default search action
Yong Peng 0005
Person information
- affiliation: China Information Technology Security Evaluation Center, CNITSEC, Technical Assessment Research Lab, Beijing, China
Other persons with the same name
- Yong Peng — disambiguation page
- Yong Peng 0001 — Hangzhou Dianzi University, School of Computer Science, China (and 3 more)
- Yong Peng 0002 — Central South University, Key Laboratory of Traffic Safety on Track of Ministry of Education, School of Traffic and Transportation Engineering, Changsha, China (and 1 more)
- Yong Peng 0003 — Sichuan University, Laboratory of Molecular Oncology, Frontiers Science Center for Disease-related Molecular Network, Chengdu, China (and 1 more)
- Yong Peng 0004 — Southwest Petroleum University, Petroleum Engineering School, Chengdu, China
- Yong Peng 0006 — National University of Defense Technology, College of Systems Engineering, Changsha, Hunan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [c23]Yong Peng, Jie Liang, Guoai Xu:
Malware detection method for the industrial control systems. CCIS 2016: 255-259 - 2015
- [c22]Yong Peng, Chong Xiang, Haihui Gao, Dongqing Chen, Wang Ren:
Industrial Control System Fingerprinting and Anomaly Detection. Critical Infrastructure Protection 2015: 73-85 - [c21]Yong Peng, Yu Wang, Chong Xiang, Xifeng Liu, Zhe Wen, Dongqing Chen, Chaojun Zhang:
Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment Environment. IIH-MSP 2015: 322-326 - [c20]Haihui Gao, Yong Peng, Kebin Jia, Zhe Wen, Hanjing Li:
Cyber-Physical Systems Testbed Based on Cloud Computing and Software Defined Network. IIH-MSP 2015: 337-340 - [i1]Chong Xiang, Li Yang, Yong Peng, Dongqing Chen:
The Classification of Quantum Symmetric-Key Encryption Protocols. CoRR abs/1501.04896 (2015) - 2014
- [j2]Tianbo Lu, Xiaobo Guo, Yang Li, Yong Peng, Xiaoyan Zhang, Feng Xie, Yang Gao:
Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [c19]Feng Xie, Yong Peng, Wei Zhao, Yang Gao, Xuefeng Han:
Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges. CISIM 2014: 624-635 - [c18]Haihui Gao, Yong Peng, Zhonghua Dai, Ting Wang, Xuefeng Han, Hanjing Li:
An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation. Critical Infrastructure Protection 2014: 79-91 - [c17]Haihui Gao, Zhonghua Dai, Yong Peng, Huikang Lu:
Cyber Security Risk Assessment of Communication Network of Substation Based on Improved Grey Clustering. IIH-MSP 2014: 524-527 - [c16]Zhonghua Dai, Haihui Gao, Yong Peng, Huikang Lu:
A New Information Security Risk Assessment Method in Power Production System Based on Rough Sets and Bayesian Network. IIH-MSP 2014: 532-536 - [c15]Haihui Gao, Yong Peng, Zhonghua Dai, Hanjing Li:
Techniques and Research Trends of Network Testbed. IIH-MSP 2014: 537-541 - 2013
- [c14]Haihui Gao, Yong Peng, Kebin Jia, Zhonghua Dai, Ting Wang:
The Design of ICS Testbed Based on Emulation, Physical, and Simulation (EPS-ICS Testbed). IIH-MSP 2013: 420-423 - [c13]Ting Wang, Qi Xiong, Haihui Gao, Yong Peng, Zhonghua Dai, Shengwei Yi:
Design and Implementation of Fuzzing Technology for OPC Protocol. IIH-MSP 2013: 424-428 - [c12]Feng Xie, Tianbo Lu, Xiaobo Guo, Jingli Liu, Yong Peng, Yang Gao:
Security Analysis on Cyber-physical System Using Attack Tree. IIH-MSP 2013: 429-432 - [c11]Wei Zhao, Feng Xie, Yong Peng, Yang Gao, Xuefeng Han, Haihui Gao, Dejin Wang:
Security Testing Methods and Techniques of Industrial Control Devices. IIH-MSP 2013: 433-436 - [c10]Fangfang Wang, Huazhong Wang, Dongqing Chen, Yong Peng:
Substation Communication Security Research Based on Hybrid Encryption of DES and RSA. IIH-MSP 2013: 437-441 - [c9]Yong Peng, Tianbo Lu, Jingli Liu, Yang Gao, Xiaobo Guo, Feng Xie:
Cyber-physical System Risk Assessment. IIH-MSP 2013: 442-447 - 2012
- [c8]Feng Xie, Tianbo Lu, Bing Xu, Dongqing Chen, Yong Peng:
Research on Software Development Process Assurance Models in ICT Supply Chain Risk Management. APSCC 2012: 43-49 - [c7]Feng Xie, Yong Peng, Wei Zhao, Dongqing Chen, Xiaoran Wang, Xingmei Huo:
A risk management framework for cloud computing. CCIS 2012: 476-480 - [c6]Haihui Gao, Yong Peng, Qingtang Zheng, Xi Chen, Zhonghua Dai, Yang Gao, Feng Xie, Wei Zhao, Qi Xiong:
The research and implementation of intelligent mobile video supervising system based on DSP. CCIS 2012: 657-660 - [c5]Yang Gao, Yong Peng, Tieshan Guan, Feng Xie, Zhonghua Dai, Guoai Xu:
Stability analysis of software networks. CCIS 2012: 681-684 - [c4]Haihui Gao, Yong Peng, Zhonghua Dai, Feng Xie:
A New Detection Algorithm of Moving Objects Based on Human Morphology. IIH-MSP 2012: 411-414 - [c3]Zhonghua Dai, Qi Xiong, Yong Peng, Haihui Gao:
Research on the Large Scale Image Steganalysis Technology Based on Cloud Computing and BP Neutral Network. IIH-MSP 2012: 415-419 - [c2]Wei Zhao, Yong Peng, Feng Xie, Zhonghua Dai, Haihui Gao, Yang Gao:
Designated Verifier Signature Scheme over Circulant Matrices. IIH-MSP 2012: 420-423
2000 – 2009
- 2009
- [j1]Xiaojun Ye, Zhiwu Zhu, Yong Peng, Feng Xie:
Privacy Aware Engineering: A Case Study. J. Softw. 4(3): 218-225 (2009) - [c1]Yawei Zhang, Xiaojun Ye, Feng Xie, Yong Peng:
A Practical Database Intrusion Detection System Framework. CIT (1) 2009: 342-347
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint