×
验证码:
换一张
忘记密码?
记住我
×
统一认证登录
登录
中文版
|
English
上海科技大学知识管理系统
ShanghaiTech University Knowledge Management System
统一认证登录
登录
注册
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
DOI
出处
存缴日期
收录类别
出版者
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
知识整合
学习讨论厅
在结果中检索
研究单元&专题
信息科学与技术学院 [4]
创意与艺术学院 [1]
作者
陈宇奇 [3]
陆疌 [1]
孙芳蕾 [1]
文献类型
期刊论文 [6]
发表日期
2025 [1]
2024 [1]
2023 [1]
2022 [2]
2020 [1]
出处
IEEE INTER... [2]
COMPUTER N... [1]
IEEE TRANS... [1]
PROCESSES [1]
TRANSACTIO... [1]
语种
英语 [6]
资助项目
Distinguis... [1]
Fundamenta... [1]
Ministry o... [1]
National N... [1]
Shanghai S... [1]
State Key ... [1]
更多...
资助机构
收录类别
EI [6]
SCI [3]
状态
已发表 [6]
×
知识图谱
KMS
反馈留言
浏览/检索结果:
共6条,第1-6条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
WOS被引频次升序
WOS被引频次降序
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
期刊影响因子升序
期刊影响因子降序
提交时间升序
提交时间降序
SFACIF: A safety function attack and anomaly industrial condition identified framework
期刊论文
COMPUTER NETWORKS, 2025, 卷号: 257
作者:
Liu, Kaixiang
;
Xie, Yongfang
;
Chen, Yuqi
;
Xie, Shiwen
;
Chen, Xin
Adobe PDF(2049Kb)
|
收藏
|
浏览/下载:231/3
|
提交时间:2024/12/13
Cyber attacks
Network security
Anomaly detection
Basic process control systems
Benchmark data
Industrial conditions
Physical faults
Process industries
Safety and stabilities
Safety function attack
Safety functions
Safety instrumented systems
Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2024, 卷号: 11, 期号: 10, 页码: 17602-17614
作者:
Li, Zedong
;
Chen, Xin
;
Chen, Yuqi
;
Li, Shijie
;
Wang, Hangyu
Adobe PDF(4650Kb)
|
收藏
|
浏览/下载:1476/1
|
提交时间:2024/02/23
Industrial Internet of Things
Cyber-Physical Manufacturing Systems
Computer Numerical Control
Intrusion Detection
Cyber Attack
Codes (symbols)
Computer control systems
Computer crime
Crime
Cyber attacks
Internet of things
Machining centers
Network security
Numerical control systems
Process control
Code
Computer numerical control
Cybe-physical manufacturing system
Cyber physicals
Cyber-attacks
Industrial internet of thing
Intrusion-Detection
Numerical control
Fuzzy Harmony Search Technique for Cyber Risks in Industry 4.0 Wireless Communication Networks
期刊论文
PROCESSES, 2023, 卷号: 11, 期号: 3
作者:
Diao, Zhifeng
;
Sun, Fanglei
Adobe PDF(5853Kb)
|
收藏
|
浏览/下载:4281/2796
|
提交时间:2023/04/19
communication networks
cyber security
FHS
industry 4
0
risk detection
Relaxed Connected Dominating Set Problem for Power System Cyber-Physical Security
期刊论文
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2022, 卷号: 9, 期号: 4
作者:
Kin Cheong Sou
;
Jie Lu
Adobe PDF(431Kb)
|
收藏
|
浏览/下载:560/0
|
提交时间:2022/04/22
Cyber Physical System
Cybersecurity
Electric power system security
Electric power transmission networks
Embedded systems
Flow graphs
Phase measurement
Phasor measurement units
Connected dominating set problems
Cyber-Physical securities
Dominating sets
Integer Program- ming
Power
Power measurement
Power system
Security
Security application
Defending Cyber-physical Systems through Reverse Engineering Based Memory Sanity Check
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2022, 卷号: 10, 期号: 10, 页码: 1-1
作者:
Yangyang Geng
;
Yuqi Chen
;
Rongkuan Ma
;
Qiang Wei
;
Jie Pan
Adobe PDF(2006Kb)
|
收藏
|
浏览/下载:391/1
|
提交时间:2022/09/23
Cyber Physical System
Cybersecurity
Embedded systems
Internet of things
Internet protocols
Network security
Programmable logic controllers
Reverse engineering
Semantics
Analysis solution
Code
Cybe-physical systems
Cyber-physical systems
Memory attack
Password
Proprietary protocols
Real-world
Sanity check
Telecommunications traffic
BTDS: Bayesian-based trust decision scheme for intelligent connected vehicles in VANETs
期刊论文
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 卷号: 31, 期号: 12
作者:
Fang, Weidong
;
Zhang, Wuxiong
;
Liu, Yang
;
Yang, Weiming
;
Gao, Zhiwei
Adobe PDF(1024Kb)
|
收藏
|
浏览/下载:183/0
|
提交时间:2022/12/09
Vehicular ad hoc networks
Sensor networks
Bayesian networks
Network security
Cybersecurity
Automotive industry
Beta distributions
Cyber security
Internal attacks
Security attacks
Simulation studies
Trust
Trust management model
Vehicle ad-hoc networks
首页
上一页
1
下一页
末页