暂无分享,去创建一个
[1] Stamatis Karnouskos,et al. Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[2] Bharat B. Madan,et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.
[3] Feiyi Wang,et al. Analysis of techniques for building intrusion tolerant server systems , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[4] Peter Y. A. Ryan,et al. A qualitative analysis of the intrusion-tolerance capabilities of the MAFTIA architecture , 2004, International Conference on Dependable Systems and Networks, 2004.
[5] Dong Wei,et al. Protecting Smart Grid Automation Systems Against Cyberattacks , 2011, IEEE Transactions on Smart Grid.
[6] Arun K. Sood,et al. Quantitative Approach to Tuning of a Time-Based Intrusion-Tolerant System Architecture , 2009 .
[7] Vincent Nicomette,et al. The Design of a Generic Intrusion-Tolerant Architecture for Web Servers , 2009, IEEE Transactions on Dependable and Secure Computing.
[8] Miguel Correia,et al. Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery , 2010, IEEE Transactions on Parallel and Distributed Systems.
[9] Premkumar T. Devanbu,et al. Willow system demonstration , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[10] Joonsang Baek,et al. Study on Secret Sharing Schemes (SSS) and their applications , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[11] David Hutchison,et al. Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines , 2010, Comput. Networks.
[12] Kwang-Cheng Chen,et al. Smart attacks in smart grid communication networks , 2012, IEEE Communications Magazine.
[13] Magnus Almgren,et al. Dependable Intrusion Tolerance: technology demo , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[14] Kishor S. Trivedi,et al. Investigating dynamic reliability and availability through state-space models , 2012, Comput. Math. Appl..
[15] Yi Xu,et al. A survey on the communication architectures in smart grid , 2011, Comput. Networks.
[16] Bjarne E. Helvik,et al. Integrated Dependability and Security Evaluation Using Game Theory and , 2007 .
[17] Tadashi Dohi,et al. Availability Analysis of an Intrusion Tolerant Distributed Server System With Preventive Maintenance , 2010, IEEE Transactions on Reliability.
[18] William H. Sanders,et al. Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available , 2006, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06).
[19] Anno Accademico,et al. Smart Grid Communications: Overview of research challenges, solutions and standardization activities , 2013 .
[20] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[21] David Powell,et al. A fault- and intrusion- tolerant file system , 1985 .
[22] Alysson Neves Bessani. From Byzantine fault tolerance to intrusion tolerance (a position paper) , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).
[23] Arun K. Sood,et al. Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT) , 2009, 2009 Second International Conference on Dependability.
[24] Cheolwon Lee,et al. The Green Defenders , 2011, IEEE Power and Energy Magazine.
[25] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[26] Defining Steady-State Service Level Agreeability using Semi-Markov Process , 2006 .
[27] Bjarne E. Helvik. CHAPTER 8 – Integrated Dependability and Security Evaluation Using Game Theory and Markov Models , 2008 .
[28] Arun K. Sood,et al. A Comparison of Intrusion-Tolerant System Architectures , 2011, IEEE Security & Privacy.
[29] Mohsen A. Jafari,et al. Protecting Smart Grid Automation Systems Against C , 2011 .
[30] Göran N Ericsson,et al. Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.
[31] Kishor S. Trivedi,et al. State space approach to security quantification , 2005, 29th Annual International Computer Software and Applications Conference (COMPSAC'05).
[32] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[33] Rong Wang,et al. Design and implementation of Acceptance Monitor for building intrusion tolerant systems , 2003, Softw. Pract. Exp..
[34] Siddharth Sridhar,et al. Cyber-Physical System Security for the Electric Power Grid Controlinpowersystemsthatmaybevulnerabletosecurityattacksisdiscussedinthis paper as are control loop vulnerabilities, potential impact of disturbances, and several mitigations. , 2012 .
[35] Helge Janicke,et al. SCADA security in the light of Cyber-Warfare , 2012, Comput. Secur..
[36] Xiaohui Liang,et al. Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.
[37] Mahesh Sooriyabandara,et al. Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities , 2011, IEEE Communications Surveys & Tutorials.
[38] I. Pearson. Smart grid cyber security for Europe , 2011 .
[39] Paulo Veríssimo,et al. Intrusion-tolerant middleware: the road to automatic security , 2006, IEEE Security & Privacy.
[40] Alysson Neves Bessani,et al. OS diversity for intrusion tolerance: Myth or reality? , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).
[41] Arun K. Sood,et al. SCIT and IDS architectures for reduced data ex-filtration , 2010, 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W).
[42] Massoud Amin. Energy Infrastructure Defense Systems , 2005, Proceedings of the IEEE.
[43] Miguel Correia,et al. Intrusion-Tolerant Architectures: Concepts and Design , 2002, WADS.
[44] Hamid Sharif,et al. A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.
[45] Xuemin Shen,et al. Dependability Analysis of Control Center Networks in Smart Grid Using Stochastic Petri Nets , 2012, IEEE Transactions on Parallel and Distributed Systems.
[46] Alysson Neves Bessani,et al. The FOREVER service for fault/intrusion removal , 2008, WRAITS '08.
[47] Chen-Ching Liu,et al. Intruders in the Grid , 2012, IEEE Power and Energy Magazine.
[48] Yves Deswarte,et al. Internet Security: An Intrusion-Tolerance Approach , 2006, Proceedings of the IEEE.
[49] Miguel Correia,et al. How Practical Are Intrusion-Tolerant Distributed Systems? , 2006 .
[50] Greeshma Varghese,et al. Analysis of intrusion-tolerant architectures for Web Servers , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.
[51] Yang Xiao,et al. Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.
[52] Jian-Hua Huang,et al. The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model , 2011, WISM.
[53] Thomas M. Overman,et al. High-Assurance Smart Grid: A Three-Part Model for Smart Grid Control Systems , 2011, Proceedings of the IEEE.
[54] Miguel Correia,et al. The Crutial Way of Critical Infrastructure Protection , 2008, IEEE Security & Privacy Magazine.
[55] Feiyi Wang,et al. SITAR: a scalable intrusion-tolerant architecture for distributed services , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].