如何正确和安全地开展后量子密码算法的相关实现(英文)

张帆, 杨博麟 - Journal of Cryptologic Research, 2023 - search.proquest.com
… , in the situation where the manipulated data is randomly split in … Grey box attacks also
include fault injection analysis, such as “… they lack portability and demand a strong adherence …

[PDF][PDF] 工业控制系统安全态势感知技术研究

周明, 吕世超, 游建舟, 朱红松, 石志强… - Journal of Cyber Security …, 2022 - jcs.iie.ac.cn
attack modeling techniques including attack graph, Bayesian attack graph, and Markov
model; Once the attack model is built, we use the off-the-shelf threat evaluation techniques to …

[PDF][PDF] 阁EasyChair Preprint

K Al-Handali, Z Al-Sharafi, Z Al-Hamadi - 2022 - easychair.org
… which creates more opportunities for attacks [29], [30], [31], [… services, and the differing
demands these services will place … characterized by simplicity and ease of handling, as it is almost …

EdgeKeeper: 一种适应泛在电力物联网的可信边缘计算框架

W Yang, W Liu, X Wei, Z Guo, K Yang… - Frontiers of Information …, 2021 - Springer
… Ethernet access mode also provides a convenient attack path for hackers. At the … device
is registered, the IoT agent EdgeKeeper sends an initialization request to the IoT hub of the IoT

[PDF][PDF] 电力系统安全仿真技术: 工程安全, 网络安全与信息物理综合安全

王子骏, 刘杨, 鲍远义, 管晓宏, 吴桐… - SCIENCE CHINA …, 2017 - researchgate.net
… -physical cooperative attack detection Secret experiments 2006 Information flood attacks at
… The attack on Iran’s nuclear facilities throws a cloud over Iran’s nuclear negotiations. Xinhua …

[图书][B] 信息安全专业英语选读

杨淑芳, 张俊 - 2017 - books.google.com
… and create a heightened threat to some organizations, while being less of a problem to others.
For example, the banking industry deals more with phishing attacks and banking malware …

… : 浙江工商大学出版社, 2010. Chen DQ (2010) Decision-making model research on emergency resources distribution based on a feature analysis of emergency system …

B Press - Unconventional Emergency Management Research, 2024 - Springer
… In: Huang CF, Kahrama C (eds) Intelligent systems and decision making for risk analysis
and crisis response. CRC Press, London 180. Deng O, Su GF, Huang QY et al (2013) Forest …

[PDF][PDF] 社工概念演化分析

王作广, 朱红松, 孙利民 - 信息安全学报, 2021 - jcs.iie.ac.cn
… Abstract Social engineering is a very popular attack in the hacker community, and has … social
engineer is someone he is not, or by manipulation. As a result, the social engineer is able to …

[PDF][PDF] 基于可信执行环境的物联网边缘流处理安全技术综述

姜超, 李玉峰, 曹晨红, 李江涛 - Journal of Cyber Security 信息安全 …, 2021 - 159.226.95.92
… Abstract In the era of the Internet of Everything, sensing devices in the Internet of Things
applications facing the Internet of Things. In the edge computing model that has emerged in …

近似计算综述: 从计算单元设计到高层次应用

阙浩华, 金雨, 王童, 刘明楷, 杨兴华, 乔飞 - 计算机科学技术学报, 2023 - jcst.ict.ac.cn
… design techniques, the computation demands of large-scale modern … Today, most DNNs
applications use FP32 for handlingattack the computing system, allowing attackers to recognize …