相似文献/References:
[1]胡建华,刘鑫朝,李辉.基于. NET的动态实时曲线的绘制方法[J].计算机技术与发展,2013,(03):179.
HU Jian-hua,LIU Xin-chao,LI Hui.Method of Dynamic Real-time Curve Drawing Based on . Net[J].,2013,(10):179.
[2]刘知竹,冯璐,荀鹏,等.基于分散化序列的联网 ICS 设备搜索技术[J].计算机技术与发展,2018,28(11):1.[doi:10.3969/ j.issn.1673-629X.2018.11.001]
LIU Zhi-zhu,FENG Lu,XUN Peng,et al.Networked ICS Device Search Technique Based on Dispersed Sequence[J].,2018,28(10):1.[doi:10.3969/ j.issn.1673-629X.2018.11.001]
[3]刘 俊,陈 慧,王 军.基于区块链的 ICS 数据安全策略研究[J].计算机技术与发展,2021,31(01):149.[doi:10. 3969 / j. issn. 1673-629X. 2021. 01. 027]
LIU Jun,CHEN Hui,WANG Jun.Research on Data Security Strategy of ICS Based on Blockchain[J].,2021,31(10):149.[doi:10. 3969 / j. issn. 1673-629X. 2021. 01. 027]
[4]姚 旭,王 钢,任秀勤,等.基于发电厂控制系统的工控蜜罐设计与实现[J].计算机技术与发展,2022,32(10):114.[doi:10. 3969 / j. issn. 1673-629X. 2022. 10. 019]
YAO Xu,WANG Gang,REN Xiu-qin,et al.Design and Implementation of Industrial Control Honeypot Based on Power Plant Control System[J].,2022,32(10):114.[doi:10. 3969 / j. issn. 1673-629X. 2022. 10. 019]
[5]韩子彬.选煤厂工控网络安全实验分析[J].计算机技术与发展,2022,32(S2):162.[doi:10. 3969 / j. issn. 1673-629X. 2022. S2. 029]
HAN Zi-bin.Experimental Analysis of Industrial Control Network Security in Coal Preparation Plant[J].,2022,32(10):162.[doi:10. 3969 / j. issn. 1673-629X. 2022. S2. 029]
[6]郑铁军,王 齐,张宏杰,等.基于组合扫描的无状态工控设备资产探测方法[J].计算机技术与发展,2023,33(07):98.[doi:10. 3969 / j. issn. 1673-629X. 2023. 07. 015]
ZHENG Tie-jun,WANG Qi,ZHANG Hong-jie,et al.Stateless Industrial Control Equipment Asset Detection Method Based on Combined Scanning[J].,2023,33(10):98.[doi:10. 3969 / j. issn. 1673-629X. 2023. 07. 015]