Security challenges and methods for protecting critical infrastructure cyber-physical systems
暂无分享,去创建一个
[1] Hamid Sharif,et al. Automated Covert Channel Modeling over a real network platform , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[2] Naixue Xiong,et al. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information , 2015, Symmetry.
[3] Ashutosh Tiwari,et al. The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence , 2016, 2016 IEEE Congress on Evolutionary Computation (CEC).
[4] Jian Sun,et al. Optimal data integrity attack on actuators in Cyber-Physical Systems , 2016, 2016 American Control Conference (ACC).
[5] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[6] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[7] R.S.H. Piggin,et al. Safety and security - a story of interdependence , 2015 .
[8] Khalil El-Khatib,et al. Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol , 2013, 2013 Third International Conference on Communications and Information Technology (ICCIT).
[9] Hamid Sharif,et al. Achieving robustness and capacity gains in covert timing channels , 2014, 2014 IEEE International Conference on Communications (ICC).
[10] Bruce Schneier,et al. Schneier on security , 2008 .
[11] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[12] Guofei Jiang,et al. Modeling and analytics for cyber-physical systems in the age of big data , 2014, PERV.
[13] Richard Kissel,et al. Glossary of Key Information Security Terms , 2014 .
[14] Bruno Sinopoli,et al. Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.
[15] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[16] Liviu Miclea,et al. A framework for verifying the integrity of the components of a secure cyber-physical system , 2014, 2014 18th International Conference on System Theory, Control and Computing (ICSTCC).
[17] Joaquín García,et al. Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[18] E. Byres,et al. The Use of Attack Trees in Assessing Vulnerabilities in SCADA Systems , 2004 .
[19] Robert K. Abercrombie,et al. Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation , 2015, 2015 IEEE Symposium Series on Computational Intelligence.