虫虫首页|资源下载|资源专辑|精品软件
登录|注册

Cyber-Physical

  • 工业系统安全问题和解决办法

    Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, anddistributed control systems (DCSs), and then discusses security issues and remedies. This document alsoexplains the benefits and limitations of two cryptographic solutions (digital signatures and encryption) andelaborates on the reasons for using security ICs in an ICS to support cryptography.

    标签: 工业系统 安全问题

    上传时间: 2013-10-08

    上传用户:woshinimiaoye

  • total是最后的版本。包括的全是最新的物理层和数据链路层。另外还有pro1和pro2的打包程序和调用它们形成的各自的界面程序

    total是最后的版本。包括的全是最新的物理层和数据链路层。另外还有pro1和pro2的打包程序和调用它们形成的各自的界面程序,以及最后调用各个界面形成的总界面程序。由于时间匆忙,对数据链路层协议的界面化工作只做到了pro2,总界面上已经留了所有6个程序的地方。PhysicalLayer包中包含了所有的物理层的程序的版本,以及它们各自的演示程序(一般为Physical)及打包程序(一般为PhyLayer)。显示了整个物理层编写及修改演化的过程,仅供参考。Datalink Layer包中包含了数据链路层程序的各个版本。包含数据链路层基本操作模块(Datalink.java)及各个协议的版本(pro1-pro3)。以及它们各自的演示程序及打包程序。显示了整个物理层编写及修改演化的过程,仅供参考。运行方法:只需要Java的运行环境。先要预装java,这里使用的是java的j2sdk-1_4_2_01-windows-i586版本。最新的1.5.0应该也支持。采用的编译器是Jcreator,其他的编译器也应该是可以用的。

    标签: total pro1 pro2 程序

    上传时间: 2013-12-19

    上传用户:奇奇奔奔

  • Attributes, Constraints, and Carry Logic Overview Information for Mentor Customers Schematic S

    Attributes, Constraints, and Carry Logic Overview Information for Mentor Customers Schematic Syntax UCF/NCF File Syntax Attributes/Logical Constraints Placement Constraints Relative Location (RLOC) Constraints Timing Constraints Physical Constraints Relationally Placed Macros (RPM) Carry Logic in XC4000 FPGAs Carry Logic in XC5200 FPGAs

    标签: Constraints Information Attributes Customers

    上传时间: 2015-05-12

    上传用户:cc1015285075

  • Linux 虚拟网络接口 实例 In the Linux (or Unix) world, most network interfaces, such as eth0 and ppp0, are a

    Linux 虚拟网络接口 实例 In the Linux (or Unix) world, most network interfaces, such as eth0 and ppp0, are associated with a physical device that is in charge of transmitting and receiving data packets. However, some logical network interfaces don t feature any physical packet transmission. The most well-known examples of these "virtual" interfaces are the shaper and eql interfaces.

    标签: Linux interfaces network world

    上传时间: 2014-01-11

    上传用户:zhangzhenyu

  • Writing an Input Module The sample module introduced here is called idiom (Input Device for Interc

    Writing an Input Module The sample module introduced here is called idiom (Input Device for Intercepting Output of Mice), The sample module registers itself with the USB kernel subsystem as a mouse driver and with the input management subsystem as a keyboard driver. idiom translates mouse movement events into keyboard input events: it reports arrow events to the input system according to how the physical mouse is moved.

    标签: Input introduced Writing Device

    上传时间: 2015-06-24

    上传用户:731140412

  • 可在系统引导时工作的RootKit,较简单 1) It s very small.The basic framework is just about 100 lines of assembly

    可在系统引导时工作的RootKit,较简单 1) It s very small.The basic framework is just about 100 lines of assembly code.It supports 2000,XP,2003 2) It patches the kernel at runtime(no files are patched on disk).(basic version has this code removed , so as others could understand it easily). 3) BOOT KIT is PXE-compatible. 4) It can even lead to first ever PXE virus 5)It also enables you to load other root kits if you have physical access(Normally root kits can only be loaded by the administrator)

    标签: framework assembly RootKit small

    上传时间: 2014-01-02

    上传用户:gdgzhym

  • 红外线开发资料

    红外线开发资料,红外线协议,Infrared Data Association Serial Infrared Physical Layer Measurement Guidelines

    标签: 红外线 开发资料

    上传时间: 2014-12-04

    上传用户:jjj0202

  • 《DCOM入门》随书源码 Chapter 1 (Distributed Computing) N/A Chapter 2 (DCOM Overview) N/A Chapter 3 (Objec

    《DCOM入门》随书源码 Chapter 1 (Distributed Computing) N/A Chapter 2 (DCOM Overview) N/A Chapter 3 (Objects) Basics Chapter 4 (Components) Basics Chapter 5 (Infrastructure) Infrastructure Chapter 6 (Building Components with ATL) OCRServer Chapter 7 (Using COM Objects) OCRClient Chapter 8 (COM in Cyberspace) Cyber Chapter 9 (Applying Security) Security Chapter 10 (Connecting Objects) Chat

    标签: Chapter DCOM Distributed Computing

    上传时间: 2014-01-02

    上传用户:haoxiyizhong

  • This paper presents an interactive technique that produces static hairstyles by generating individu

    This paper presents an interactive technique that produces static hairstyles by generating individual hair strands of the desired shape and color, subject to the presence of gravity and collisions. A variety of hairstyles can be generated by adjusting the wisp parameters, while the deformation is solved efficiently, accounting for the effects of gravity and collisions. Wisps are generated employing statistical approaches. As for hair deformation, we propose a method which is based on physical simulation concepts but is simplified to efficiently solve the static shape of hair. On top of the statistical wisp model and the deformation solver, a constraint-based styler is proposed to model artificial features that oppose the natural flow of hair under gravity and hair elasticity, such as a hairpin. Our technique spans a wider range of human hairstyles than previously proposed methods, and the styles generated by this technique are fairly realistic.

    标签: interactive hairstyles generating technique

    上传时间: 2013-12-20

    上传用户:sssl

  • CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2

    CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NETWORK SECURITY 13 DOMAIN 4 – CRYPTOGRAPHY 34 DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46 DOMAIN 6 – OPERATIONS SECURITY 56 DOMAIN 7 – APPLICATIONS AND SYSTEM DEVELOPMENT 63 DOMAIN 8 – BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING 70 DOMAIN 9 – LAW, INVESTIGATION AND ETHICS 78 DOMAIN 10 – PHYSICAL SECURITY 87

    标签: CISSP MANAGEMENT PRACTICES SECURITY

    上传时间: 2014-02-13

    上传用户:sy_jiadeyi