{"title":"IEMI(故意电磁干扰)威胁概述","authors":"E. Savage, W. Radasky","doi":"10.1109/ISEMC.2012.6351829","DOIUrl":null,"url":null,"abstract":"In this paper we present an overview of the IEMI threat, discuss an assessment approach, and present mitigation options. Because it is often dominant, we concentrate on cable coupling of radiated RF (radio frequency) power as the means of IEMI attack. We separate an IEMI attack into various parts, and introduce an efficient approach for assessing the IEMI vulnerability of a facility. We then present some methods to mitigate IEMI attacks, especially for network cable coupling. Finally, we review ongoing worldwide IEMI efforts.","PeriodicalId":197346,"journal":{"name":"2012 IEEE International Symposium on Electromagnetic Compatibility","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2012-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"28","resultStr":"{\"title\":\"Overview of the threat of IEMI (intentional electromagnetic interference)\",\"authors\":\"E. Savage, W. Radasky\",\"doi\":\"10.1109/ISEMC.2012.6351829\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we present an overview of the IEMI threat, discuss an assessment approach, and present mitigation options. Because it is often dominant, we concentrate on cable coupling of radiated RF (radio frequency) power as the means of IEMI attack. We separate an IEMI attack into various parts, and introduce an efficient approach for assessing the IEMI vulnerability of a facility. We then present some methods to mitigate IEMI attacks, especially for network cable coupling. Finally, we review ongoing worldwide IEMI efforts.\",\"PeriodicalId\":197346,\"journal\":{\"name\":\"2012 IEEE International Symposium on Electromagnetic Compatibility\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"28\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE International Symposium on Electromagnetic Compatibility\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISEMC.2012.6351829\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Symposium on Electromagnetic Compatibility","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISEMC.2012.6351829","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Overview of the threat of IEMI (intentional electromagnetic interference)
In this paper we present an overview of the IEMI threat, discuss an assessment approach, and present mitigation options. Because it is often dominant, we concentrate on cable coupling of radiated RF (radio frequency) power as the means of IEMI attack. We separate an IEMI attack into various parts, and introduce an efficient approach for assessing the IEMI vulnerability of a facility. We then present some methods to mitigate IEMI attacks, especially for network cable coupling. Finally, we review ongoing worldwide IEMI efforts.