亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Cyber-Physical

  • 工業系統安全問題和解決辦法

    Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, anddistributed control systems (DCSs), and then discusses security issues and remedies. This document alsoexplains the benefits and limitations of two cryptographic solutions (digital signatures and encryption) andelaborates on the reasons for using security ICs in an ICS to support cryptography.

    標簽: 工業系統 安全問題

    上傳時間: 2013-10-09

    上傳用戶:woshinimiaoye

  • total是最后的版本。包括的全是最新的物理層和數據鏈路層。另外還有pro1和pro2的打包程序和調用它們形成的各自的界面程序

    total是最后的版本。包括的全是最新的物理層和數據鏈路層。另外還有pro1和pro2的打包程序和調用它們形成的各自的界面程序,以及最后調用各個界面形成的總界面程序。由于時間匆忙,對數據鏈路層協議的界面化工作只做到了pro2,總界面上已經留了所有6個程序的地方。PhysicalLayer包中包含了所有的物理層的程序的版本,以及它們各自的演示程序(一般為Physical)及打包程序(一般為PhyLayer)。顯示了整個物理層編寫及修改演化的過程,僅供參考。Datalink Layer包中包含了數據鏈路層程序的各個版本。包含數據鏈路層基本操作模塊(Datalink.java)及各個協議的版本(pro1-pro3)。以及它們各自的演示程序及打包程序。顯示了整個物理層編寫及修改演化的過程,僅供參考。運行方法:只需要Java的運行環境。先要預裝java,這里使用的是java的j2sdk-1_4_2_01-windows-i586版本。最新的1.5.0應該也支持。采用的編譯器是Jcreator,其他的編譯器也應該是可以用的。

    標簽: total pro1 pro2 程序

    上傳時間: 2013-12-19

    上傳用戶:奇奇奔奔

  • Attributes, Constraints, and Carry Logic Overview Information for Mentor Customers Schematic S

    Attributes, Constraints, and Carry Logic Overview Information for Mentor Customers Schematic Syntax UCF/NCF File Syntax Attributes/Logical Constraints Placement Constraints Relative Location (RLOC) Constraints Timing Constraints Physical Constraints Relationally Placed Macros (RPM) Carry Logic in XC4000 FPGAs Carry Logic in XC5200 FPGAs

    標簽: Constraints Information Attributes Customers

    上傳時間: 2015-05-12

    上傳用戶:cc1015285075

  • Linux 虛擬網絡接口 實例 In the Linux (or Unix) world, most network interfaces, such as eth0 and ppp0, are a

    Linux 虛擬網絡接口 實例 In the Linux (or Unix) world, most network interfaces, such as eth0 and ppp0, are associated with a physical device that is in charge of transmitting and receiving data packets. However, some logical network interfaces don t feature any physical packet transmission. The most well-known examples of these "virtual" interfaces are the shaper and eql interfaces.

    標簽: Linux interfaces network world

    上傳時間: 2014-01-11

    上傳用戶:zhangzhenyu

  • Writing an Input Module The sample module introduced here is called idiom (Input Device for Interc

    Writing an Input Module The sample module introduced here is called idiom (Input Device for Intercepting Output of Mice), The sample module registers itself with the USB kernel subsystem as a mouse driver and with the input management subsystem as a keyboard driver. idiom translates mouse movement events into keyboard input events: it reports arrow events to the input system according to how the physical mouse is moved.

    標簽: Input introduced Writing Device

    上傳時間: 2015-06-25

    上傳用戶:731140412

  • 可在系統引導時工作的RootKit,較簡單 1) It s very small.The basic framework is just about 100 lines of assembly

    可在系統引導時工作的RootKit,較簡單 1) It s very small.The basic framework is just about 100 lines of assembly code.It supports 2000,XP,2003 2) It patches the kernel at runtime(no files are patched on disk).(basic version has this code removed , so as others could understand it easily). 3) BOOT KIT is PXE-compatible. 4) It can even lead to first ever PXE virus 5)It also enables you to load other root kits if you have physical access(Normally root kits can only be loaded by the administrator)

    標簽: framework assembly RootKit small

    上傳時間: 2014-01-02

    上傳用戶:gdgzhym

  • 紅外線開發資料

    紅外線開發資料,紅外線協議,Infrared Data Association Serial Infrared Physical Layer Measurement Guidelines

    標簽: 紅外線 開發資料

    上傳時間: 2014-12-04

    上傳用戶:jjj0202

  • 《DCOM入門》隨書源碼 Chapter 1 (Distributed Computing) N/A Chapter 2 (DCOM Overview) N/A Chapter 3 (Objec

    《DCOM入門》隨書源碼 Chapter 1 (Distributed Computing) N/A Chapter 2 (DCOM Overview) N/A Chapter 3 (Objects) Basics Chapter 4 (Components) Basics Chapter 5 (Infrastructure) Infrastructure Chapter 6 (Building Components with ATL) OCRServer Chapter 7 (Using COM Objects) OCRClient Chapter 8 (COM in Cyberspace) Cyber Chapter 9 (Applying Security) Security Chapter 10 (Connecting Objects) Chat

    標簽: Chapter DCOM Distributed Computing

    上傳時間: 2014-01-03

    上傳用戶:haoxiyizhong

  • This paper presents an interactive technique that produces static hairstyles by generating individu

    This paper presents an interactive technique that produces static hairstyles by generating individual hair strands of the desired shape and color, subject to the presence of gravity and collisions. A variety of hairstyles can be generated by adjusting the wisp parameters, while the deformation is solved efficiently, accounting for the effects of gravity and collisions. Wisps are generated employing statistical approaches. As for hair deformation, we propose a method which is based on physical simulation concepts but is simplified to efficiently solve the static shape of hair. On top of the statistical wisp model and the deformation solver, a constraint-based styler is proposed to model artificial features that oppose the natural flow of hair under gravity and hair elasticity, such as a hairpin. Our technique spans a wider range of human hairstyles than previously proposed methods, and the styles generated by this technique are fairly realistic.

    標簽: interactive hairstyles generating technique

    上傳時間: 2013-12-20

    上傳用戶:sssl

  • CCISP考試指南與導讀 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2

    CCISP考試指南與導讀 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NETWORK SECURITY 13 DOMAIN 4 – CRYPTOGRAPHY 34 DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46 DOMAIN 6 – OPERATIONS SECURITY 56 DOMAIN 7 – APPLICATIONS AND SYSTEM DEVELOPMENT 63 DOMAIN 8 – BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING 70 DOMAIN 9 – LAW, INVESTIGATION AND ETHICS 78 DOMAIN 10 – PHYSICAL SECURITY 87

    標簽: CISSP MANAGEMENT PRACTICES SECURITY

    上傳時間: 2014-02-13

    上傳用戶:sy_jiadeyi

主站蜘蛛池模板: 东乡县| 青川县| 宜兰县| 霍山县| 桐柏县| 禹城市| 霍邱县| 孝昌县| 咸阳市| 太谷县| 灌阳县| 梁河县| 兴文县| 宁强县| 乡城县| 凤翔县| 巫溪县| 陈巴尔虎旗| 济南市| 襄垣县| 南充市| 南平市| 启东市| 雷州市| 西青区| 永州市| 临潭县| 攀枝花市| 墨玉县| 江城| 顺昌县| 琼结县| 余庆县| 射阳县| 城市| 洞头县| 三明市| 水城县| 伊通| 英吉沙县| 旬阳县|