ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Authentication scheme for distributed industrial control system terminals
Mapping Intimacies
◽
10.1145/3501409.3501589
◽
2021
◽
Author(s):
LuYao Yang
◽
WeiMing Tong
◽
ZhongWei Li
◽
Tong Wu
Keyword(s):
Control System
◽
Authentication Scheme
◽
Industrial Control System
◽
Industrial Control
Download Full-text
Related Documents
Cited By
References
Authentication Technology in Industrial Control System Based on Identity Password
2020 39th Chinese Control Conference (CCC)
◽
10.23919/ccc50068.2020.9188372
◽
2020
◽
Author(s):
Luyao Yang
◽
Wenli Shang
◽
Chunyu Chen
◽
Tianyu Wang
◽
Zhoubin Liu
Keyword(s):
Control System
◽
Industrial Control System
◽
Industrial Control
◽
Authentication Technology
Download Full-text
History of Industrial Control System Cyber Incidents
10.2172/1505628
◽
2018
◽
Cited By ~ 8
Author(s):
Kevin E. Hemsley
◽
Dr. Ronald E. Fisher
Keyword(s):
Control System
◽
Industrial Control System
◽
Industrial Control
◽
History Of
Download Full-text
Proceedings of the Fifth Annual Industrial Control System Security (ICSS) Workshop
10.1145/3372318
◽
2019
◽
Keyword(s):
Control System
◽
System Security
◽
Industrial Control System
◽
Industrial Control
◽
Industrial Control System Security
Download Full-text
Design and Implementation of Industrial Control System Emulators
Critical Infrastructure Protection VII - IFIP Advances in Information and Communication Technology
◽
10.1007/978-3-642-45330-4_3
◽
2013
◽
pp. 35-46
◽
Cited By ~ 2
Author(s):
Robert Jaromin
◽
Barry Mullins
◽
Jonathan Butts
◽
Juan Lopez
Keyword(s):
Control System
◽
Industrial Control System
◽
Industrial Control
◽
Design And Implementation
Download Full-text
A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed
IEEE Access
◽
10.1109/access.2021.3053135
◽
2021
◽
Vol 9
◽
pp. 16239-16253
Author(s):
Mohammad Noorizadeh
◽
Mohammad Shakerpour
◽
Nader Meskin
◽
Devrim Unal
◽
Khashayar Khorasani
Keyword(s):
Control System
◽
Cyber Security
◽
Industrial Control System
◽
Industrial Control
Download Full-text
A vulnerability scanning scheme based on attack graph for smart grid industrial control system
IOP Conference Series Earth and Environmental Science
◽
10.1088/1755-1315/645/1/012060
◽
2021
◽
Vol 645
◽
pp. 012060
Author(s):
Kai Xu
◽
Xiangqun Wang
◽
Hao Xu
◽
Ning Dong
◽
Meng Han
◽
...
Keyword(s):
Control System
◽
Smart Grid
◽
Industrial Control System
◽
Industrial Control
◽
Attack Graph
◽
Scanning Scheme
Download Full-text
The Risk of Industrial Control System Programmable Logic Controller Default Configurations
2020 International Computer Symposium (ICS)
◽
10.1109/ics51289.2020.00093
◽
2020
◽
Author(s):
Kuan-Ming Su
◽
I-Hsien Liu
◽
Jung-Shian Li
Keyword(s):
Control System
◽
Programmable Logic Controller
◽
Programmable Logic
◽
Industrial Control System
◽
Industrial Control
Download Full-text
Real-time Testing on Improved Data Transmission Security in the Industrial Control System
2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)
◽
10.1109/isriti51436.2020.9315339
◽
2020
◽
Author(s):
E.H. Riyadi
◽
T.K. Priyambodo
◽
A.E. Putra
Keyword(s):
Control System
◽
Real Time
◽
Data Transmission
◽
Industrial Control System
◽
Industrial Control
◽
Data Transmission Security
Download Full-text
Physical Intrusion Detection for Industrial Control System
2018 IEEE Conference on Communications and Network Security (CNS)
◽
10.1109/cns.2018.8433194
◽
2018
◽
Author(s):
Pengfei Liu
◽
Ting Liu
Keyword(s):
Control System
◽
Intrusion Detection
◽
Industrial Control System
◽
Industrial Control
Download Full-text
Industrial Control System Intrusion Detection Model based on LSTM & Attack Tree
2020 17th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
◽
10.1109/iccwamtip51612.2020.9317477
◽
2020
◽
Author(s):
Fan Xingjie
◽
Wan Guogenp
◽
Zhang ShiBIN
◽
ChenHAO
Keyword(s):
Control System
◽
Intrusion Detection
◽
Industrial Control System
◽
Industrial Control
◽
Attack Tree
◽
Detection Model
◽
Model Based
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close