2020 Chinese Automation Congress (CAC) 2020
DOI: 10.1109/cac51589.2020.9327075
|View full text |Cite
|
Sign up to set email alerts
|

An Active Defence Architecture for Industrial Control System based on Trusted Computing 3.0

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 13 publications
0
0
0
Order By: Relevance
“…Therefore, it is not common. The authors of [59] gave the specific location of deploying TC platforms, access control, and the trusted network server in typical ICSs. Abnormal information was reported to the audit server, which was the prototype of the trusted management center.…”
Section: Trusted Management Centermentioning
confidence: 99%
“…Therefore, it is not common. The authors of [59] gave the specific location of deploying TC platforms, access control, and the trusted network server in typical ICSs. Abnormal information was reported to the audit server, which was the prototype of the trusted management center.…”
Section: Trusted Management Centermentioning
confidence: 99%