Название | SCADA Security |
---|---|
Автор произведения | Xun Yi |
Жанр | Отраслевые издания |
Серия | |
Издательство | Отраслевые издания |
Год выпуска | 0 |
isbn | 9781119606352 |
6 Chapter 6Figure 6.1 Overview of GATUD.Figure 6.2 The categorization of unlabeled data after applying the anomaly‐s...
7 Chapter 7Figure 7.1 Security with TPASS.Figure 7.2 The TPASS Protocol
based on a Two‐Phase Commitment.Figure 7.3 The TPASS Protocol based on Zero‐Knowledge Proof.Figure 7.4 Comparison of time spent (in seconds) for setting up.Figure 7.5 Comparison of communication size (in KB) for setting up.Figure 7.6 Comparison of time spent for retrieving.Figure 7.7 Comparison of communication size for retrieving.Figure 7.8 Comparison of average time spent by a server in retrieving.Figure 7.9 Comparison of average communication size for a server in retrievi...Guide
6 Foreword
7 Preface
8 Acronyms
11 References
12 Index
13 Series Page
14 WILEY END USER LICENSE AGREEMENT
Pages
1 ii
2 iii
3 iv
4 v
5 ix
6 x
7 xi
8 xii
9 xiii
10 xv
11 xvi
12 1
13 2
14 3
15 4
16 5
17 6
18 7
19 8
20 9
21 10
22 11
23 12
24 13
25 15
26 16
27 17
28 18
29 19
30 20
31 21
32 22
33 23
34 25
35 26
36 27
37 28
38 29
39 30
40 31
41 32
42 33
43 34
44 35
45 36
46 37
47 38
48 39
49 40
50 41
51 42
52 43
53