跳到主要导航
跳到搜索
跳到主要内容
Pure University (For Demo Only) 国内
帮助和常见问题
English
中文
国内
简介
研究单位
科研成果
设备
数据集
活动
奖项
影响
项目
新闻 / 媒体
按专业知识、名称或附属进行搜索
An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems
Darshana Upadhyay, Marzia Zaman, Rohit Joshi,
Srinivas Sampalli
Physics and Astronomy
科研成果
:
期刊稿件
›
文章
›
同行评审
24
引用 (Scopus)
综述
指纹
指纹
探究 'An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems' 的科研主题。它们共同构成独一无二的指纹。
分类
加权
按字母排序
Keyphrases
Supervisory Control
100%
Security Framework
100%
Multilevel Security
100%
Data Acquisition System
100%
Cryptographic Techniques
33%
Cyber-attacks
33%
Confidentiality
16%
High Availability
16%
Computational Resources
16%
Data Acquisition Network
16%
Hash Chaining
16%
Safety Implications
16%
Message Authentication Code
16%
Symmetric Cryptography
16%
Microcontroller
16%
Asymmetric Key
16%
Security Features
16%
Point-to-point Communication
16%
Industrial Organization
16%
Symmetric Key
16%
Industrial Infrastructure
16%
Industrial Plant
16%
Effective Solutions
16%
Network Capability
16%
Key Management Mechanism
16%
High Integrity
16%
Field Devices
16%
Random number Generation
16%
Layered Framework
16%
Cyber Threats
16%
Multicast
16%
Computational Power
16%
Vernam Cipher
16%
Response Mechanism
16%
High Scalability
16%
Processing Information
16%
Session Key
16%
Request-response
16%
Session Key Establishment
16%
Hashing
16%
Lightweight Cryptography
16%
Prime Number Generator
16%
Industrial Control Systems
16%
Computer Science
Security Framework
100%
Multilayered Security
100%
Key Management
100%
Supervisory Control and Data Acquisition System
100%
Cyber Attack
66%
High Availability
33%
Microcontroller
33%
Cryptographic Technique
33%
Effective Solution
33%
Symmetric Key Cryptography
33%
Information Processing
33%
Industrial Control System
33%
Random Number Generation
33%
Message Authentication Code
33%
Authentication
33%
Point-to-Point Communication
33%
Number Generator
33%
Multicasting
33%
Security Feature
33%
Computational Power
33%
Computational Resource
33%
Perform Operation
33%
Lightweight Cryptography
33%