SIA OpenIR

Browse/Search Results:  1-8 of 8 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
A design method of optimal PI controller with saturation characteristic for second-order processes 会议论文
2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), Shenyang, China, June 8-12, 2015
Authors:  Li XH(李先宏);  Yu HB(于海斌);  Zeng P(曾鹏);  Zang CZ(臧传治);  Sun LX(孙兰香);  Yuan MZ(苑明哲)
View  |  Adobe PDF(169Kb)  |  Favorite  |  View/Download:192/62  |  Submit date:2015/12/19
Optimal Pi Controller  Saturation Characteristic  Nonlinear Control System  Nlco Problem  Lss Or Ass  Common Lyapunov Functions  
A survey of packet disordering existing in networked control systems 会议论文
2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), Shenyang, China, June 8-12, 2015
Authors:  Li JN(李金娜);  Yu HB(于海斌);  Liang W(梁炜);  Zeng P(曾鹏);  Yuan MZ(苑明哲)
View  |  Adobe PDF(170Kb)  |  Favorite  |  View/Download:148/37  |  Submit date:2016/03/12
Networked Control Systems (Ncss)  Packet Disordering  Network Induced Delay  Packet Loss  Zero Order Holder (Zoh)  
Anomaly Detection Approach based on Function Code Traffic by Using CUSUM Algorithm 会议论文
PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), Xi‘an, PEOPLES R CHINA, December 12-13, 2015
Authors:  Wan M(万明);  Shang WL(尚文利);  Zeng P(曾鹏)
View  |  Adobe PDF(1356Kb)  |  Favorite  |  View/Download:168/36  |  Submit date:2016/05/23
Anomaly Detection  Modbus/tcp  Function Code Traffic  Cumulative Sum  
Design and implementation of industrial firewall for Modbus/TCP 会议论文
2015 2nd International Conference on Information and Network Security (ICINS 2015), Shanghai, China , July 29-30, 2015
Authors:  Shang WL(尚文利);  Qiao QS(乔全胜);  Wan M(万明);  Zeng P(曾鹏)
Microsoft Word(8135Kb)  |  Favorite  |  View/Download:208/50  |  Submit date:2015/12/19
Industrial Control Systems  Cyber Security  Industrial Firewall  Modbus / Tcp Protocol  
Penetration testing automation assessment method based on rule tree 会议论文
2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), Shenyang, China, June 8-12, 2015
Authors:  Zhao JM(赵剑明);  Shang WL(尚文利);  Wan M(万明);  Zeng P(曾鹏)
View  |  Adobe PDF(357Kb)  |  Favorite  |  View/Download:155/46  |  Submit date:2015/12/19
Penetration Testing  Security Assessment  Rule Tree  Network Security  
Research on Self-Learning Method on Generation and Optimization of Industrial Firewall Rules 会议论文
2nd International Conference on Information Security and Cyber Forensics (InfoSec2015), Cape Town, South Africa, November 15-17, 2015
Authors:  Shang WL(尚文利);  Wan M(万明);  Zeng P(曾鹏);  Qiao QS(乔全胜)
View  |  Adobe PDF(641Kb)  |  Favorite  |  View/Download:158/38  |  Submit date:2015/12/19
Industrial Firewall  Intrusion Detection  Self-learning Method  "white-list" Rule  
Design and implementation of industrial firewall for Modbus/TCP 期刊论文
Journal of Computers, 2015, 卷号: 11, 期号: 5, 页码: 432-438
Authors:  Shang WL(尚文利);  Qiao QS(乔全胜);  Wan M(万明);  Zeng P(曾鹏)
View  |  Adobe PDF(15622Kb)  |  Favorite  |  View/Download:155/22  |  Submit date:2015/12/20
Industrial Control Systems  Cyber Security  Industrial Firewall  Modbus/tcp Protocol  
Industrial communication intrusion detection algorithm based on improved one-class SVM 会议论文
2015 World Congress on Industrial Control Systems Security, WCICSS 2015, London, United kingdom, December 14-16, 2015
Authors:  Shang WL(尚文利);  Li L(李琳);  Wan M(万明);  Zeng P(曾鹏)
View  |  Adobe PDF(666Kb)  |  Favorite  |  View/Download:194/97  |  Submit date:2016/06/21
One-class Svm  Intrusion Detection  Modbus Function Code  Pso