亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁(yè)| 資源下載| 資源專輯| 精品軟件
登錄| 注冊(cè)

Cyber-Physical

  • 工業(yè)系統(tǒng)安全問(wèn)題和解決辦法

    Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, anddistributed control systems (DCSs), and then discusses security issues and remedies. This document alsoexplains the benefits and limitations of two cryptographic solutions (digital signatures and encryption) andelaborates on the reasons for using security ICs in an ICS to support cryptography.

    標(biāo)簽: 工業(yè)系統(tǒng) 安全問(wèn)題

    上傳時(shí)間: 2013-10-09

    上傳用戶:woshinimiaoye

  • total是最后的版本。包括的全是最新的物理層和數(shù)據(jù)鏈路層。另外還有pro1和pro2的打包程序和調(diào)用它們形成的各自的界面程序

    total是最后的版本。包括的全是最新的物理層和數(shù)據(jù)鏈路層。另外還有pro1和pro2的打包程序和調(diào)用它們形成的各自的界面程序,以及最后調(diào)用各個(gè)界面形成的總界面程序。由于時(shí)間匆忙,對(duì)數(shù)據(jù)鏈路層協(xié)議的界面化工作只做到了pro2,總界面上已經(jīng)留了所有6個(gè)程序的地方。PhysicalLayer包中包含了所有的物理層的程序的版本,以及它們各自的演示程序(一般為Physical)及打包程序(一般為PhyLayer)。顯示了整個(gè)物理層編寫及修改演化的過(guò)程,僅供參考。Datalink Layer包中包含了數(shù)據(jù)鏈路層程序的各個(gè)版本。包含數(shù)據(jù)鏈路層基本操作模塊(Datalink.java)及各個(gè)協(xié)議的版本(pro1-pro3)。以及它們各自的演示程序及打包程序。顯示了整個(gè)物理層編寫及修改演化的過(guò)程,僅供參考。運(yùn)行方法:只需要Java的運(yùn)行環(huán)境。先要預(yù)裝java,這里使用的是java的j2sdk-1_4_2_01-windows-i586版本。最新的1.5.0應(yīng)該也支持。采用的編譯器是Jcreator,其他的編譯器也應(yīng)該是可以用的。

    標(biāo)簽: total pro1 pro2 程序

    上傳時(shí)間: 2013-12-19

    上傳用戶:奇奇奔奔

  • Attributes, Constraints, and Carry Logic Overview Information for Mentor Customers Schematic S

    Attributes, Constraints, and Carry Logic Overview Information for Mentor Customers Schematic Syntax UCF/NCF File Syntax Attributes/Logical Constraints Placement Constraints Relative Location (RLOC) Constraints Timing Constraints Physical Constraints Relationally Placed Macros (RPM) Carry Logic in XC4000 FPGAs Carry Logic in XC5200 FPGAs

    標(biāo)簽: Constraints Information Attributes Customers

    上傳時(shí)間: 2015-05-12

    上傳用戶:cc1015285075

  • Linux 虛擬網(wǎng)絡(luò)接口 實(shí)例 In the Linux (or Unix) world, most network interfaces, such as eth0 and ppp0, are a

    Linux 虛擬網(wǎng)絡(luò)接口 實(shí)例 In the Linux (or Unix) world, most network interfaces, such as eth0 and ppp0, are associated with a physical device that is in charge of transmitting and receiving data packets. However, some logical network interfaces don t feature any physical packet transmission. The most well-known examples of these "virtual" interfaces are the shaper and eql interfaces.

    標(biāo)簽: Linux interfaces network world

    上傳時(shí)間: 2014-01-11

    上傳用戶:zhangzhenyu

  • Writing an Input Module The sample module introduced here is called idiom (Input Device for Interc

    Writing an Input Module The sample module introduced here is called idiom (Input Device for Intercepting Output of Mice), The sample module registers itself with the USB kernel subsystem as a mouse driver and with the input management subsystem as a keyboard driver. idiom translates mouse movement events into keyboard input events: it reports arrow events to the input system according to how the physical mouse is moved.

