Loading…
Electric power protection system
LOU YITING, WANG JING, ZHANG QIUJU, XU XIAOZHONG, FANG YUNHUI, CHEN XIAOJIE, WANG YONG, WANG XIAOHUI
Year of Publication 22.10.2014
Get full text
Year of Publication 22.10.2014
Patent
Loading…
Security researchers and hackers gather in the Middle East
Published in Middle East Company News
(15.01.2007)
Get full text
Newspaper Article
Loading…
Human Factors in Cyber Warfare: Alternative Perspectives
Knott, Benjamin A, Mancuso, Vincent F, Bennett, Kevin, Finomore, Victor, McNeese, Michael, McKneely, Jennifer A., Beecher, Maria
Published in Proceedings of the Human Factors and Ergonomics Society Annual Meeting (01.09.2013)
Published in Proceedings of the Human Factors and Ergonomics Society Annual Meeting (01.09.2013)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis
Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng
Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.08.2017)
Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.08.2017)
Get full text
Conference Proceeding
Loading…
Zero-trust-based power grid safety protection method, framework and computer storage medium
ZHANG RUIJIA, ZHENG JIXIANG, LI CHONGJIANG, YANG MUCHUAN, YAO HAO, CHEN WENJIE, YANG YI, ZHANG QIUMING
Year of Publication 28.02.2025
Get full text
Year of Publication 28.02.2025
Patent
Loading…
ACCELERATED DATA MOVEMENT BETWEEN DATA PROCESSING UNIT (DPU) AND GRAPHICS PROCESSING UNIT (GPU) TO ADDRESS REAL-TIME CYBERSECURITY REQUIREMENTS
Year of Publication 13.04.2022
Get full text
Patent
Loading…
TV networks attack people meters: 3 Edition
Published in The Vancouver sun (1986)
(20.01.1988)
Get full text
Newspaper Article
Loading…
Multi-stage attack trend prediction method and device based on causal relationship graph, and storage medium
ZHANG LIANG, ZHANG XIANGDONG, ZHU GUANGMING, ZHANG FENGJUN, DAI CHAOXIA, SHEN PEIYI
Year of Publication 07.03.2023
Get full text
Year of Publication 07.03.2023
Patent
Loading…
Loading…
A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application
Brooks, Tyson, Kaarst-Brown, Michelle, Caicedo, Carlos, Joon Park, McKnight, Lee
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Get full text
Conference Proceeding