PLC Code-Level Vulnerabilities
暂无分享,去创建一个
Willy Susilo | Raad Raad | Mohamad Raad | Abraham Serhane | W. Susilo | R. Raad | M. Raad | Abraham Serhane
[1] Yi Mu,et al. Securing DSR against wormhole attacks in multirate ad hoc networks , 2013, J. Netw. Comput. Appl..
[2] Troy Nash,et al. Backdoors and Holes in Network Perimeters , 2005 .
[3] O. Andreeva,et al. INDUSTRIAL CONTROL SYSTEMS VULNERABILITIES STATISTICS , 2016 .
[4] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[5] Csilla Farkas,et al. Software security: Application-level vulnerabilities in SCADA systems , 2011, 2011 IEEE International Conference on Information Reuse & Integration.
[6] Yi Mu,et al. Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks , 2018, J. Inf. Secur. Appl..
[7] Zhenfei Zhang,et al. Mobile ad-hoc network key management with certificateless cryptography , 2008, 2008 2nd International Conference on Signal Processing and Communication Systems.