Design and implementation of cybersecurity testbed for industrial IoT systems
暂无分享,去创建一个
[1] Tapio Frantti,et al. Situational Awareness for security adaptation in Industrial Control Systems , 2015, 2015 Seventh International Conference on Ubiquitous and Future Networks.
[2] Nishant Kumar,et al. Review on security and privacy concerns in Internet of Things , 2017, 2017 International Conference on IoT and Application (ICIOT).
[3] Dayne Robinson,et al. A cyber-defensive industrial control system with redundancy and intrusion detection , 2017, 2017 North American Power Symposium (NAPS).
[4] Jacek Jarmakiewicz,et al. Development of cyber security testbed for critical infrastructure , 2015, 2015 International Conference on Military Communications and Information Systems (ICMCIS).
[5] Dongho Kang,et al. A design of unidirectional security gateway for enforcement reliability and security of transmission data in industrial control systems , 2016, 2016 18th International Conference on Advanced Communication Technology (ICACT).
[6] Victor A. Skormin,et al. ICS security testbed with delay attack case study , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[7] G. Manimaran,et al. Detection of cyber intrusions using network-based multicast messages for substation automation , 2014, ISGT 2014.
[8] Zhao Yang Dong,et al. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.
[9] Taeshik Shon,et al. Grammar-based adaptive fuzzing: Evaluation on SCADA modbus protocol , 2016, 2016 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[10] Salim Hariri,et al. A testbed for analyzing security of SCADA control systems (TASSCS) , 2011, ISGT 2011.
[11] Wei Gao,et al. On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.
[12] Ahmed Serhrouchni,et al. Taxonomy of attacks on industrial control protocols , 2015, 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS).
[13] Stamatis Karnouskos,et al. Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[14] Md Zakirul Alam Bhuiyan,et al. Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments , 2018, IEEE Internet of Things Journal.
[15] Seokjun Lee,et al. Packet Diversity-Based Anomaly Detection System with OCSVM and Representative Model , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[16] Jongwan Kim,et al. User privacy-enhanced security architecture for home area network of Smartgrid , 2016, Multimedia Tools and Applications.
[17] Mohamed Wahbi,et al. Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges , 2016, 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS).
[18] Sungho Jeon,et al. Burst-based Anomaly Detection on the DNP3 Protocol ⁄ , 2013 .
[19] Taeshik Shon,et al. Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture , 2016, Future Gener. Comput. Syst..
[20] Aiko Pras,et al. Towards periodicity based anomaly detection in SCADA networks , 2012, Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012).
[21] Zia Saquib,et al. A testbed for SCADA cyber security and intrusion detection , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).
[22] Matthias Niedermaier,et al. PropFuzz — An IT-security fuzzing framework for proprietary ICS protocols , 2017, 2017 International Conference on Applied Electronics (AE).
[23] Mercy Bere,et al. Initial investigation of Industrial Control System (ICS) security using Artificial Immune System (AIS) , 2015, 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC).