Security vulnerabilities of SGX and countermeasures: A survey

S Fei, Z Yan, W Ding, H Xie - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Trusted Execution Environments (TEEs) have been widely used in many security-critical
applications. The popularity of TEEs derives from its high security and trustworthiness …

Security of networked control systems subject to deception attacks: A survey

ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …

Data-driven resilient predictive control under denial-of-service

W Liu, J Sun, G Wang, F Bullo… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The study of resilient control of linear time-invariant (LTI) systems against denial-of-service
(DoS) attacks is gaining popularity in emerging cyber-physical applications. In previous …

Degradation of organic pollutants in near-neutral pH solution by Fe-C micro-electrolysis system

Z Yang, Y Ma, Y Liu, Q Li, Z Zhou, Z Ren - Chemical Engineering Journal, 2017 - Elsevier
The degradation of organic pollutants in the simulated and realistic wastewaters was
investigated by Fe-C micro-electrolysis system. Effects of initial pH, Fe/C mass ratio, gas …

A review of the migration mechanism of antibiotics during struvite recovery from wastewater

D Gao, B Li, X Huang, X Liu, R Li, Z Ye, X Wu… - Chemical Engineering …, 2023 - Elsevier
Struvite precipitation and reuse from phosphorus-rich wastewater are cost-effective
measures to improve phosphorus utilization efficiency and decrease its negative …

[HTML][HTML] Moving target defense techniques: A survey

C Lei, HQ Zhang, JL Tan, YC Zhang… - Security and …, 2018 - hindawi.com
As an active defense technique to change asymmetry in cyberattack-defense confrontation,
moving target defense research has become one of the hot spots. In order to gain better …

[HTML][HTML] System security assurance: A systematic literature review

A Shukla, B Katt, LO Nweke, PK Yeng… - Computer Science …, 2022 - Elsevier
Abstract System security assurance provides the confidence that security features, practices,
procedures, and architecture of software systems mediate and enforce the security policy …

Survey on quantum information security

H Zhang, Z Ji, H Wang, W Wu - China Communications, 2019 - ieeexplore.ieee.org
The security of classical cryptography based on computational complexity assumptions has
been severely challenged with the rapid development of quantum computers and quantum …

区块链隐蔽通信的构建技术及检测方法研究综述.

佘维, 荣欣鹏, 贾骏, 刘炜… - Journal of Zhengzhou …, 2022 - search.ebscohost.com
通信双方修改某类共享资源且不引起其他用户注意的通信方法被称作隐蔽通信,
而区块链作为一种去信任, 可溯源, 不可篡改的分布式数据共享技术平台, 伴随着相关领域拓展的 …

Quantum protocols for secure multi-party summation

ZX Ji, HG Zhang, HZ Wang, FS Wu, JW Jia… - Quantum Information …, 2019 - Springer
Quantum secure multi-party summation is a kind of privacy-preserving summation whereby
multiple mutually distrustful parties can securely compute the summation of their secret data …