A Framework of Cyber-Security Protection for Warship Systems
暂无分享,去创建一个
Zhang Qi | Wang Xuan | Li Xuan | Lv Yunfei | Chen Yuanbao
[1] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[2] Lin Hai-tao. Study on Security & Secrecy Demand of Ship Communication System , 2011 .
[3] Richard G. Bensing. An Assessment of Vulnerabilities for Ship-based Control Systems , 2009 .
[4] Chen Hui,et al. Study on the Architecture of Intelligent Warship's TSCE Based on Multi-view , 2014, 2014 13th International Symposium on Distributed Computing and Applications to Business, Engineering and Science.
[5] Naixue Xiong,et al. Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications , 2014, Inf. Sci..
[6] Yves Deswarte,et al. Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] Shi Jianchen. Study on the Security Protection for Warship Electronic Information Systems , 2012 .
[8] Hans Liwång,et al. Risk-based ship security analysis : a decision-support approach , 2015 .
[9] Barbara Kordy,et al. Attack-defense trees , 2014, J. Log. Comput..
[10] Arthur K. Cebrowski,et al. Network-Centric Warfare: Its Origin and Future , 1998 .
[11] Marco R. Spruit,et al. Designing a Secure Cloud Architecture: The SeCA Model , 2012, Int. J. Inf. Secur. Priv..