Yong Peng
Affiliations:- China Information Technology Security Evaluation Center, CNITSEC, Technical Assessment Research Lab, Beijing, China
According to our database1,
Yong Peng
authored at least 26 papers
between 2009 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016
2015
Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment Environment.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Cyber-Physical Systems Testbed Based on Cloud Computing and Software Defined Network.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Proceedings of the Critical Infrastructure Protection IX, 2015
2014
Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Cyber Security Risk Assessment of Communication Network of Substation Based on Improved Grey Clustering.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
A New Information Security Risk Assessment Method in Power Production System Based on Rough Sets and Bayesian Network.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation.
Proceedings of the Critical Infrastructure Protection VIII, 2014
Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges.
Proceedings of the Computer Information Systems and Industrial Management, 2014
2013
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Substation Communication Security Research Based on Hybrid Encryption of DES and RSA.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
The Design of ICS Testbed Based on Emulation, Physical, and Simulation (EPS-ICS Testbed).
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
2012
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012
Research on the Large Scale Image Steganalysis Technology Based on Cloud Computing and BP Neutral Network.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
The research and implementation of intelligent mobile video supervising system based on DSP.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Research on Software Development Process Assurance Models in ICT Supply Chain Risk Management.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012
2009
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009