期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Security for Industrial Communication Systems
1
《可编程控制器与工厂自动化(PLC FA)》 2006年第8期31-33,共3页
B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maint... B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maintenance and service costs of stand-alone embedded systems can be reduced when they can be 展开更多
关键词 DCOM IEC 61850 In OPC Security for industrial communication systems
下载PDF
Security for Industrial Communication Systems
2
《可编程控制器与工厂自动化(PLC FA)》 2006年第7期29-31,共3页
B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later secti... B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi- 展开更多
关键词 Security for industrial communication systems WORK PRO NODE
下载PDF
Security for Industrial Communication Systems
3
《可编程控制器与工厂自动化(PLC FA)》 2006年第9期26-27,共2页
D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sen... D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sensors,meters,and actuators.A large number of specialized and partly proprietary commu- nication systems,media,and protocols can be found on this level.Most were developed at a time when security issues were of lesser con- cern than today,and when no practical secu- rity measures were available. 展开更多
关键词 Security for industrial communication systems In LINE
下载PDF
Security for Industrial Communication Systems
4
《可编程控制器与工厂自动化(PLC FA)》 2006年第10期26-27,共2页
E. Security of Embedded Systems for Industrial Control and Communication Industrial automation controllers are typically implemented on embedded computers. Such embedded systems have to cope with restrictions on cost,... E. Security of Embedded Systems for Industrial Control and Communication Industrial automation controllers are typically implemented on embedded computers. Such embedded systems have to cope with restrictions on cost, real-time performance, power consumption, and other constraints which are even more demanding than in large workstations. A reference discusses these aspects with the example of a thermostat con- 展开更多
关键词 Security for industrial communication systems In
下载PDF
Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems 被引量:4
5
作者 Ming Wan Jiangyuan Yao +1 位作者 Yuan Jing Xi Jin 《Computers, Materials & Continua》 SCIE EI 2018年第6期447-463,共17页
As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their seri... As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their serious privacy.Based on the SDN(Software Defined Network)technology,this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols,and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems.Furthermore,aiming at the unknown protocol specification and message format,this approach first restructures the industrial communication sessions and merges the payloads from industrial communication packets.After that,the feature selection and event sequence extraction can be carried out by using the N-gram model and K-means algorithm.Based on the obtained event sequences,this approach finally trains an event-based HMM(Hidden Markov Model)to identify aberrant industrial communication behaviors.Experimental results clearly show that the proposed approach has obvious advantages of classification accuracy and detection efficiency. 展开更多
关键词 Event sequence anomaly detection non-public industrial communication protocols SDN
下载PDF
STUDY ON BEIJING'S EMERGING MOBILE COMMUNICATION INDUSTRIAL CLUSTER AND ITSPOLICY IMPLICATIONS 被引量:3
6
作者 SUNTie-shan LIGuo-ping LUMing-hua 《Chinese Geographical Science》 SCIE CSCD 2003年第2期104-111,共8页
This paper is a preliminary and illustrative case study of Beijing's emergingmobile communication industrial (MCI) cluster, which helps understand the cluster by qualitativeanalysis and description. Beijing's ... This paper is a preliminary and illustrative case study of Beijing's emergingmobile communication industrial (MCI) cluster, which helps understand the cluster by qualitativeanalysis and description. Beijing's MCI cluster is emerging as far as the competence of the industryand its spatial concentration are concerned, although it is not the type of the cluster describedby PORTER due to the low competence of indigenous firms. The formation of the cluster can beexplained by means of the factor and demand conditions of Beijing. However, it is mostly determinedby the multinationals that promote the growth of the industry and the formation of the cluster, andby the government that also plays a key role in many ways. As a matter of fact, the interactionbetween the multinationals and the local government is the key to understanding the formation of thecluster. All in all, Beijing's emerging MCI cluster is a value-chain, geographically concentratedbut non-localized cluster, which is highly dominated by the multinationals and the local government.Its special characteristics bear some policy implications as to the change of the roles of thelocal government and the localization of multinationals, etc. 展开更多
关键词 industrial cluster mobile communication industry MULTINATIONALS BEIJING
下载PDF
Precoder Design and Impulsive Noise Mitigation Scheme for Industrial Wireless Communications 被引量:2
7
作者 Yanjing Sun Xinyan Li +3 位作者 Jiasi Zhou Ruirui Chen BowenWang Yanfen Wang 《China Communications》 SCIE CSCD 2021年第4期182-197,共16页
In industrial wireless scenarios,the impulsive noise(IN)incurred by machine running or operation causes a serious influence on the powerlimited industrial wireless communications.It is challenging to ensure efficient ... In industrial wireless scenarios,the impulsive noise(IN)incurred by machine running or operation causes a serious influence on the powerlimited industrial wireless communications.It is challenging to ensure efficient and reliable transmission with quality of service(QoS)guarantee for machinetype communication devices(MTCDs).Considering the IN in the industrial process,this paper establishes the multiuser multiple-input single-output(MU-MISO)orthogonal frequency division multiplexing(OFDM)system model,which combines transmitter and receiver design.Two precoding schemes are designed to improve communication effectiveness at the transmitter.More specifically,the precoder design scheme which combines semi-definite relaxation(SDR)with difference-of-two-convex-function(D.C.)iterative algorithm,is developed by utilizing the Dinkelbach method to improve the system effectiveness.To decrease the computational complexity,we devise the quadratic-based fractional programming(QFP)algorithm,which decouples the variables by using a quadratic transform method.On this basis,the IN mitigation scheme is studied to reduce the system error rate(SER)at the receiver.With the goal of improving the reliability of industrial wireless communications,we propose a hybrid nonlinear IN mitigation(HNINM)scheme and then derive its closed-form expression of SER.The simulation results show that the proposed QFP algorithm achieves superior performance while the HNINM scheme decreases the SER of industrial wireless communications. 展开更多
