SIA OpenIR

Browse/Search Results:  1-10 of 22 Help

Selected(0)Clear Items/Page:    Sort:
Software-defined data flow detection and control approach for industrial modbus/TCP communication 会议论文
Advances in Intelligent, Interactive Systems and Applications - Proceedings of the 3rd International Conference on Intelligent, Interactive Systems and Applications IISA2018, HongKong, China, June 29-30, 2018
Authors:  Wan M(万明);  Song Y(宋岩);  Jing, Yuan;  Wang ZW(王照伟);  Zhao JM(赵剑明);  Zhang, Zhongshui
View  |  Adobe PDF(310Kb)  |  Favorite  |  View/Download:27/2  |  Submit date:2019/02/24
Modbus/TCP  SDN  Flow detection and control  Cyber security  
ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid 期刊论文
IEEE Transactions on Information Forensics and Security, 2019, 卷号: 14, 期号: 2, 页码: 445-458
Authors:  Xia XF(夏小芳);  Xiao Y(肖杨);  Liang W(梁炜)
View  |  Adobe PDF(2010Kb)  |  Favorite  |  View/Download:176/10  |  Submit date:2018/07/31
Electricity Theft  Smart Grid  Security  Group Testing  
GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids 期刊论文
IEEE Transactions on Network Science and Engineering, 2018, 页码: 1-12
Authors:  Xia XF(夏小芳);  Xiao Y(肖杨);  Liang W(梁炜);  Zheng M(郑萌)
View  |  Adobe PDF(1908Kb)  |  Favorite  |  View/Download:80/6  |  Submit date:2018/07/31
Electricity theft  smart grid  smart meters  cyber attacks  security  
Secure resource allocation for energy harvesting cognitive radio sensor networks without and with cooperative jamming 期刊论文
Computer Networks, 2018, 卷号: 141, 页码: 189-198
Authors:  Xu C(许驰);  Song CH(宋纯贺);  Zeng P(曾鹏);  Yu HB(于海斌)
View  |  Adobe PDF(1250Kb)  |  Favorite  |  View/Download:126/16  |  Submit date:2018/07/01
Cognitive Radio Sensor Networks  Energy Harvesting  Small Cell  Resource Allocation  Physical Layer Security  Secrecy Rate  
Node-identification-based secure time synchronization in industrial wireless sensor networks 期刊论文
Sensors (Switzerland), 2018, 卷号: 18, 期号: 8, 页码: 1-18
Authors:  Wang ZW(王照伟);  Zeng P(曾鹏);  Kong LH(孔令和);  Li D(李栋);  Jin X(金曦)
View  |  Adobe PDF(695Kb)  |  Favorite  |  View/Download:123/18  |  Submit date:2018/09/09
Time Synchronization  Industrial Wireless Sensor Networks  Security  Sybil Attacks  Message Manipulation Attacks  Clock Skew  
Security Classification Transmission Method Based on SDN in Industrial Networks 会议论文
Cloud Computing and Security, ICCCS 2018. Lecture Notes in Computer Science, Haikou, China, June 8-10, 2018
Authors:  Zhao JM(赵剑明);  Shang WL(尚文利);  Liu, Zhoubin;  Wang, Zixiang
View  |  Adobe PDF(658Kb)  |  Favorite  |  View/Download:37/4  |  Submit date:2018/12/25
SDN  Security classification transmission  Service mechanisms  Industrial network  
Coded grouping-based inspection algorithms to detect malicious meters in neighborhood area smart grid 期刊论文
Computers and Security, 2018, 卷号: 77, 页码: 547-564
Authors:  Xia XF(夏小芳);  Xiao Y(肖杨);  Liang W(梁炜);  Zheng M(郑萌)
View  |  Adobe PDF(1748Kb)  |  Favorite  |  View/Download:88/7  |  Submit date:2018/06/17
Smart Grid  Malicious Meter Inspection  Theft Of Electricity  Grouping  Intrusion Detection  Security  
A source anonymity-based lightweight secure AODV protocol for fog-based MANET 期刊论文
Sensors (Switzerland), 2017, 卷号: 17, 期号: 6, 页码: 1-16
Authors:  Fang WD(房卫东);  Zhang WX(张武雄);  Xiao JC(肖金超);  Yang Y(杨旸);  Chen W(陈伟)
View  |  Adobe PDF(1928Kb)  |  Favorite  |  View/Download:77/11  |  Submit date:2017/07/17
Mobile Ad Hoc Network  Fog Computing  Security  Aodv  Energy Efficiency  
Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid 期刊论文
COMPUTER JOURNAL, 2017, 卷号: 60, 期号: 12, 页码: 1852-1870
Authors:  Xia XF(夏小芳);  Liang W(梁炜);  Xiao Y(肖杨);  Zheng M(郑萌)
View  |  Adobe PDF(1769Kb)  |  Favorite  |  View/Download:82/8  |  Submit date:2018/03/25
Smart Grid  Smart Meter  Malicious Meter  Electricity Theft  Security  Cyber-physical System  
Penetration testing automation assessment method based on rule tree 会议论文
2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), Shenyang, China, June 8-12, 2015
Authors:  Zhao JM(赵剑明);  Shang WL(尚文利);  Wan M(万明);  Zeng P(曾鹏)
View  |  Adobe PDF(357Kb)  |  Favorite  |  View/Download:139/38  |  Submit date:2015/12/19
Penetration Testing  Security Assessment  Rule Tree  Network Security