| |
| 前言 |
| 孙利民,李向阳,翁健,王骞 |
| Published September 1, 2019 |
| 2019,4(3):1 [Abstract] [View PDF(121.46 K)] |
| |
| A Survey for IoT Security Assessment Technologies |
| CHEN Zhao, ZENG Fanping, CHEN Guozhu, ZHANG Yanyong and LI Xiangyang |
| Published September 1, 2019 |
| 2019,4(3):2-16 [Abstract] [View PDF(560.63 K)] |
| |
| Survey of Internet of Vehicles Security |
| LI Xinghua, ZHONG Cheng, CHEN Ying, ZHANG Huilin and WENG Jian |
| Published September 1, 2019 |
| 2019,4(3):17-33 [Abstract] [View PDF(1.33 M)] |
| |
| A Comprehensive Survey of IP Geolocation and Evasion |
| WANG Zhihao, ZHANG Weidong, WEN Hui, ZHU Hongsong, YIN Libo and SUN Limin |
| Published September 1, 2019 |
| 2019,4(3):34-47 [Abstract] [View PDF(700.41 K)] |
| |
| Recent Advances in PLC Attack and Protection Technology |
| XU Zhen, ZHOU Xiaojun, WANG Liming, CHEN Zelong, CHEN Kai, YAN Zhenbo, ZHANG Wei and CHEN Cong |
| Published September 1, 2019 |
| 2019,4(3):48-69 [Abstract] [View PDF(6.27 M)] |
| |
| Oscillation Attack Modelling and Detection with Penetration of Distributed Energy Resources in Smart Grid |
| LIU Yang, GUI Yuhong, AN Dou, GUAN Xiaohong and LIU Ting |
| Published September 1, 2019 |
| 2019,4(3):70-82 [Abstract] [View PDF(1.06 M)] |
| |
| Method of ICS Honeypot Identification Based on Packet-Sharding |
| YOU Jianzhou, ZHANG Yueyang, LV Shichao, CHEN Xin, YIN Libo and SUN Limin |
| Published September 1, 2019 |
| 2019,4(3):83-92 [Abstract] [View PDF(2.18 M)] |
| |
| Redundant RFID Data Filtering Algorithm Research Based on Bloom Filter |
| HUANG Weiqing, ZHANG Yanfang, CAO Ziwen and WANG Siye |
| Published September 1, 2019 |
| 2019,4(3):93-105 [Abstract] [View PDF(714.69 K)] |
| |