Yong Peng

Affiliations:
  • China Information Technology Security Evaluation Center, CNITSEC, Technical Assessment Research Lab, Beijing, China


According to our database1, Yong Peng authored at least 26 papers between 2009 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Malware detection method for the industrial control systems.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
The Classification of Quantum Symmetric-Key Encryption Protocols.
CoRR, 2015

Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment Environment.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Cyber-Physical Systems Testbed Based on Cloud Computing and Software Defined Network.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Industrial Control System Fingerprinting and Anomaly Detection.
Proceedings of the Critical Infrastructure Protection IX, 2015

2014
Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Techniques and Research Trends of Network Testbed.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Cyber Security Risk Assessment of Communication Network of Substation Based on Improved Grey Clustering.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A New Information Security Risk Assessment Method in Power Production System Based on Rough Sets and Bayesian Network.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation.
Proceedings of the Critical Infrastructure Protection VIII, 2014

Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges.
Proceedings of the Computer Information Systems and Industrial Management, 2014

2013
Security Testing Methods and Techniques of Industrial Control Devices.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Security Analysis on Cyber-physical System Using Attack Tree.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Design and Implementation of Fuzzing Technology for OPC Protocol.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Substation Communication Security Research Based on Hybrid Encryption of DES and RSA.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Cyber-physical System Risk Assessment.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

The Design of ICS Testbed Based on Emulation, Physical, and Simulation (EPS-ICS Testbed).
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

2012
Designated Verifier Signature Scheme over Circulant Matrices.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

A New Detection Algorithm of Moving Objects Based on Human Morphology.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Research on the Large Scale Image Steganalysis Technology Based on Cloud Computing and BP Neutral Network.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

A risk management framework for cloud computing.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

The research and implementation of intelligent mobile video supervising system based on DSP.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Stability analysis of software networks.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Research on Software Development Process Assurance Models in ICT Supply Chain Risk Management.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2009
Privacy Aware Engineering: A Case Study.
J. Softw., 2009

A Practical Database Intrusion Detection System Framework.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009


  Loading...