您当前的位置:
首页 >
文章列表页 >
Research on vulnerability and security technology of industrial Ethernet protocol
Comprehensive Reviews | 更新时间:2024-06-05
    • Research on vulnerability and security technology of industrial Ethernet protocol

    • Journal on Communications   Vol. 38, Issue Z2, Pages: 185-196(2017)
    • DOI:10.11959/j.issn.1000-436x.2017277    

      CLC: TP309
    • Online First:2017-11

      Published:25 November 2017

    移动端阅览

  • Tao FENG, Ye LU, Jun-li FANG. Research on vulnerability and security technology of industrial Ethernet protocol[J]. Journal on Communications, 2017, 38(Z2): 185-196. DOI: 10.11959/j.issn.1000-436x.2017277.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

3434

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Research on covert attack payload generation and insensitive injection mechanism for industrial control systems for protocol evasion and data manipulation
Survey on chaos-based low probability of interception communication technology
Survey of industrial Internet traffic analysis technology
Survey on privacy protection indoor positioning
Survey of capacity limits and implementation techniques in wireless covert communication

Related Author

PENG Xiangzhen
SHI Jianyu
LIU Yunqi
ZHENG Chengliang
CUI Xiaohui
ZHOU Ang
WANG Shilian
CHEN Weiyu

Related Institution

Department of Civil and Environmental Engineering, The Hong Kong University of Science and Technology, Hongkong
Hubei Provincial Key Laboratory of Data Intelligence
School of Cyber Science and Engineering, Wuhan University
Beijing Institute of Astronautical Systems Engineering
College of Electronic Science and Technology, National University of Defense Technology
0