Search
Now showing items 1-10 of 89
Application of string matching in internet security and reliability
Year: 2010
Abstract:
scanners or intrusion detection systems to further improve internet reliability in case of cyber attacks. After indicating the basic measures of intrinsic internet reliability such as MTTF, MTTR and availability, a new measure is introduced to account...
The Effect of Cyber Attacks on the Demand Dispatch Application and Identify Them by OPTICS
Year: 2017
Abstract:
highly complex network of cyber-physical aspects and propose some demanding requirements in the information infrastructure of the new generation power grids. Some of these requirements are 1- the rapid response to faults, errors and cyber-attacks 2...
Research on sports marketing of beverage enterprises: — A case study of Wang Laoji
Publisher: IEEE
Year: 2014
Thermal runaway in multijunction solar cells
Publisher: IEEE
Year: 2014
Bipartite consensus strategies for coopetition networks
Publisher: IEEE
Year: 2014
10 GHz throughput FinFET dual-edge triggered flip-flops
Publisher: IEEE
Year: 2014
Radar target recognition using dynamic system model
Publisher: IEEE
Year: 2014
Demand side management in smart buildings by intelligent scheduling of heat pumps
Publisher: IEEE
Year: 2014
Challenge of adopting TCAD in the development of power semiconductor devices for automotive applications
Publisher: IEEE
Year: 2014