Cyber-Physical Systems Security
暂无分享,去创建一个
[1] T. N. Stevenson,et al. Fluid Mechanics , 2021, Nature.
[2] Dieter Gollmann. Veracity, Plausibility, and Reputation , 2012, WISTP.
[3] Roy Arends,et al. DNS for Fun and Profit , 2005 .
[4] Alvaro A. Cárdenas,et al. CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals , 2014, ACSAC.
[5] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[6] Ashkan Sami,et al. Employing secure coding practices into industrial applications: a case study , 2014, Empirical Software Engineering.
[7] Niklas Borselius. Mobile agent security , 2002 .
[8] Ralph Langner. To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve , 2013 .
[9] Edward A. Lee. Cyber-physical Systems -are Computing Foundations Adequate? Position Paper for Nsf Workshop on Cyber-physical Systems: Research Motivation, Techniques and Roadmap , 1998 .
[10] Jan Hruska. Computer viruses , 1990 .
[11] Ronald C. Dodge,et al. Technology Education at the US Military Academy , 2005, IEEE Secur. Priv..
[12] Robert Allan Leishear. Fluid Mechanics, Water Hammer, Dynamic Stresses and Piping Design , 2013 .
[13] Srdjan Capkun,et al. Attacks on public WLAN-based positioning systems , 2009, MobiSys '09.
[14] Micah Sherr,et al. Veracity: Practical Secure Network Coordinates via Vote-based Agreements , 2009, USENIX Annual Technical Conference.
[15] Srdjan Capkun,et al. On the requirements for successful GPS spoofing attacks , 2011, CCS '11.
[16] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.