Cybersecurity Vulnerability Scanner for Digital Nuclear Power Plant Instrumentation and Control Systems | 0 | 0.34 | 2018 |
A Retransmission Method for Improving Transmission Reliability in One-way Transmission. | 0 | 0.34 | 2017 |
Design of Industrial Firewall System Based on Multiple Access Control Filter | 0 | 0.34 | 2014 |
Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks. | 1 | 0.37 | 2014 |
Whitelist Generation Technique for Industrial Firewall in SCADA Networks | 2 | 0.45 | 2014 |
A hierarchical approach to traffic anomaly detection using image processing technique | 0 | 0.34 | 2010 |
Hash Function with Variable Output Length | 0 | 0.34 | 2009 |
Information-Revealing with Distributed Escrow Authorities | 0 | 0.34 | 2009 |
An Efficient Algorithm for Intrusion Source Identification | 0 | 0.34 | 2008 |
Security Requirement for Cyber Attack Traceback | 0 | 0.34 | 2008 |
PKG-MIB: Private-Mib for Package-Based Linux Systems in a Large Scale Management Domain | 0 | 0.34 | 2007 |
Design and Implementation of Policy Decision Point in Policy-Based Network | 8 | 0.65 | 2005 |
Role-based policy distribution techniques in policy-based networks | 0 | 0.34 | 2004 |
Active security management based on secure zone cooperation | 4 | 0.46 | 2004 |
Design of a LDAP Schema Based on Network Security Policy Information Model for Storing Security Policy | 0 | 0.34 | 2003 |
Packet Size Reduction using Both Distributed CMDB and Kerberos System in Active Networks | 0 | 0.34 | 2002 |
ESES/Cipher: A Design of XML Encryption System | 0 | 0.34 | 2001 |
Design of a security platform for CORBA based application | 1 | 0.38 | 1997 |