    標(biāo)簽: Input introduced Writing Device

    上傳時(shí)間: 2015-06-25

    上傳用戶:731140412

  • 可在系統(tǒng)引導(dǎo)時(shí)工作的RootKit,較簡(jiǎn)單 1) It s very small.The basic framework is just about 100 lines of assembly

    可在系統(tǒng)引導(dǎo)時(shí)工作的RootKit,較簡(jiǎn)單 1) It s very small.The basic framework is just about 100 lines of assembly code.It supports 2000,XP,2003 2) It patches the kernel at runtime(no files are patched on disk).(basic version has this code removed , so as others could understand it easily). 3) BOOT KIT is PXE-compatible. 4) It can even lead to first ever PXE virus 5)It also enables you to load other root kits if you have physical access(Normally root kits can only be loaded by the administrator)

    標(biāo)簽: framework assembly RootKit small

    上傳時(shí)間: 2014-01-02

    上傳用戶:gdgzhym

  • 紅外線開發(fā)資料

    紅外線開發(fā)資料,紅外線協(xié)議,Infrared Data Association Serial Infrared Physical Layer Measurement Guidelines

    標(biāo)簽: 紅外線 開發(fā)資料

    上傳時(shí)間: 2014-12-04

    上傳用戶:jjj0202

  • 《DCOM入門》隨書源碼 Chapter 1 (Distributed Computing) N/A Chapter 2 (DCOM Overview) N/A Chapter 3 (Objec

    《DCOM入門》隨書源碼 Chapter 1 (Distributed Computing) N/A Chapter 2 (DCOM Overview) N/A Chapter 3 (Objects) Basics Chapter 4 (Components) Basics Chapter 5 (Infrastructure) Infrastructure Chapter 6 (Building Components with ATL) OCRServer Chapter 7 (Using COM Objects) OCRClient Chapter 8 (COM in Cyberspace) Cyber Chapter 9 (Applying Security) Security Chapter 10 (Connecting Objects) Chat

    標(biāo)簽: Chapter DCOM Distributed Computing

    上傳時(shí)間: 2014-01-03

    上傳用戶:haoxiyizhong

  • This paper presents an interactive technique that produces static hairstyles by generating individu

    This paper presents an interactive technique that produces static hairstyles by generating individual hair strands of the desired shape and color, subject to the presence of gravity and collisions. A variety of hairstyles can be generated by adjusting the wisp parameters, while the deformation is solved efficiently, accounting for the effects of gravity and collisions. Wisps are generated employing statistical approaches. As for hair deformation, we propose a method which is based on physical simulation concepts but is simplified to efficiently solve the static shape of hair. On top of the statistical wisp model and the deformation solver, a constraint-based styler is proposed to model artificial features that oppose the natural flow of hair under gravity and hair elasticity, such as a hairpin. Our technique spans a wider range of human hairstyles than previously proposed methods, and the styles generated by this technique are fairly realistic.

    標(biāo)簽: interactive hairstyles generating technique

    上傳時(shí)間: 2013-12-20

    上傳用戶:sssl

  • CCISP考試指南與導(dǎo)讀 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2

    CCISP考試指南與導(dǎo)讀 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NETWORK SECURITY 13 DOMAIN 4 – CRYPTOGRAPHY 34 DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46 DOMAIN 6 – OPERATIONS SECURITY 56 DOMAIN 7 – APPLICATIONS AND SYSTEM DEVELOPMENT 63 DOMAIN 8 – BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING 70 DOMAIN 9 – LAW, INVESTIGATION AND ETHICS 78 DOMAIN 10 – PHYSICAL SECURITY 87

    標(biāo)簽: CISSP MANAGEMENT PRACTICES SECURITY

    上傳時(shí)間: 2014-02-13

    上傳用戶:sy_jiadeyi

主站蜘蛛池模板: 临猗县| 乌鲁木齐市| 民丰县| 阿克| 上栗县| 新化县| 英德市| 花莲市| 韶山市| 澄江县| 芜湖市| 阿拉善左旗| 扶风县| 纳雍县| 阜新市| 边坝县| 贡嘎县| 哈密市| 鄄城县| 宁晋县| 淮北市| 沅江市| 临武县| 英山县| 化州市| 中卫市| 津市市| 民丰县| 贵溪市| 普格县| 明光市| 仪征市| 辽宁省| 西藏| 芦山县| 太保市| 临海市| 资源县| 柞水县| 唐山市| 禹城市|