Jianfei Chen
ORCID:
0009-0009-6822-5832
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
- Computational Physics and Python Applications
- Particle Detector Development and Performance
- Particle physics theoretical and experimental studies
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Smart Grid Security and Resilience
National Taiwan University
2024
D. Abadjiev
T. Adams
Petar Adzic
M. Ahmad
C. Amendola
and 95
more
Michael Benjamin Andrews
R. Arcidiacono
S. Argirò
Andrew Askew
E. Auffray
V. Azzolini
D. Bailleux
R. Band
David Barney
P. Barria
N. Bartosik
Chiara Basile
D. Bastos
K. W. Bell
M. Besançon
Riccardo Lo Bianco
C. Biino
V. Blinov
Cecilia Borca
A. Bornheim
Robert M. Brown
M. Campana
S. Castells
F. Cavallari
F. Cetorelli
S. Chatterjee
S. Chatterjee
G. Chaudhary
Jianfei Chen
N. Chernyavskaya
H. Chung
M. Cipriani
L. Cokic
C. Cooke
F. Cossio
F. Couderc
D. Cristoforetti
G. Cucciati
L. Cunqueiro
D. Da Silva Di Calafiori
I. Dafinei
D. J. A. Cockerill
M. Déjardin
D. Del Re
G. Della Ricca
P. Depasse
J. Dervan
Emanuele Di Marco
M. Diemoz
T. Dimova
G. Dissertori
M. Dittmar
A. Dolgopolov
M. Donegà
M. Dordevic
H. El Mamouni
F. Errico
Felipe Espinosa
J. Fauré
J. Fay
J. Fernández Menéndez
F. Ferri
L. Finco
F. Fiori
Ellery Frahm
Wolfgang Funk
T. Gadek
J. Gajownik
M. Galli
S. Ganjour
S. Gascon
A. Ghezzi
Partha Ghose
S. Gninenko
S. Goadhouse
N. Godinović
N. Golubev
P. Govoni
P. Gras
John Hakala
G. Hamel de Monchenault
A. Harilal
N. Härringer
R. Hashmi
H. F. Heath
R. Hirosky
Ka Wa Ho
X. Hou
Q. Ingram
Sh. Jain
Tahir Javaid
C. P. Jessop
R. Jimènez
B. M. Joshi
E. Jourd‘hui
10.1007/s41781-024-00118-z
article
EN
cc-by
Computing and Software for Big Science
2024-06-24
With the development of industry, industrial control systems are widely used in critical infrastructures. As one most significant components, terminals include Programmable Logic Controller, Distributed Control Systems, Remote Terminal Unit, and etc. Attacks against can cause catastrophic damage since they directly related to business field. Unfortunately, traditional protection methods, such as intrusion detection antivirus software, not applicable which resource-constrained. In this paper,...
10.1145/3650400.3650508
article
EN
Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering
2023-10-20
Coming Soon ...