Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study
暂无分享,去创建一个
[1] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[2] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[3] Weiyi Liu,et al. Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.
[4] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[5] Byron S. Gottfried. Schaum's Outline of Programming with C , 1994 .
[6] Thomas M. Chen,et al. Petri Net Modeling of Cyber-Physical Attacks on Smart Grid , 2011, IEEE Transactions on Smart Grid.
[7] Changrui Ren,et al. A new connected device-based Failure Mode and Effects Analysis model , 2014, Proceedings of 2014 IEEE International Conference on Service Operations and Logistics, and Informatics.
[8] Bradley R. Schmerl,et al. View Consistency in Architectures for Cyber-Physical Systems , 2011, 2011 IEEE/ACM Second International Conference on Cyber-Physical Systems.
[9] Jason Edwin Stamp,et al. COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS , 2003 .
[10] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[11] Edward A. Lee,et al. Aspect-oriented modeling of attacks in automotive Cyber-Physical Systems , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[12] Aditya P. Mathur,et al. Intelligent Checkers to Improve Attack Detection in Cyber Physical Systems , 2013, 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[13] C. Kara-Zaitri,et al. An improved FMEA methodology , 1991, Annual Reliability and Maintainability Symposium. 1991 Proceedings.
[14] Gerhard P Hancke,et al. Introduction to Industrial Control Networks , 2013, IEEE Communications Surveys & Tutorials.
[15] Catherine A. Meadows. Introduction to ACM TISSEC special issue on CCS 2005 , 2009, TSEC.
[16] Mathias Ekstedt,et al. Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models , 2009 .
[17] Sushil Jajodia,et al. Advanced Cyber Attack Modeling Analysis and Visualization , 2010 .
[18] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[19] Andrea Bondavalli,et al. Graphical Formalisms For Modelling CriticalInfrastructures , 2012 .
[20] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[21] Bruno Sinopoli,et al. Robust detection in the presence of integrity attacks , 2012, 2012 American Control Conference (ACC).
[22] William H. Sanders,et al. Go with the flow: toward workflow-oriented security assessment , 2013, NSPW '13.