Survey on industrial control protocol security research
The security of industrial control protocol is the cornerstone to ensure ICS’s stable operation, a large number of industrial control protocols in the design phase ignore the consideration of security, resulting in most of the mainstream industrial control protocols generally having vulnerabilities....
Saved in:
Main Authors: | HUANG Tao, WANG Zhiwei, LIU Jiachi, LONG Qianxi, KUANG Boyu, FU Anmin, ZHANG Yuqing |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2024-06-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024104/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Survey on RDMA protocol applications and security protection technologies
by: LIU Yumeng, et al.
Published: (2024-04-01) -
Research on vulnerability and security technology of industrial Ethernet protocol
by: Tao FENG, et al.
Published: (2017-11-01) -
Design and implementation of national security vulnerability database
by: ZHANG Yu-qing1, et al.
Published: (2011-01-01) -
Automated vulnerability discovery method for 5G core network protocol
by: Peixiang WU, et al.
Published: (2024-02-01) -
SIM: a secure IP protocol for MANET
by: Rong-sen LI, et al.
Published: (2013-08-01)