共同生活 发表于 2025-3-23 12:48:09

http://reply.papertrans.cn/24/2400/239994/239994_11.png

衰老 发表于 2025-3-23 14:17:25

http://reply.papertrans.cn/24/2400/239994/239994_12.png

FAR 发表于 2025-3-23 19:15:17

Comparison of Design-Centric and Data-Centric Methods for Distributed Attack Detection in Cyber-Physic power grids. This chapter compares the effectiveness of detecting attacks on a water treatment plant using design-centric invariants versus data-centric rules, the latter generated using a variety of data mining methods. The methods are compared based on the maximization of true positives and min

清晰 发表于 2025-3-23 22:22:16

http://reply.papertrans.cn/24/2400/239994/239994_14.png

Apoptosis 发表于 2025-3-24 02:38:39

http://reply.papertrans.cn/24/2400/239994/239994_15.png

Solace 发表于 2025-3-24 10:07:38

Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehiclesxecuting mission runs in a software-in-the-loop simulator and defining safe unmanned aerial vehicle operating areas. The methodology uses preplanned flight paths as a baseline, greatly reducing the input space that must be searched to have confidence that an unmanned aerial vehicle will not encounte

morale 发表于 2025-3-24 11:57:39

Assessing the Cyber Risk of Small Unmanned Aerial Vehiclessents unique cyber risk characteristics that must be managed in new ways. A key stage of the risk management process is risk assessment – the earlier in the lifecycle the assessment is performed, the more the security that can be designed into the operational environment..This chapter presents a qua

绕着哥哥问 发表于 2025-3-24 17:00:09

http://reply.papertrans.cn/24/2400/239994/239994_18.png

AUGUR 发表于 2025-3-24 20:02:40

An Efficient Blockchain Authentication Scheme for Vehicular Ad-Hoc Networksing. As the use of autonomous vehicles increases, the transportation infrastructure as a whole becomes highly susceptible to cyber attacks due to the number of components that communicate with each other over wireless networks and the Internet..This chapter presents an efficient blockchain scheme fo

使人入神 发表于 2025-3-25 02:26:46

Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systemssion detection capability requires an understanding of the behavior of a cyber-physical system and causality of its components. Such an understanding enables the characterization of normal behavior and the identification and reporting of anomalous behavior..This chapter explores a relatively new tim
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Critical Infrastructure Protection XIV; 14th IFIP WG 11.10 I Jason Staggs,Sujeet Shenoi Conference proceedings 2020 IFIP International Fede