Method for detecting intrusion in distributed field bus of network and system thereof
A field bus, distributed technology, used in the field of network security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] Herein, the word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any embodiment or implementation of the subject matter described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
[0024] While various modifications and substitutions are permitted herein, specific embodiments thereof have been illustrated in the drawings and will be described in detail below. It should be understood, however, that there is no intention to limit the disclosure to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the scope of the disclosure.
[0025] The terms "comprising", "comprising" or any other variation thereof are intended to cover a non-exclusive inclusion, therefore an arrangement, apparatus or method comprising a list of parts or steps does not include only those parts or steps, but may in...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


