Internet of nuclear things: Managing the proliferation risks of 3-D printing technology
暂无分享,去创建一个
[1] Jonathan B. Tucker,et al. Innovation, Dual Use, and Security: Managing the Risks of Emerging Biological and Chemical Technologies , 2012 .
[2] Aaron Arnold. A Resilience Framework for Understanding Illicit Nuclear Procurement Networks , 2017 .
[3] Jules White,et al. Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the .STL file with human subjects , 2017 .
[4] Tristan A. Volpe. Atomic Leverage: Compellence with Nuclear Latency , 2017 .
[5] E. Fuchs,et al. Global manufacturing and the future of technology , 2014, Science.
[6] Mark Yampolskiya,et al. Using 3 D printers as weapons , 2016 .
[7] N. Miller. Why Nuclear Energy Programs Rarely Lead to Proliferation , 2017, International Security.
[8] S. Zielinski,et al. International Court of Justice , 2002, International Organization.
[9] Yuan Xue,et al. A language for describing attacks on cyber-physical systems , 2015, Int. J. Crit. Infrastructure Prot..
[10] P. W. Singer,et al. Cybersecurity and Cyberwar: What Everyone Needs to Know® , 2013 .
[11] John W. Sutherland,et al. Framework for Identifying Cybersecurity Risks in Manufacturing , 2015 .
[12] Mara Hvistendahl. INDUSTRIAL ESPIONAGE. 3D printers vulnerable to spying. , 2016, Science.
[13] Yuval Elovici,et al. dr0wned - Cyber-Physical Attack with Additive Manufacturing , 2016, WOOT.
[14] David Albright,et al. Detecting and Disrupting Illicit Nuclear Trade after A.Q. Khan , 2010 .
[16] David Albright,et al. Detecting and Disrupting Illicit Nuclear Trade after , 2010 .
[17] Thomas Rid. Cyber War Will Not Take Place , 2012 .
[18] Jaime A. Camelio,et al. Cyber-physical Vulnerability Assessment in Manufacturing Systems , 2016 .
[19] Vincenzo A. Sainato,et al. Cyber War Will Not Take Place , 2012 .
[20] Natasha Bajema,et al. Peril and Promise: Emerging Technologies and WMD , 2017 .
[21] Nektarios Georgios Tsoutsos,et al. Manufacturing and Security Challenges in 3D Printing , 2016 .
[22] Vipin Narang,et al. Strategies of Nuclear Proliferation: How States Pursue the Bomb , 2017, International Security.
[23] Feng-hua Liu,et al. A systematic analysis , 2020 .
[24] Jay Patel,et al. Additive manufacturing , 2016, XRDS.
[25] Celia Paulsen,et al. Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium , 2015 .
[26] Matthew Kroenig,et al. 3-D Printing the Bomb? The Nuclear Nonproliferation Challenge , 2015 .
[27] Anthony Skjellum,et al. Using 3D printers as weapons , 2016, Int. J. Crit. Infrastructure Prot..
[28] J. Tucker. Innovation, Dual Use, and Security , 2012 .
[29] Guha Manogharan,et al. Making sense of 3-D printing: Creating a map of additive manufacturing products and services , 2014 .
[30] Yuan Xue,et al. Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach , 2012, 2012 5th International Symposium on Resilient Control Systems.
[31] David Livingstone Mbe Dsc,et al. Cyber Security at Civil Nuclear Facilities: Understanding the Risks , 2016 .
[32] C. Kamath,et al. Laser powder bed fusion additive manufacturing of metals; physics, computational, and materials challenges , 2015 .
[33] Grant Christopher,et al. 3D Printing: A Challenge to Nuclear Export Controls , 2015 .
[34] Marco Fey,et al. 3D printing and international security: risks and challenges of an emerging technology , 2017 .