Context information based cyber security defense of protection system

被引:0
|
作者
Su, Sheng [1 ]
Duan, Xianzhong [1 ]
Zeng, Xiangjun [2 ]
Chan, W. L. [3 ]
Li, K. K. [3 ]
机构
[1] Huazhong Univ Sci & Technol, Wuhan 430074, Peoples R China
[2] Changsha Univ Sci & Technol, Changsha, Hunan, Peoples R China
[3] Hong Kong Polytech Univ, Kowloon, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:294 / 294
页数:1
相关论文
共 50 条
  • [31] Attack-Defense Trees based Cyber Security Analysis for CPSs
    Ji, Xiang
    Yu, HuiQun
    Fan, GuiSheng
    Fu, WenHao
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 693 - 698
  • [32] Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
    Shukla, Sandeep K.
    2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 30 - 31
  • [33] Cyber Security Protection of Power System Equipment Based on Chip-Level Trusted Computing
    Xi, Wei
    Li, Xiaobo
    Feng, Qihui
    Yao, Hao
    Cai, Tiantian
    Yu, Yang
    FRONTIERS IN ENERGY RESEARCH, 2022, 10
  • [34] Security based Cyber-Physical Architecture for Environment Protection
    Durresi, Mimoza
    Durresi, Arjan
    2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 43 - 50
  • [35] The survey of information system security classified protection
    Tian, Zhihong
    Wang, Bailing
    Ye, Zhiwei
    Zhang, Hongli
    Lecture Notes in Electrical Engineering, 2011, 98 : 975 - 980
  • [36] The Security Protection and Technology Analysis of Information System
    Wang, Hua
    Zhao, GuoHong
    Shi, BoShan
    Meng, XianJun
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3130 - 3134
  • [37] The Security and Privacy Protection of Hospital Information System
    Wang, Na
    Wang, Jin-guo
    3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND DEVELOPMENT (ICSSD 2017), 2017, : 212 - 214
  • [38] Reflections on the Construction of Cyber Security Range in Power Information System
    Chen, Zhiyu
    Yan, Longchuan
    He, Yongyuan
    Bai, Dongxia
    Liu, Xiaolin
    Li, Limin
    PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 2093 - 2097
  • [39] ON THE SHARING OF CYBER SECURITY INFORMATION
    Luiijf, Eric
    Klaver, Marieke
    CRITICAL INFRASTRUCTURE PROTECTION IX, 2015, 466 : 29 - 46
  • [40] Privacy and security Cyber Defense Triad for Where Security Matters
    Schell, Roger R.
    COMMUNICATIONS OF THE ACM, 2016, 59 (11) : 20 - 23