針對過程控制系統之威脅評估和攻擊偵測模組

林宗勳, 黃育綸 - 2008 - ir.lib.nycu.edu.tw
attack model that can model a number of integrity attacks on … not detect any attack and the
stealthy attack does not cause … have any false alarm under the optimal configuration. Under a …

动态水印攻击检测方法的鲁棒性研究

杜大军, 张竞帆, 张长达, 费敏锐 - 自动化学报, 2023 - aas.net.cn
attack signal, and the upper limit of the distortion signal power are quantified. Furthermore, in
the worst case, to avoid that an attack … Finally, we use a simulation example to demonstrate …

[PDF][PDF] 基于微服务架构的多资源负载均衡优化方法

罗欢, 姜唯, 刘明伟, 徐律冠 - 科学技术与工程, 2022 - stae.com.cn
… according to the optimization objective of load balancing, the optimization model was solved
by … Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of …

[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击GRADUATE SCHOOL

ÇE ALTUNKAYA - 2023 - polen.itu.edu.tr
… Finally, the recalculated maximum possible angle of attack, … While the other optimization-based
control allocation … in the outer loop of the controller are the angle of attack, sideslip angle, …

基于鲁棒性能的信息物理融合系统乘性攻击检测.

赵振根, 李渝哲 - … Theory & Applications/Kongzhi Lilun Yu …, 2022 - search.ebscohost.com
… on multi-sensor remote state estimation. IEEE Transactions … of cyberphysical systems under
stealthy integrity attacks. IEEE … The performance and limitations of stealthy attacks on higher …

[PDF][PDF] 考量合作與傳染病式攻擊下確保服務持續性之有效防禦策略

鍾蕙宇, 林永松 - 2012 - oplab.im.ntu.edu.tw
… or subsystem to maintain the integrity and availability of … worm entity and makes the process
stealthily for the purposes of … appropriately to achieve the best attack effects. As mentioned in …

異質多網安全檢測平台建置計畫(III)

謝續平 - 2011 - ir.lib.nycu.edu.tw
… are exploited, and how the attack is hidden. We analyze the … of stealthy attacks, and by
ensuring that automatic attack-response mechanisms will not drive the system to an unsafe state. …

應用於場效可程式邏輯陣列之高效能入侵偵測系統

葉易霖, 李程輝 - 2004 - ir.lib.nycu.edu.tw
… compromise to the network’s integrity, the machines that form the … of attacks and probes, such
as buffer overflows, stealth port scans… Effective use of the hardware pipeline with optimized

[PDF][PDF] дон1146-28 0AS 区

PIOREE TO, O EXPORT-CONTROLLED - 1996 - researchgate.net
… The best harvests fall far short of needs and food shortages … hieapons and technologies such
as stealth, propulsion, and … major threat to the security and territorial integrity of this key ally. …

[PDF][PDF] 工业控制系统安全态势感知技术研究

周明, 吕世超, 游建舟, 朱红松, 石志强… - Journal of Cyber Security …, 2022 - jcs.iie.ac.cn
… graph, Bayesian attack graph, and Markov model; Once the attack model is built, we use the
… the possible results appearing in the future, such as attack events, infected devices, and “0-…