Vulnerability Analysis of CSP Based on Stochastic Game Theory
With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial communication protocols (ICPs), which has not yet been at...
Saved in:
Main Authors: | Jiajun Shen, Dongqin Feng |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2016-01-01
|
Series: | Journal of Control Science and Engineering |
Online Access: | http://dx.doi.org/10.1155/2016/4147251 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Extended-CSP based analysis of non-repudiation protocols
by: HAN Zhi-geng, et al.
Published: (2008-01-01) -
Scientific dissemination in CSP: importance, advances, and challenges
by: Luciana Dias de Lima, et al.
Published: (2025-01-01) -
Application of Cloud Model in Evaluation of Urban Vulnerability to Floods Based on Improved Game Theory and Combined Weight
by: WANG Dayang
Published: (2020-01-01) -
Novel machine learning-driven comparative analysis of CSP, STFT, and CSP-STFT fusion for EEG data classification across multiple meditation and non-meditation sessions in BCI pipeline
by: Nalinda D. Liyanagedera, et al.
Published: (2025-02-01) -
Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach
by: Zhi-geng HAN, et al.
Published: (2012-11-01)