Accesso libero

UEFI-based Research on the Inner Operation Mechanism and Characteristics of Firmware Vulnerabilities in Key Devices of Electric Power Monitoring Systems

INFORMAZIONI SU QUESTO ARTICOLO

Cita

Oleksy, M. P. A. (2019). Industry 4.0 part ii. conditions in the area of production technology and architecture of it system in processing of polymer materials. Polimery, 64(5). Search in Google Scholar

Terciyanli, E., Demirci, T., Kucuk, D., Sarac, M., & Ermis, M. (2014). Enhanced nationwide wind-electric power monitoring and forecast system. IEEE Transactions on Industrial Informatics, 10(2), 1171-1184. Search in Google Scholar

Nakai, A, Kajihara, Y, Nishimoto, & K, et al. (2017). Information-sharing system supporting onsite work for chemical plants. J Loss Prevent Proc. Search in Google Scholar

Mandal, P., & Bagchi, K. (2016). Strategic role of information, knowledge and technology in manufacturing industry performance. Industrial Management & Data Systems, 116(6), 1259-1278. Search in Google Scholar

Zhou, X., & Peng, T. (2020). Application of multi-sensor fuzzy information fusion algorithm in industrial safety monitoring system. Safety Science, 122, 104531-. Search in Google Scholar

Pourtalebi, S., Imre HORVáTH, Engineering, F. O. I. D., & Delft University of Technology. (2016). Information schema constructs for defining warehouse databases of genotypes and phenotypes of system manifestation features. Frontiers of Information Technology & Electronic Engineering. Search in Google Scholar

Zhang, X., & Ming, X. (2020). An implementation for smart manufacturing information system (smis) from an industrial practice survey. Computers & Industrial Engineering, 151(4), 106938. Search in Google Scholar

Leonid, Stoimenov, Milos, Bogdanovic, Sanja, & Bogdanovic-Dinic. (2013). Esb-based sensor Web integration for the prediction of electric power supply system vulnerability. Sensors. Search in Google Scholar

Sperstad, I. B., Gerd H. Kjølle, & Gjerde, O. (2019). A comprehensive framework for vulnerability analysis of extraordinary events in power systems. Reliability Engineering & System Safety, 196, 106788. Search in Google Scholar

Qasem, A., Shirani, P., Debbabi, M., Wang, L., Lebel, B., & Agba, B. L. (2022). Automatic vulnerability detection in embedded devices and firmware: survey and layered taxonomies. ACM computing surveys(2), 54. Search in Google Scholar

Liu, D., Zhang, H., Wang, R., Zhang, F., Sun, L., & Liu, X., et al. (2022). A lightweight iot firmware vulnerability detection scheme based on homology detection. Journal of high speed networks. Search in Google Scholar

Cheng, Y., Cui, B., Chen, C., Baker, T., & Qi, T. (2023). Static vulnerability mining of iot devices based on control flow graph construction and graph embedding network. Computer communications. Search in Google Scholar

Correa, G. J., & Yusta, J. M. (2013). Grid vulnerability analysis based on scale-free graphs versus power flow models. Electric Power Systems Research, 101(aug.), 71-79. Search in Google Scholar

Vaccaro, A., Zobaa, A. F., & Formato, G. (2014). Vulnerability analysis of satellite-based synchronized smart grids monitoring systems. Electric Power Components & Systems, 42(1-4), 408-417. Search in Google Scholar

Beasley, C. T. (2014). Electric power synchrophasor network cyber security vulnerabilities. (Doctoral dissertation, Clemson University.). Search in Google Scholar

Chen, K. S., & Yu, C. M. (2020). Fuzzy test model for performance evaluation matrix of service operating systems. Computers & Industrial Engineering, 140(Feb.), 106240.1-106240.9. Search in Google Scholar

Jiang, He, Chen, Xin, Tieke, & Zhenyu, et al. (2018). Fuzzy clustering of crowdsourced test reports for apps. ACM Transactions on Internet Technology, 18(2). Search in Google Scholar

eISSN:
2444-8656
Lingua:
Inglese
Frequenza di pubblicazione:
Volume Open
Argomenti della rivista:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics