Towards secure model for SCADA systems
暂无分享,去创建一个
Ali Dehghantanha | Nur Izura Udzir | Nor Fazlida Binti Mohd Sani | Solahuddin bin Shamsuddin | Farid Daryabar | N. F. M. Sani | A. Dehghantanha | N. Udzir | S. Shamsuddin | Farid Daryabar
[1] Rae Zimmerman,et al. Analyzing cascading effects within infrastructure sectors for consequence reduction , 2009, 2009 IEEE Conference on Technologies for Homeland Security.
[2] Stuart A. Boyer. Scada: Supervisory Control and Data Acquisition , 1993 .
[3] Levente Buttyán,et al. Duqu: Analysis, Detection, and Lessons Learned , 2012 .
[4] John D. Fernandez,et al. SCADA systems: vulnerabilities and remediation , 2005 .
[5] Ali Dehghantanha,et al. Investigation of bypassing malware defences and malware detections , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[6] Dong-Joo Kang,et al. Analysis on cyber threats to SCADA systems , 2009, 2009 Transmission & Distribution Conference & Exposition: Asia and Pacific.
[7] Helge Janicke,et al. SCADA security in the light of Cyber-Warfare , 2012, Comput. Secur..
[8] Miguel Areias,et al. SECURITY FOR CRITICAL INFRASTRUCTURE SCADA SYSTEMS , 2013 .