Suggested Topics within your search.
Suggested Topics within your search.
-
1
Enhancing configuration security with heterogeneous read points
Published 2025-03-01Subjects: “…System security…”
Get full text
Article -
2
Biomimetic security model based on immune system control mechanism
Published 2025-04-01Subjects: Get full text
Article -
3
A survey on detection and localisation of false data injection attacks in smart grids
Published 2024-12-01Subjects: “…power system security…”
Get full text
Article -
4
Automated configuration,simulation and verification platform for event-driven home automation IoT system
Published 2019-09-01Subjects: “…internet of things;IFTTT framework;system security;model checking…”
Get full text
Article -
5
A Novel Optical Frequency-Hopping Scheme Based on a Flexible Structure for Secure Optical Communications
Published 2019-01-01Subjects: Get full text
Article -
6
Research status and outlook of Android security
Published 2016-10-01Subjects: “…Android system;security mechanism;security ris;malware;analysis and defense…”
Get full text
Article -
7
Dynamic Capacity Sharing for Cyber–Physical Resilience of EV Charging
Published 2024-12-01Subjects: Get full text
Article -
8
Ontology model based on security parameters capturing process for network systems
Published 2017-02-01Subjects: Get full text
Article -
9
Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104
Published 2024-09-01Subjects: Get full text
Article -
10
A Novel Optical Frequency-Hopping System Based on DFB Laser Integrated With an EA Modulator
Published 2019-01-01Subjects: Get full text
Article -
11
AnyTEE: An Open and Interoperable Software Defined TEE Framework
Published 2025-01-01Subjects: Get full text
Article -
12
Policy-adaptive capability inheritance algorithm consistent with POSIX standard
Published 2006-01-01Subjects: “…operating system security…”
Get full text
Article -
13
FedAware: a distributed IoT intrusion detection method based on fractal shrinking autoencoder
Published 2025-08-01Subjects: Get full text
Article -
14
Real time database system data security collection scheme
Published 2016-10-01Subjects: Get full text
Article -
15
Blockchain Technology in Accounting and Auditing
Published 2020-03-01Subjects: Get full text
Article -
16
Multi‐data classification detection in smart grid under false data injection attack based on Inception network
Published 2024-10-01Subjects: Get full text
Article -
17
Security state estimation based on signal reconstruction for multi‐vehicle systems under malicious attack
Published 2024-11-01Subjects: “…control system security…”
Get full text
Article -
18
Error Analysis of the Convex Hull Method for the Solution of the Distribution System Security Region
Published 2025-05-01Subjects: “…distribution system security region (DSSR)…”
Get full text
Article -
19
RESPONSE- a resilient framework to manage cyber-attacks on cyber-physical process systems
Published 2025-06-01Subjects: Get full text
Article -
20
Establishment method of civil aircraft abnormal operation procedure items
Published 2025-04-01Subjects: “…system security analysis…”
Get full text
Article