SCADA Security. Xun YiЧитать онлайн книгу.
alt="images"/>, , .Figure 5.5 Illustration of an inconsistency scoring method based on intra‐cl...Figure 5.6 (a and c) The behavior of consistent/inconsistent observations of...Figure 5.7 The extracted proximity‐detection rules for two data points (attr...Figure 5.8 Simulation of a water distribution system.
6 Chapter 6Figure 6.1 Overview of GATUD.Figure 6.2 The categorization of unlabeled data after applying the anomaly‐s...
7 Chapter 7Figure 7.1 Security with TPASS.Figure 7.2 The TPASS Protocol
based on a Two‐Phase Commitment.Figure 7.3 The TPASS Protocol based on Zero‐Knowledge Proof.Figure 7.4 Comparison of time spent (in seconds) for setting up.Figure 7.5 Comparison of communication size (in KB) for setting up.Figure 7.6 Comparison of time spent for retrieving.Figure 7.7 Comparison of communication size for retrieving.Figure 7.8 Comparison of average time spent by a server in retrieving.Figure 7.9 Comparison of average communication size for a server in retrievi...Guide
6 Foreword
7 Preface
8 Acronyms
11 References
12 Index
13 Series Page
14 WILEY END USER LICENSE AGREEMENT
Pages
1 ii
2 iii
3 iv
4 v
5 ix
6 x
7 xi
8 xii
9 xiii
10 xv
11 xvi
12 1
13 2
14 3
15 4
16 5
17 6
18 7
19 8
20 9
21 10
22 11
23 12
24 13
25 15
26 16
27 17
28 18
29 19
30 20
31 21
32 22
33 23
34 25
35 26
36 27
37 28
38 29
39 30
40 31
41 32
42 33
43 34
44 35
45 36
46 37
47 38
48 39
49 40
50 41
51 42
52 43
53