Classification of ICS abnormal behavior in terms of security
暂无分享,去创建一个
[1] Kymie M. C. Tan,et al. A defense-centric taxonomy based on attack manifestations , 2004, International Conference on Dependable Systems and Networks, 2004.
[2] Sujeet Shenoi,et al. A Taxonomy of Attacks on the DNP3 Protocol , 2009, Critical Infrastructure Protection.
[3] Himanshu Khurana,et al. Towards A Taxonomy Of Attacks Against Energy Control Systems , 2008, Critical Infrastructure Protection.
[4] Jayne Caswell. A Survey of Industrial Control Systems Security , 2011 .
[5] Dale C. Rowe,et al. A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.
[6] Ray Hunt,et al. A taxonomy of network and computer attacks , 2005, Comput. Secur..
[7] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[8] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[9] S. Shankar Sastry,et al. A Taxonomy of Cyber Attacks on SCADA Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[10] Igor Nai Fovino,et al. Design and Implementation of a Secure Modbus Protocol , 2009, Critical Infrastructure Protection.
[11] Sujeet Shenoi,et al. Attack taxonomies for the Modbus protocols , 2008, Int. J. Crit. Infrastructure Prot..