Browse Items (29 total)

  • Tags: Network security

Accelerating the deep integration of digitalization and industrialization is an important way and inevitable for the energy industry to achieve high-quality development. Big data, artificial intelligence and other technologies are key production…

Accelerating the deep integration of digitalization and industrialization is an important way and inevitable for the energy industry to achieve high-quality development. Big data, artificial intelligence and other technologies are key production…

In recent years, the development speed of big data related technology is extremely rapid, and it gradually penetrates into all fields of society from a more in-depth and broader perspective, which provides an objective data basis for the development…

In recent years, the development speed of big data related technology is extremely rapid, and it gradually penetrates into all fields of society from a more in-depth and broader perspective, which provides an objective data basis for the development…

Accelerating the deep integration of digitalization and industrialization is an important way and inevitable for the energy industry to achieve high-quality development. Big data, artificial intelligence and other technologies are key production…

The security management of information system refers to the establishment of effective protection mechanism for hardware, software and data in the system to ensure the normal operation of the system, free from accidental or malicious reasons, such…

In recent years, the development speed of big data related technology is extremely rapid, and it gradually penetrates into all fields of society from a more in-depth and broader perspective, which provides an objective data basis for the development…

Petrophysics is the science (and art) of rock exploration. Even though its development is primarily driven by oil exploration, with the motto of "if it aint broke, dont fix it," and despite or maybe due to the current low oil prices, the oil and gas…

The security management of information system refers to the establishment of effective protection mechanism for hardware, software and data in the system to ensure the normal operation of the system, free from accidental or malicious reasons, such…

Petrophysics is the science (and art) of rock exploration. Even though its development is primarily driven by oil exploration, with the motto of "if it aint broke, dont fix it," and despite or maybe due to the current low oil prices, the oil and gas…

The security management of information system refers to the establishment of effective protection mechanism for hardware, software and data in the system to ensure the normal operation of the system, free from accidental or malicious reasons, such…

Petrophysics is the science (and art) of rock exploration. Even though its development is primarily driven by oil exploration, with the motto of "if it aint broke, dont fix it," and despite or maybe due to the current low oil prices, the oil and gas…

Accelerating the deep integration of digitalization and industrialization is an important way and inevitable for the energy industry to achieve high-quality development. Big data, artificial intelligence and other technologies are key production…

In recent years, the development speed of big data related technology is extremely rapid, and it gradually penetrates into all fields of society from a more in-depth and broader perspective, which provides an objective data basis for the development…

Accelerating the deep integration of digitalization and industrialization is an important way and inevitable for the energy industry to achieve high-quality development. Big data, artificial intelligence and other technologies are key production…

The gas transmission capability (GTC) is a key index for the natural gas pipeline system, which is used to describe the transmission capability limit of the system. There exists the GTC curve in the natural gas pipeline system, which can describe the…

The paper presents a theft-prevention system, called the “Security Sensor System” (SSS), currently deployed on 50+ experimental trucks for Liquid Petroleum Gas (LPG) bulk distribution, and integrated on an Oil &amp

The crucial part of vulnerability analysis is identifying the critical components of a pipeline network. In this study, we proposed a novel analysis method- “Risk-Vulnerability,” which combines the characteristics of risk assessments and…

The integration of new Information and Communication Technologies (ICT) within the heart of Industrial Control Systems (ICS) generated a large palette of innovative solutions. As such, the industry has undergone a new technological revolution, also…

We present a modeling framework for analyzing if the use of interruptible transportation services can improve capacity utilization in a natural gas transportation network. The network consists of two decision makers: the transmission system operator…

Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of…

Three different outcrops are selected in this study, each representing a shallow-marine system with varying heterogeneity provided by siliciclasticcarbonate mixing that may form a small or large stratigraphic trap. The impact of these styles of mixed…

The natural gas supply of the Eastern European countries located between Germany and Russia has always been problematic. A historical reliance on Russia has been eased by increased connectivity to the West. Recent developments may lead to a…

Improving predictive models for noble gas transport through natural materials at the field-scale is an essential component of improving US nuclear monitoring capabilities. Several field-scale experiments with a gas transport component have been…

1As people's dependence on the Internet increases, traditional network architectures with rigid characteristics will gradually fail to meet all demands. It has higher flexibility and provides a convenient platform for technologies and concepts such…

Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of…

With the continuous development of network and information technology, especially the continuous promotion of Made in China 2025, industrial control system has become an important support system of modern industrial infrastructure including…

The paper presents a theft-prevention system, called the “Security Sensor System” (SSS), currently deployed on 50+ experimental trucks for Liquid Petroleum Gas (LPG) bulk distribution, and integrated on an Oil &amp
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2