Chun Lei Wang
Tsinghua University
SCADADistributed computingEngineeringStatic program analysisNetwork simulationEmbedded systemEnterprise private networkProcess controlEvolutionary algorithmCode (cryptography)Structure (mathematical logic)Network performanceMetric (mathematics)SurvivabilityAttack graphAnalysis methodSecurity analysisComputer securityIndustrial control systemOperations researchProcess (engineering)Reference architectureCorrectnessDNP3Sequential gameSupervisory controlServerProcess (computing)
Publications 3
#1Chun Lei Wang (THU: Tsinghua University)H-Index: 1
#2Qing MiaoH-Index: 1
Last. Yi Qi Dai (THU: Tsinghua University)H-Index: 1
view all 4 authors...
industrial Control System (ICS) performs the tasks of supervisory control and data acquisition of critical infrastructures. With the widely application of computer and network techniques, ICS suffers serious security threats, and malicious codes are one of the most serious security problems. However, there is absent of analysis methods specific for ICS malicious code behaviors in current times. In this paper, a framework for ICS malicious code analysis is presented. Firstly, the ICS attack graph...
#1Chun Lei Wang (THU: Tsinghua University)H-Index: 1
#2Dong Xia WangH-Index: 1
Last. Yi Qi Dai (THU: Tsinghua University)H-Index: 1
view all 6 authors...
Network survivability has the characteristics of complexity, dynamic evolution and uncertainty, which has become one of the most important factors for analyzing and evaluating network performance. Network survivability analysis and evaluation is a process of analyzing and quantifying the degree to which network system can survive in network threats. This paper proposes a novel network survivability analysis and evaluation model.Firstly, network survivability is abstracted as a dynamic game proce...
Mar 13, 2010 in ICMTMA (International Conference on Measuring Technology and Mechatronics Automation)
#1Chun Lei Wang (THU: Tsinghua University)H-Index: 1
#2Lan Fang (THU: Tsinghua University)H-Index: 1
Last. Yiqi Dai (THU: Tsinghua University)H-Index: 1
view all 3 authors...
Simulation experiment is an important means of analyzing and assessing the security of SCADA (Supervisory Control and Data Acquisition) system, however, the existing simulation environments have some limitations in flexibility and extensibility. According to the type of industrial infrastructure and the structure of SCADA system, the abstract models of SCADA system are established, the reference architecture of SCADA system simulation environment is proposed, and the simulation environment for a...
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.