Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic review of fuzzing based on machine learning techniques
Security vulnerabilities play a vital role in network security system. Fuzzing technology is
widely used as a vulnerability discovery technology to reduce damage in advance …
widely used as a vulnerability discovery technology to reduce damage in advance …
A survey on fuzz testing technologies for industrial control protocols
The development of the industrial Internet of Things enables industrial control systems to
become inter-networked and inter-connected, making them intelligent with high productivity …
become inter-networked and inter-connected, making them intelligent with high productivity …
An adaptive fuzzing method based on transformer and protocol similarity mutation
W Wang, Z Chen, Z Zheng, H Wang - Computers & Security, 2023 - Elsevier
Industrial control protocols have a large number of vulnerabilities due to lacking
authentication and misuse of function codes, which seriously threaten the production safety …
authentication and misuse of function codes, which seriously threaten the production safety …
An optimization technique for intrusion detection of industrial control network vulnerabilities based on BP neural network
The aim of this research is to solve the problem that the intrusion detection model of
industrial control system has low detection rate and detection efficiency against various …
industrial control system has low detection rate and detection efficiency against various …
MTA Fuzzer: A low-repetition rate Modbus TCP fuzzing method based on Transformer and Mutation Target Adaptation
W Wang, Z Chen, Z Zheng, H Wang, J Luo - Computers & Security, 2024 - Elsevier
The widespread application of industrial control systems has driven the development of
industrial control protocols. However, traditional industrial control protocols suffer from …
industrial control protocols. However, traditional industrial control protocols suffer from …
[HTML][HTML] A trust-influenced smart grid: A survey and a proposal
A compromised Smart Grid, or its components, can have cascading effects that can affect
lives. This has led to numerous cybersecurity-centric studies focusing on the Smart Grid in …
lives. This has led to numerous cybersecurity-centric studies focusing on the Smart Grid in …
[HTML][HTML] Experimental implementation and performance evaluation of an IoT access gateway for the modbus extension
This paper presents the relevant aspects regarding the experimental implementation and
performance evaluation of an Internet of things (IoT) gateway for the Modbus extension. The …
performance evaluation of an Internet of things (IoT) gateway for the Modbus extension. The …
[HTML][HTML] The design of large scale IP address and port scanning tool
C Yuan, J Du, M Yue, T Ma - Sensors, 2020 - mdpi.com
The control network is an important supporting environment for the control system of the
heavy ion accelerator in Lanzhou (HIRFL). It is of great importance to maintain the …
heavy ion accelerator in Lanzhou (HIRFL). It is of great importance to maintain the …
Enhancing the modbus communication protocol to minimize acquisition times based on an STM32-embedded device
The primary function of a distributed bus is to connect sensors, actuators, and control units
that are used for an acquisition process. Application domains, such as industrial monitoring …
that are used for an acquisition process. Application domains, such as industrial monitoring …
TXL-Fuzz: A Long Attention Mechanism-Based Fuzz Testing Model for Industrial IoT Protocols
L Chen, Y Wang, X **ang, D **, Y Ren… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
In recent years, industrial control systems (ICSs) security incidents have revealed
vulnerabilities in the system hardware, user programs, and communication protocols. The …
vulnerabilities in the system hardware, user programs, and communication protocols. The …