Balduzzi et al., 2020 - Google Patents
Lost in translation: when industrial protocol translation goes wrongBalduzzi et al., 2020
View PDF- Document ID
- 6504662293790660756
- Author
- Balduzzi M
- Bongiorni L
- Flores R
- Lin P
- Perine C
- Vosseler R
- Publication year
- Publication venue
- Trend Micro
External Links
Snippet
The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current …
- 230000000694 effects 0 abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2705—Parsing
- G06F17/271—Syntactic parsing, e.g. based on context-free grammar [CFG], unification grammars
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/28—Processing or translating of natural language
- G06F17/289—Use of machine translation, e.g. multi-lingual retrieval, server side translation for client devices, real-time translation
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B19/00—Teaching not covered by other main groups of this subclass
- G09B19/06—Foreign languages
- G09B19/08—Printed or written appliances, e.g. text books, bilingual letter assemblies, charts
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Pliatsios et al. | A survey on SCADA systems: secure protocols, incidents, threats and tactics | |
Coffey et al. | Vulnerability analysis of network scanning on SCADA systems | |
Makrakis et al. | Industrial and critical infrastructure security: Technical analysis of real-life security incidents | |
Gao et al. | SCADA communication and security issues | |
Rosa et al. | A comprehensive security analysis of a SCADA protocol: From OSINT to mitigation | |
Rodofile et al. | Extending the cyber-attack landscape for SCADA-based critical infrastructure | |
US20070192867A1 (en) | Security appliances | |
Li et al. | A critical review of cyber-physical security for building automation systems | |
Abe et al. | Security threats of Internet-reachable ICS | |
Fauri et al. | Encryption in ICS networks: A blessing or a curse? | |
Langill | Defending against the dragonfly cyber security attacks | |
Ramachandruni et al. | Detecting the network attack vectors on SCADA systems | |
McCarthy et al. | Securing manufacturing industrial control systems: Behavioral anomaly detection | |
Makrakis et al. | Vulnerabilities and attacks against industrial control systems and critical infrastructures | |
Pfrang et al. | Detecting and preventing replay attacks in industrial automation networks operated with profinet IO | |
Slunjski et al. | Off-the-shelf solutions as potential cyber threats to industrial environments and simple-to-implement protection methodology | |
Ovaz Akpinar et al. | Development of the ECAT preprocessor with the trust communication approach | |
Weerathunga et al. | The importance of testing Smart Grid IEDs against security vulnerabilities | |
Balduzzi et al. | Lost in translation: when industrial protocol translation goes wrong | |
Mashima et al. | Cybersecurity for Modern Smart Grid Against Emerging Threats | |
Silveira et al. | Cyber vulnerability assessment of a digital secondary system in an electrical substation | |
Borhani et al. | A critical analysis of the industrial device scanners’ potentials, risks, and preventives | |
Akbarzadeh et al. | Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation | |
Morris et al. | Cyber security testing and intrusion detection for synchrophasor systems | |
Carr | Development of a tailored methodology and forensic toolkit for industrial control systems incident response |