222 results on '"Li, Jung‐Shian"'
Search Results
2. Dam Control System’s Cybersecurity Testbed
3. An Emulation Mechanism for PLC Communication Features
4. Threats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement
5. Intrusion Detection in IoT Network Traffic Using Markov Model
6. Cover Image
7. Enhancing Dam Security and Water Level Alerting with Blockchain Technology
8. A Case Study of Network-Based Intrusion Detection System Deployment in Industrial Control Systems with Network Isolation
9. Industrial Control System State Monitor Using Blockchain Technology
10. The Detecting Abnormal Operations in ICS Using Finite-State Machines
11. MiniDAM: A Dam Cybersecurity Toolkit
12. The Security Issue of ICS: The Use of IT Infrastructure
13. A Survey on SCADA Security and Honeypot in Industrial Control System
14. VoWi‐Fi security threats: Address resolution protocol attack and countermeasures
15. Network Intrusion Detection Using CNN-based Classification Method
16. Cyber Security in a 5G-Based Smart Healthcare Network: A Base Station Case Study
17. Anomaly Detection on Network Traffic for the Healthcare Internet of Things
18. IDS Malicious Flow Classification
19. Evaluation and Build to honeypot System about SCADA Security for Large-Scale IoT Devices
20. A novel tag searching protocol with time efficiency and searching accuracy in RFID systems
21. Simulation and Analysis of Common Attacks against PLCs Used in Dam Testbed
22. Distributed Node Scheduling Algorithms for Multiple Group Communications in Wireless Multi-hop Networks
23. Defending Cloud Computing Environment Against the Challenge of DDoS Attacks Based on Software Defined Network
24. Selection Strategy for VM Migration Method
25. Staggered approach for alleviating TCP Incast in simultaneous Multi-VM migration
26. Cyber Security in a 5G-Based Smart Healthcare Network: A Base Station Case Study †.
27. Anomaly Detection on Network Traffic for the Healthcare Internet of Things †.
28. Efficient tag reading protocol for large-scale RFID systems with pre-reading
29. A Survey on SCADA Security and Honeypot in Industrial Control System
30. 5G-Based Smart Healthcare and Mobile Network Security: Combating Fake Base Stations.
31. A Non-normal Warning System for Dam Operation Using Machine Learning
32. Threat Analysis of Cyber Security Exercise for Reservoir Testbed Based on Attack Tree
33. Traffic-Oriented STDMA Scheduling in Multi-hop Wireless Networks
34. A Robust Countermeasures for Poisoning Attacks on Deep Neural Networks of Computer Interaction Systems
35. Defending Cloud Computing Environment Against the Challenge of DDoS Attacks Based on Software Defined Network
36. Intelligent Adjustment Forwarding: A compromise between end-to-end and hop-by-hop transmissions in VANET environments
37. Cyberattack Defense with Appropriate Address-changing Frequency in Industrial Control Systems
38. Countermeasure of Polluting Health-Related Dataset for Data Mining
39. A New Poisoning Attacks on Deep Neural Networks
40. Efficient group multicast node scheduling schemes in multi-hop wireless networks
41. An efficient diversity-driven selective forwarding approach for replicated data queries in wireless sensor networks
42. Extendable ICS Honeypot Design with Modbus/TCP
43. Data Balanced Algorithm Based on Generative Adversarial Network
44. Industrial Control System Cybersecurity Testbed with TSN Feature
45. Blockchain-based Verification Mechanism for Industrial Control System
46. Dynamic Interval Strategy for MT6D in IoT Systems
47. Novel Advanced Broadcast Scheme for Efficient Safety Message Collision Alleviation in Vehicular Networks
48. Achieving maximal VoIP calls in 802.11 wireless networks
49. Design of Industrial Control System Secure Communication Using Moving Target Defense with Legacy Infrastructure
50. Malicious Flows Generator Based on Data Balanced Algorithm
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.