Slave Clock Responses to Precision Time Protocol Attacks: A Case Study
暂无分享,去创建一个
[1] Tal Mizrahi,et al. Multi-path Time Protocols , 2013, 2013 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication (ISPCS) Proceedings.
[2] Tal Mizrahi,et al. Security Requirements of Time Protocols in Packet Switched Networks , 2014, RFC.
[3] Mourad Debbabi,et al. An Extension to the Precision Time Protocol (PTP) to Enable the Detection of Cyber Attacks , 2020, IEEE Transactions on Industrial Informatics.
[4] Timo Koskiahde,et al. PTP monitoring in redundant network , 2016, 2016 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS).
[5] Wojciech Owczarek,et al. Using a multi-source NTP watchdog to increase the robustness of PTPv2 in financial industry networks , 2014, 2014 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS).
[6] Marcelo Dalmas,et al. Improving PTP robustness to the byzantine failure , 2015, 2015 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS).
[7] Michael Schukat,et al. Advanced methodologies to deter internal attacks in PTP time synchronization networks , 2017, 2017 28th Irish Signals and Systems Conference (ISSC).
[8] Tal Mizrahi. Time synchronization security using IPsec and MACsec , 2011, 2011 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.