共 50 条
- [1] Vulnerability Analysis and Enhancement of Security of Communication Protocol in Industrial Control Systems [J]. HELIX, 2019, 9 (04): : 5122 - 5127
- [2] Investigating vulnerability of ecological industrial symbiosis network based on automatic control theory [J]. Environmental Science and Pollution Research, 2018, 25 : 27321 - 27333
- [4] Vulnerability mining method for industrial control network protocol based on fuzz testing [J]. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (09): : 2265 - 2279
- [5] Vulnerability analysis of industrial control system based on attack graph [J]. Feng, Dong-Qin (dqfeng@iipc.zju.edu.cn), 1600, Zhejiang University (48):
- [7] Industrial control protocol reverse analysis based on active interactive learning [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (04): : 22 - 33
- [9] Research of Industrial Control System Device Firmware Vulnerability Mining Technology Based on Taint Analysis [J]. PROCEEDINGS OF 2018 IEEE 9TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2018, : 607 - 610
- [10] Analysis of ecological vulnerability based on landscape pattern and ecological sensitivity: a case of Duerbete County [J]. REMOTE SENSING AND MODELING OF ECOSYSTEMS FOR SUSTAINABILITY V, 2008, 7083