Vulnerability Analysis of Industrial Control Protocol Based on Ecological Toxicology

被引:0
|
作者
Liu, Yaozong [1 ,2 ]
Li, Qianmu [1 ,2 ]
Liu, Yunheng [3 ]
机构
[1] Wuyi Univ, Intelligent Mfg Dept, Jiangmen, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Forest Police Coll, Sch Informat Technol, Nanjing, Jiangsu, Peoples R China
关键词
D O I
暂无
中图分类号
R9 [药学];
学科分类号
1007 ;
摘要
383
引用
收藏
页码:254 / 254
页数:1
相关论文
共 50 条
  • [1] Vulnerability Analysis and Enhancement of Security of Communication Protocol in Industrial Control Systems
    Rajesh, L.
    Satyanarayana, Penke
    [J]. HELIX, 2019, 9 (04): : 5122 - 5127
  • [2] Investigating vulnerability of ecological industrial symbiosis network based on automatic control theory
    Qingsong Wang
    Hongrui Tang
    Xueliang Yuan
    Jian Zuo
    Jian Zhang
    Zhenlei Gao
    Jinglan Hong
    [J]. Environmental Science and Pollution Research, 2018, 25 : 27321 - 27333
  • [3] Investigating vulnerability of ecological industrial symbiosis network based on automatic control theory
    Wang, Qingsong
    Tang, Hongrui
    Yuan, Xueliang
    Zuo, Jian
    Zhang, Jian
    Gao, Zhenlei
    Hong, Jinglan
    [J]. ENVIRONMENTAL SCIENCE AND POLLUTION RESEARCH, 2018, 25 (27) : 27321 - 27333
  • [4] Vulnerability mining method for industrial control network protocol based on fuzz testing
    Lai, Yingxu
    Yang, Kaixiang
    Liu, Jing
    Liu, Zenghui
    [J]. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (09): : 2265 - 2279
  • [5] Vulnerability analysis of industrial control system based on attack graph
    [J]. Feng, Dong-Qin (dqfeng@iipc.zju.edu.cn), 1600, Zhejiang University (48):
  • [6] Feasibility analysis of hybrid control networks based on common industrial protocol
    Kim, Dong-Sung
    Lee, SeungKi
    [J]. COMPUTER STANDARDS & INTERFACES, 2011, 33 (04) : 357 - 366
  • [7] Industrial control protocol reverse analysis based on active interactive learning
    Fu, Anmin
    Mao, An
    Huang, Tao
    Hu, Chao
    Liu, Ying
    Zhang, Xiaoming
    Wang, Zhanfeng
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (04): : 22 - 33
  • [8] Industrial Control System Attack Simulation Technology Based on Toxicology Principle
    Rong, Zhenbang
    Li, Qianmu
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 255 - 255
  • [9] Research of Industrial Control System Device Firmware Vulnerability Mining Technology Based on Taint Analysis
    Li, Yi
    Liu, Xiaoman
    Tian, Huirong
    Luo, Cheng
    [J]. PROCEEDINGS OF 2018 IEEE 9TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2018, : 607 - 610
  • [10] Analysis of ecological vulnerability based on landscape pattern and ecological sensitivity: a case of Duerbete County
    Jiang, Miao
    Gao, Wei
    Chen, Xiuwan
    Zhang, Xianfeng
    Wei, Wenxia
    [J]. REMOTE SENSING AND MODELING OF ECOSYSTEMS FOR SUSTAINABILITY V, 2008, 7083