毕业典礼 发表于 2025-3-25 06:01:01
http://reply.papertrans.cn/24/2400/239995/239995_21.pngRodent 发表于 2025-3-25 08:08:40
Detecting Anomalous Programmable Logic Controller Events Using Process Mining have been developed for detecting anomalous programmable logic controller behavior, they rely heavily on knowledge of the complex programmable logic controller control programs that perform process monitoring and control. To address this limitation, this chapter describes an automated process mininNebulizer 发表于 2025-3-25 11:51:04
Simulating Measurement Attacks in a Scada System Testbed various types of industrial control systems in smart grids, gas pipelines and manufacturing facilities to understand how they can be compromised by cyber threats. However, the manner in which industrial control systems are attacked is domain-dependent. Testbeds are a necessary tool to model specifiControl-Group 发表于 2025-3-25 18:09:35
http://reply.papertrans.cn/24/2400/239995/239995_24.png夹死提手势 发表于 2025-3-25 20:56:35
http://reply.papertrans.cn/24/2400/239995/239995_25.pngBUST 发表于 2025-3-26 01:20:17
GPS Signal Authentication Using a Chameleon Hash Keychain used by a receiver to compute its location. However, most navigation messages are not protected and are easily spoofed. Several attacks have been reported that transmit spoofed or replayed GPS signals to divert or hijack autonomous vehicles, ships and drones. Unfortunately, non-cryptographic protecCardiac-Output 发表于 2025-3-26 05:40:39
Security Analysis of Software Updates for Industrial Robotsthe robots as well as to human workers. Previous security studies of robots have focused on network service vulnerabilities and privileged execution. However, research has not examined robot software updates and their security features. This chapter investigates the security features of software upd挖掘 发表于 2025-3-26 11:40:12
http://reply.papertrans.cn/24/2400/239995/239995_28.png能量守恒 发表于 2025-3-26 14:25:19
http://reply.papertrans.cn/24/2400/239995/239995_29.pngabduction 发表于 2025-3-26 20:01:29
1868-4238in the various critical infrastructure sectors. Areas of coverage include: Industrial Control Systems Security; Telecommunications Systems Security; Infrastru978-3-030-93513-9978-3-030-93511-5Series ISSN 1868-4238 Series E-ISSN 1868-422X