COAX 发表于 2025-3-21 16:19:47

书目名称Information Security and Cryptology影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0465368<br><br>        <br><br>书目名称Information Security and Cryptology影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0465368<br><br>        <br><br>书目名称Information Security and Cryptology网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0465368<br><br>        <br><br>书目名称Information Security and Cryptology网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0465368<br><br>        <br><br>书目名称Information Security and Cryptology被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0465368<br><br>        <br><br>书目名称Information Security and Cryptology被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0465368<br><br>        <br><br>书目名称Information Security and Cryptology年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0465368<br><br>        <br><br>书目名称Information Security and Cryptology年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0465368<br><br>        <br><br>书目名称Information Security and Cryptology读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0465368<br><br>        <br><br>书目名称Information Security and Cryptology读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0465368<br><br>        <br><br>

狂热语言 发表于 2025-3-21 20:38:07

http://reply.papertrans.cn/47/4654/465368/465368_2.png

含沙射影 发表于 2025-3-22 01:23:22

http://reply.papertrans.cn/47/4654/465368/465368_3.png

水汽 发表于 2025-3-22 04:44:18

http://reply.papertrans.cn/47/4654/465368/465368_4.png

Rodent 发表于 2025-3-22 09:15:34

Chunping Zhu,Xingkai Wang,Zhen Liu attacks due to their criticality, interconnectedness and Internet accessibility. SCADA systems employ programmable logic controllers to monitor and issue control instructions to other devices. Unfortunately, programmable logic controllers are typically configured in a persistent manner – they are c

OTHER 发表于 2025-3-22 13:24:39

Tuong Ngoc Nguyen,Willy Susilo,Dung Hoang Duong,Fuchun Guo,Kazuhide Fukushima,Shinsaku Kiyomotosents unique cyber risk characteristics that must be managed in new ways. A key stage of the risk management process is risk assessment – the earlier in the lifecycle the assessment is performed, the more the security that can be designed into the operational environment..This chapter presents a qua

Monolithic 发表于 2025-3-22 20:06:49

Xiaotong Li,Hao Wang,Jiyang Chen,Shikuan Li,Yuxiang Sun,Ye Sutor: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, tran

ARC 发表于 2025-3-22 21:13:27

http://reply.papertrans.cn/47/4654/465368/465368_8.png

largesse 发表于 2025-3-23 02:37:24

Ming Liu,Mingyue Zhang,Guangshun Li,Yuemei Hu,Tao Li,Yilei Wang,Bo Lantor: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, tran

正常 发表于 2025-3-23 06:24:49

http://reply.papertrans.cn/47/4654/465368/465368_10.png
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Information Security and Cryptology; 19th International C Chunpeng Ge,Moti Yung Conference proceedings 2024 The Editor(s) (if applicable) a