:56:17

http://reply.papertrans.cn/24/2400/239988/239988_18.png

Apoptosis 发表于 2025-3-24 19:28:43

http://reply.papertrans.cn/24/2400/239988/239988_19.png

Dealing 发表于 2025-3-25 01:08:44

http://reply.papertrans.cn/24/2400/239988/239988_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Critical Infrastructure Protection VII; 7th IFIP WG 11.10 In Jonathan Butts,Sujeet Shenoi Conference proceedings 2013 IFIP International Fe