[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shi et al., 2021 - Google Patents

Modeling and performance analysis of satellite network moving target defense system with petri nets

Shi et al., 2021

View HTML
Document ID
1875440524747420201
Author
Shi L
Du S
Miao Y
Lan S
Publication year
Publication venue
Remote Sensing

External Links

Snippet

With the development of satellite communication networks and the increase of satellite services, security problems have gradually become some of the most concerning issues. Researchers have made great efforts, including conventional safety methods such as secure …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • G06F15/163Interprocessor communication

Similar Documents

Publication Publication Date Title
Ometov et al. A survey of security in cloud, edge, and fog computing
Tariq et al. A blockchain-based multi-mobile code-driven trust mechanism for detecting internal attacks in internet of things
Wang et al. Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks
Le et al. Gridattacksim: A cyber attack simulation framework for smart grids
Al-Aqrabi et al. Hardware-intrinsic multi-layer security: A new frontier for 5G enabled IIoT
Shi et al. Modeling and performance analysis of satellite network moving target defense system with petri nets
Kavallieratos et al. Threat analysis for smart homes
Zhang et al. Security performance analysis of leo satellite constellation networks under ddos attack
Wang et al. Coordinated defense of distributed denial of service attacks against the multi-area load frequency control services
Jin et al. Security state estimation for cyber-physical systems against DoS attacks via reinforcement learning and game theory
Wang et al. A two-layer IP hopping-based moving target defense approach to enhancing the security of mobile ad-hoc networks
Du et al. Formal safety assessment and improvement of DDS protocol for industrial data distribution service
Boodai et al. Review of physical layer security in 5G wireless networks
Le et al. Gridattackanalyzer: A cyber attack analysis framework for smart grids
Ying et al. Microservice security framework for IoT by mimic defense mechanism
Seo et al. D-CEWS: DEVS-based cyber-electronic warfare M&S framework for enhanced communication effectiveness analysis in battlefield
Tsantikidou et al. Threats, attacks, and cryptography frameworks of cybersecurity in critical infrastructures
Bouzidi et al. Lpwan cyber security risk analysis: Building a secure iqrf solution
Saeed et al. Analyzing the impact of active attack on the performance of the AMCTD protocol in underwater wireless sensor networks
Gao et al. A malicious behavior awareness and defense countermeasure based on LoRaWAN protocol
Wang et al. A web-based honeypot in IPv6 to enhance security
Yildirim Yayilgan et al. An approach for analyzing cyber security threats and attacks: a case study of digital substations in Norway
Yu et al. Optimal deployment in moving target defense against coordinated cyber–physical attacks via game theory
Min et al. Learning-based IRS-assisted secure transmission for mine IoTs
Wan et al. A brief survey of recent advances and methodologies for the security control of complex cyber–physical networks