UEFI-based Research on the Inner Operation Mechanism and Characteristics of Firmware Vulnerabilities in Key Devices of Electric Power Monitoring Systems
This work is licensed under the Creative Commons Attribution 4.0 International License.
Oleksy, M. P. A. (2019). Industry 4.0 part ii. conditions in the area of production technology and architecture of it system in processing of polymer materials. Polimery, 64(5).Search in Google Scholar
Terciyanli, E., Demirci, T., Kucuk, D., Sarac, M., & Ermis, M. (2014). Enhanced nationwide wind-electric power monitoring and forecast system. IEEE Transactions on Industrial Informatics, 10(2), 1171-1184.Search in Google Scholar
Nakai, A, Kajihara, Y, Nishimoto, & K, et al. (2017). Information-sharing system supporting onsite work for chemical plants. J Loss Prevent Proc.Search in Google Scholar
Mandal, P., & Bagchi, K. (2016). Strategic role of information, knowledge and technology in manufacturing industry performance. Industrial Management & Data Systems, 116(6), 1259-1278.Search in Google Scholar
Zhou, X., & Peng, T. (2020). Application of multi-sensor fuzzy information fusion algorithm in industrial safety monitoring system. Safety Science, 122, 104531-.Search in Google Scholar
Pourtalebi, S., Imre HORVáTH, Engineering, F. O. I. D., & Delft University of Technology. (2016). Information schema constructs for defining warehouse databases of genotypes and phenotypes of system manifestation features. Frontiers of Information Technology & Electronic Engineering.Search in Google Scholar
Zhang, X., & Ming, X. (2020). An implementation for smart manufacturing information system (smis) from an industrial practice survey. Computers & Industrial Engineering, 151(4), 106938.Search in Google Scholar
Leonid, Stoimenov, Milos, Bogdanovic, Sanja, & Bogdanovic-Dinic. (2013). Esb-based sensor Web integration for the prediction of electric power supply system vulnerability. Sensors.Search in Google Scholar
Sperstad, I. B., Gerd H. Kjølle, & Gjerde, O. (2019). A comprehensive framework for vulnerability analysis of extraordinary events in power systems. Reliability Engineering & System Safety, 196, 106788.Search in Google Scholar
Qasem, A., Shirani, P., Debbabi, M., Wang, L., Lebel, B., & Agba, B. L. (2022). Automatic vulnerability detection in embedded devices and firmware: survey and layered taxonomies. ACM computing surveys(2), 54.Search in Google Scholar
Liu, D., Zhang, H., Wang, R., Zhang, F., Sun, L., & Liu, X., et al. (2022). A lightweight iot firmware vulnerability detection scheme based on homology detection. Journal of high speed networks.Search in Google Scholar
Cheng, Y., Cui, B., Chen, C., Baker, T., & Qi, T. (2023). Static vulnerability mining of iot devices based on control flow graph construction and graph embedding network. Computer communications.Search in Google Scholar
Correa, G. J., & Yusta, J. M. (2013). Grid vulnerability analysis based on scale-free graphs versus power flow models. Electric Power Systems Research, 101(aug.), 71-79.Search in Google Scholar
Vaccaro, A., Zobaa, A. F., & Formato, G. (2014). Vulnerability analysis of satellite-based synchronized smart grids monitoring systems. Electric Power Components & Systems, 42(1-4), 408-417.Search in Google Scholar
Beasley, C. T. (2014). Electric power synchrophasor network cyber security vulnerabilities. (Doctoral dissertation, Clemson University.).Search in Google Scholar
Chen, K. S., & Yu, C. M. (2020). Fuzzy test model for performance evaluation matrix of service operating systems. Computers & Industrial Engineering, 140(Feb.), 106240.1-106240.9.Search in Google Scholar
Jiang, He, Chen, Xin, Tieke, & Zhenyu, et al. (2018). Fuzzy clustering of crowdsourced test reports for apps. ACM Transactions on Internet Technology, 18(2).Search in Google Scholar