SIA OpenIR

Browse/Search Results:  1-10 of 24 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
Security Classification Transmission Method Based on SDN in Industrial Networks 会议论文
Cloud Computing and Security, ICCCS 2018. Lecture Notes in Computer Science, Haikou, China, June 8-10, 2018
Authors:  Zhao JM(赵剑明);  Shang WL(尚文利);  Liu, Zhoubin;  Wang, Zixiang
Adobe PDF(658Kb)  |  Favorite  |  View/Download:88/17  |  Submit date:2018/12/25
SDN  Security classification transmission  Service mechanisms  Industrial network  
Research on Industrial Control Anomaly Detection Based on FCM and SVM 会议论文
Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, July 31 - August 3, 2018
Authors:  Shang WL(尚文利);  Cui JR(崔君荣);  Song CH(宋纯贺);  Zhao JM(赵剑明);  Zeng P(曾鹏)
Adobe PDF(718Kb)  |  Favorite  |  View/Download:252/40  |  Submit date:2018/10/22
industrial control system  Modbus communication protocol  intrusion detection  fuzzy C-means clustering  supervised support vector (SVM)  
Anomaly Detection Approach based on Function Code Traffic by Using CUSUM Algorithm 会议论文
PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), Xi‘an, PEOPLES R CHINA, December 12-13, 2015
Authors:  Wan M(万明);  Shang WL(尚文利);  Zeng P(曾鹏)
Adobe PDF(1356Kb)  |  Favorite  |  View/Download:203/44  |  Submit date:2016/05/23
Anomaly Detection  Modbus/tcp  Function Code Traffic  Cumulative Sum  
Penetration testing automation assessment method based on rule tree 会议论文
2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), Shenyang, China, June 8-12, 2015
Authors:  Zhao JM(赵剑明);  Shang WL(尚文利);  Wan M(万明);  Zeng P(曾鹏)
Adobe PDF(357Kb)  |  Favorite  |  View/Download:192/57  |  Submit date:2015/12/19
Penetration Testing  Security Assessment  Rule Tree  Network Security  
Research on Self-Learning Method on Generation and Optimization of Industrial Firewall Rules 会议论文
2nd International Conference on Information Security and Cyber Forensics (InfoSec2015), Cape Town, South Africa, November 15-17, 2015
Authors:  Shang WL(尚文利);  Wan M(万明);  Zeng P(曾鹏);  Qiao QS(乔全胜)
Adobe PDF(641Kb)  |  Favorite  |  View/Download:176/40  |  Submit date:2015/12/19
Industrial Firewall  Intrusion Detection  Self-learning Method  "white-list" Rule  
Industrial communication intrusion detection algorithm based on improved one-class SVM 会议论文
2015 World Congress on Industrial Control Systems Security, WCICSS 2015, London, United kingdom, December 14-16, 2015
Authors:  Shang WL(尚文利);  Li L(李琳);  Wan M(万明);  Zeng P(曾鹏)
Adobe PDF(666Kb)  |  Favorite  |  View/Download:217/101  |  Submit date:2016/06/21
One-class Svm  Intrusion Detection  Modbus Function Code  Pso  
Modbus/TCP communication anomaly detection based on PSO-SVM 会议论文
Applied Mechanics and Materials, Beijing, China, November 29-30, 2013
Authors:  Shang WL(尚文利);  Zhang SS(张盛山);  Wan M(万明)
Adobe PDF(1106Kb)  |  Favorite  |  View/Download:303/88  |  Submit date:2014/04/16
Intrusion Detection  
C2Puzzle: A Novel Computational Client Puzzle for Network Security 会议论文
Advanced Materials Research, Xi'an, China, September 28-29, 2013
Authors:  Wan M(万明);  Shang WL(尚文利);  Zhao JM(赵剑明);  Zhang SS(张盛山)
Adobe PDF(266Kb)  |  Favorite  |  View/Download:298/46  |  Submit date:2013/12/26
Computational Client Puzzle  Discrete Logarithm Problem  Network Security  Prime Factorization  
Development of Vehicle Management Platform Based on ArcGIS 会议论文
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER, NETWORKS AND COMMUNICATION ENGINEERING (ICCNCE 2013), Beijing, MAY 23-24, 2013
Authors:  Mei J(梅晶);  Song H(宋宏);  Shang WL(尚文利);  Zhou XF(周晓锋)
Adobe PDF(1243Kb)  |  Favorite  |  View/Download:209/48  |  Submit date:2014/04/16
Vehicle Management Platform  Arcgis  Real-time Monitoring  Data Transparent Transmission  History Track Replay  
Bidirectional structural mapping models for constructing rule-based systems 会议论文
Proceedings of the 31st Chinese Control Conference, CCC 2012, Hefei, China, July 25, 2012 - July 27, 2012
Authors:  Yuan J(袁杰);  Shang WL(尚文利);  Jiang B(姜波);  Lou, Yi
Adobe PDF(172Kb)  |  Favorite  |  View/Download:476/118  |  Submit date:2013/04/21
Unapplied Research  Developed Model  Fuzzy Colored Petri Nets  Fuzzy Production Rules  Inverse Mapping  Mapping Functions  Mapping Mechanism  Mapping Model  Structural Mapping