关键词 industrial wireless communications precoder design impulsive noise mitigation
下载PDF
China Opens its door for Satellite Communications Industry
8
作者 Xing Xuejun 《China's Foreign Trade》 2002年第11期6-9,共4页
关键词 CO In China Opens its door for Satellite communications Industry THAN US
下载PDF
WCDMA and CDMA2000 Communication Industry Standards
9
《China Standardization》 2007年第5期35-,共1页
  Since the Ministry of Information Industry promulgated the Third Generation (3G) mobile communication "China Standard" TD-SCDMA as the standard for China's communication industry, the ministry has al...   Since the Ministry of Information Industry promulgated the Third Generation (3G) mobile communication "China Standard" TD-SCDMA as the standard for China's communication industry, the ministry has also promulgated WCDMA and CDMA2000 as industrial standards.…… 展开更多
关键词 SCDMA WCDMA and CDMA2000 communication Industry Standards
下载PDF
Organizational Learning (OL) and Organizational Innovation (OI): The Case of Information and Communication Technology (ICT) Industry in Malaysia
10
作者 Gholamreza Zandi Mohamed Sulaiman Islam Mohamed Salim 《Journal of Modern Accounting and Auditing》 2014年第11期1130-1138,共9页
The progression through which a person acquires ,;kills, understanding, and opinions regarding a particular organization or company is called organizational learning (OL). In this study, the connection between organ... The progression through which a person acquires ,;kills, understanding, and opinions regarding a particular organization or company is called organizational learning (OL). In this study, the connection between organizational innovation (OI) and OL within the inf3rmation and communication technology (ICT) industry in Malaysia is surveyed. These relationships are examined, because various previous inquiries have shown that an imperative precursor to firm performance is OL. Two hundred and seventy-eight surveys were completed by small and medium organizations across Malaysia. The connections existing between the causes of OL and the causes of OI were ascertained by using structural equation modeling (SEM). Amongst the Malaysian small- and medium-sized enterprises (SMEs) that participated in fire study, OI and OL are considerably linked. 展开更多
关键词 information and communication technology (ICT) industry INNOVATION organizational learning (OL) small- and medium-sized enterprises (SMEs)
下载PDF
A Survey on Clock Synchronization in the Industrial Internet 被引量:2
11
作者 党凡 孙熙凯 +2 位作者 刘克彬 许逸凡 刘云浩 《Journal of Computer Science & Technology》 SCIE EI CSCD 2023年第1期146-165,共20页
Clock synchronization is one of the most fundamental and crucial network communication strategies.With the expansion of the Industrial Internet in numerous industrial applications,a new requirement for the precision,s... Clock synchronization is one of the most fundamental and crucial network communication strategies.With the expansion of the Industrial Internet in numerous industrial applications,a new requirement for the precision,security,complexity,and other features of the clock synchronization mechanism has emerged in various industrial situations.This paper presents a study of standardized clock synchronization protocols and techniques for various types of networks,and a discussion of how these protocols and techniques might be classified.Following that is a description of how certain clock synchronization protocols and technologies,such as PROFINET,Time-Sensitive Networking(TSN),and other well-known industrial networking protocols,can be applied in a number of industrial situations.This study also investigates the possible future development of clock synchronization techniques and technologies. 展开更多
关键词 clock synchronization industrial communication industrial Internet wireless sensor network
原文传递
ICPFuzzer:proprietary communication protocol fuzzing by using machine learning and feedback strategies 被引量:2
12
作者 Pei-Yi Lin Chia-Wei Tien +1 位作者 Ting-Chun Huang Chin-Wei Tien 《Cybersecurity》 EI CSCD 2021年第1期427-441,共15页
The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards... The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards,like ISO 62443,to ensure the quality of the device.However,some industrial proprietary communication protocols can be customized and have complicated structures,the fuzzing system cannot quickly generate test data that adapt to various protocols.It also struggles to define the mutation field without having prior knowledge of the protocols.Therefore,we propose a fuzzing system named ICPFuzzer that uses LSTM(Long short-term memory)to learn the features of a protocol and generates mutated test data automatically.We also use the responses of testing and adjust the weight strategies to further test the device under testing(DUT)to find more data that cause unusual connection status.We verified the effectiveness of the approach by comparing with the open-source and commercial fuzzers.Furthermore,in a real case,we experimented with the DLMS/COSEM for a smart meter and found that the test data can cause a unusual response.In summary,ICPFuzzer is a black-box fuzzing system that can automatically execute the testing process and reveal vulnerabilities that interrupt and crash industrial control communication.Not only improves the quality of ICS but also improves safety. 展开更多
关键词 industrial communication protocol Network protocol fuzzing Long short-term memory(LSTM) industrial control system(ICS)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部