The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As one of the most popular industrial network protocol used in the energy distribution field, the security, especially vulnerability of Modbus-TCP protocol has attracted great attentions from both academic and industrial field. Due to the Particularity of Modbus-TCP, traditional fuzzing framework for vulnerability detecting cannot work efficiently. To overcome this drawback, a special smart fuzzing...
In this paper, secure transmission is considered in a wireless relay network in the presence of an eavesdropper. A novel hybrid relay scheme, named as relaying-and-jamming (RJ), is advocated to achieve information theoretical security. In the RJ scheme, the relay node is equipped with multiple antennas. It responses for two missions: re-transmitting the information signal from source code and broadcasting...
Network vulnerability can be analyzed automatically by attack graph. Attack graph tools can generate attack paths in network and show users the network vulnerabilities analyzing process for network security risk analysis. There are some problems such as state space explosion, the high complexity of algorithms, being difficult to demonstrate graphically, and so on, for attack graph generation and visualization...
With the rapid development of information and automatic control technology, more and more industrial control system(ICS) like SCADA, is interconnected with Ethernet and directly connected to internet, which greatly improve the efficiency of data sharing and introduced in security threats at the same time. As the important components of critical infrastructure, if attacked, will behave abnormal and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.