3-Dimensional Analysis of Cyber-physical Systems Attacks
暂无分享,去创建一个
[1] Fayez Gebali,et al. Hardware attack risk assessment , 2015, 2015 Tenth International Conference on Computer Engineering & Systems (ICCES).
[2] Fengjun Li,et al. Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.
[3] Gerhard P. Hancke,et al. Denial of Service Defence for Resource Availability in Wireless Sensor Networks , 2018, IEEE Access.
[4] Rosli Salleh,et al. Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.
[5] Bharat Bhushan,et al. Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).
[6] Ong Bi Lynn,et al. Internet of Things (IoT): Taxonomy of security attacks , 2016, 2016 3rd International Conference on Electronic Design (ICED).
[7] Yang Xiaomei,et al. Evolution of wireless sensor network security , 2016, 2016 World Automation Congress (WAC).
[8] Annie Mathew,et al. A survey on various detection techniques of sinkhole attacks in WSN , 2017, 2017 International Conference on Communication and Signal Processing (ICCSP).
[9] Xu Ji,et al. Location Privacy against Traffic Analysis Attacks in Wireless Sensor Networks , 2010, 2010 International Conference on Information Science and Applications.
[10] Fayez Gebali,et al. Hardware Covert Attacks and Countermeasures , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).
[11] Jie Chen,et al. A survey on the security of cyber-physical systems , 2016 .
[12] Asad Waqar Malik,et al. Detection and prevention of Black Hole Attacks in IOT & WSN , 2018, 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC).
[13] Klaus D. McDonald-Maier,et al. An Assessment of Recent Attacks on Specific Embedded Systems , 2014, 2014 Fifth International Conference on Emerging Security Technologies.
[14] Shiyan Hu,et al. Design Automation of Cyber-Physical Systems: Challenges, Advances, and Opportunities , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[15] Sherali Zeadally,et al. Enabling Cyber Physical Systems with Wireless Sensor Networking Technologies, Multiagent System Paradigm, and Natural Ecosystems , 2015, Mob. Inf. Syst..
[16] Neetesh Gupta,et al. Vulnerabilities, attack effect and different security scheme in WSN: A survey , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).
[17] Camilius Sanga,et al. Attacks in Wireless Sensor Networks , 2016 .
[18] Maruf Pasha,et al. A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures , 2017, ArXiv.
[19] Aron Laszka,et al. Resilient wireless sensor networks for cyber-physical systems , 2016 .
[20] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[21] Yogesh Sharma,et al. Countermeasures for selective forwarding and wormhole attack in WSN , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).
[22] Youping Fan,et al. A Method for Identifying Critical Elements of a Cyber-Physical System Under Data Attack , 2018, IEEE Access.
[23] Benfilali Mostefa,et al. A survey of wireless sensor network security in the context of Internet of Things , 2017, 2017 4th International Conference on Information and Communication Technologies for Disaster Management (ICT-DM).
[24] Qusay H. Mahmoud,et al. Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..
[25] Mohammad Abdus Salam,et al. PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK , 2016 .
[26] Sanjeet Kumar,et al. A survey of security in wireless sensor networks , 2015, 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT).