Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, anddistributed control systems (DCSs), and then discusses security issues and remedies. This document alsoexplains the benefits and limitations of two cryptographic solutions (digital signatures and encryption) andelaborates on the reasons for using security ICs in an ICS to support cryptography.
標(biāo)簽: 工業(yè)系統(tǒng) 安全問(wèn)題
上傳時(shí)間: 2013-10-09
上傳用戶:woshinimiaoye
total是最后的版本。包括的全是最新的物理層和數(shù)據(jù)鏈路層。另外還有pro1和pro2的打包程序和調(diào)用它們形成的各自的界面程序,以及最后調(diào)用各個(gè)界面形成的總界面程序。由于時(shí)間匆忙,對(duì)數(shù)據(jù)鏈路層協(xié)議的界面化工作只做到了pro2,總界面上已經(jīng)留了所有6個(gè)程序的地方。PhysicalLayer包中包含了所有的物理層的程序的版本,以及它們各自的演示程序(一般為Physical)及打包程序(一般為PhyLayer)。顯示了整個(gè)物理層編寫及修改演化的過(guò)程,僅供參考。Datalink Layer包中包含了數(shù)據(jù)鏈路層程序的各個(gè)版本。包含數(shù)據(jù)鏈路層基本操作模塊(Datalink.java)及各個(gè)協(xié)議的版本(pro1-pro3)。以及它們各自的演示程序及打包程序。顯示了整個(gè)物理層編寫及修改演化的過(guò)程,僅供參考。運(yùn)行方法:只需要Java的運(yùn)行環(huán)境。先要預(yù)裝java,這里使用的是java的j2sdk-1_4_2_01-windows-i586版本。最新的1.5.0應(yīng)該也支持。采用的編譯器是Jcreator,其他的編譯器也應(yīng)該是可以用的。
上傳時(shí)間: 2013-12-19
上傳用戶:奇奇奔奔
Attributes, Constraints, and Carry Logic Overview Information for Mentor Customers Schematic Syntax UCF/NCF File Syntax Attributes/Logical Constraints Placement Constraints Relative Location (RLOC) Constraints Timing Constraints Physical Constraints Relationally Placed Macros (RPM) Carry Logic in XC4000 FPGAs Carry Logic in XC5200 FPGAs
標(biāo)簽: Constraints Information Attributes Customers
上傳時(shí)間: 2015-05-12
上傳用戶:cc1015285075
Linux 虛擬網(wǎng)絡(luò)接口 實(shí)例 In the Linux (or Unix) world, most network interfaces, such as eth0 and ppp0, are associated with a physical device that is in charge of transmitting and receiving data packets. However, some logical network interfaces don t feature any physical packet transmission. The most well-known examples of these "virtual" interfaces are the shaper and eql interfaces.
標(biāo)簽: Linux interfaces network world
上傳時(shí)間: 2014-01-11
上傳用戶:zhangzhenyu
Writing an Input Module The sample module introduced here is called idiom (Input Device for Intercepting Output of Mice), The sample module registers itself with the USB kernel subsystem as a mouse driver and with the input management subsystem as a keyboard driver. idiom translates mouse movement events into keyboard input events: it reports arrow events to the input system according to how the physical mouse is moved.
標(biāo)簽: Input introduced Writing Device
上傳時(shí)間: 2015-06-25
上傳用戶:731140412
可在系統(tǒng)引導(dǎo)時(shí)工作的RootKit,較簡(jiǎn)單 1) It s very small.The basic framework is just about 100 lines of assembly code.It supports 2000,XP,2003 2) It patches the kernel at runtime(no files are patched on disk).(basic version has this code removed , so as others could understand it easily). 3) BOOT KIT is PXE-compatible. 4) It can even lead to first ever PXE virus 5)It also enables you to load other root kits if you have physical access(Normally root kits can only be loaded by the administrator)
標(biāo)簽: framework assembly RootKit small
上傳時(shí)間: 2014-01-02
上傳用戶:gdgzhym
紅外線開發(fā)資料,紅外線協(xié)議,Infrared Data Association Serial Infrared Physical Layer Measurement Guidelines
上傳時(shí)間: 2014-12-04
上傳用戶:jjj0202
《DCOM入門》隨書源碼 Chapter 1 (Distributed Computing) N/A Chapter 2 (DCOM Overview) N/A Chapter 3 (Objects) Basics Chapter 4 (Components) Basics Chapter 5 (Infrastructure) Infrastructure Chapter 6 (Building Components with ATL) OCRServer Chapter 7 (Using COM Objects) OCRClient Chapter 8 (COM in Cyberspace) Cyber Chapter 9 (Applying Security) Security Chapter 10 (Connecting Objects) Chat
標(biāo)簽: Chapter DCOM Distributed Computing
上傳時(shí)間: 2014-01-03
上傳用戶:haoxiyizhong
This paper presents an interactive technique that produces static hairstyles by generating individual hair strands of the desired shape and color, subject to the presence of gravity and collisions. A variety of hairstyles can be generated by adjusting the wisp parameters, while the deformation is solved efficiently, accounting for the effects of gravity and collisions. Wisps are generated employing statistical approaches. As for hair deformation, we propose a method which is based on physical simulation concepts but is simplified to efficiently solve the static shape of hair. On top of the statistical wisp model and the deformation solver, a constraint-based styler is proposed to model artificial features that oppose the natural flow of hair under gravity and hair elasticity, such as a hairpin. Our technique spans a wider range of human hairstyles than previously proposed methods, and the styles generated by this technique are fairly realistic.
標(biāo)簽: interactive hairstyles generating technique
上傳時(shí)間: 2013-12-20
上傳用戶:sssl
CCISP考試指南與導(dǎo)讀 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NETWORK SECURITY 13 DOMAIN 4 – CRYPTOGRAPHY 34 DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46 DOMAIN 6 – OPERATIONS SECURITY 56 DOMAIN 7 – APPLICATIONS AND SYSTEM DEVELOPMENT 63 DOMAIN 8 – BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING 70 DOMAIN 9 – LAW, INVESTIGATION AND ETHICS 78 DOMAIN 10 – PHYSICAL SECURITY 87
標(biāo)簽: CISSP MANAGEMENT PRACTICES SECURITY
上傳時(shí)間: 2014-02-13
上傳用戶:sy_jiadeyi
蟲蟲下載站版權(quán)所有 京ICP備2021023401號(hào)-1