A method to construct network traffic models for process control systems
暂无分享,去创建一个
Béla Genge | Christos Siaterlis | Roberto Uribeetxeberria | Urko Zurutuza | Iñaki Garitano | Urko Zurutuza | C. Siaterlis | Iñaki Garitano | Roberto Uribeetxeberria | B. Genge
[1] B. Chandrasekaran. Survey of Network Traffic Models , 2006 .
[2] Jiankun Hu,et al. Network Traffic Analysis and SCADA Security , 2010, Handbook of Information and Communication Security.
[3] Ulf Lindqvist,et al. Using Model-based Intrusion Detection for SCADA Networks , 2006 .
[4] Alfonso Valdes,et al. Communication pattern anomaly detection in process control systems , 2009, 2009 IEEE Conference on Technologies for Homeland Security.
[5] Andres Perez-Garcia,et al. On the Use of Emulab Testbeds for Scientifically Rigorous Experiments , 2013, IEEE Communications Surveys & Tutorials.
[6] Christof Störmann,et al. Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection , 2009, CRITIS.
[7] Béla Genge,et al. A cyber-physical experimentation environment for the security analysis of networked industrial control systems , 2012, Comput. Electr. Eng..
[8] Ulf Lindqvist,et al. An intrusion detection system for wireless process control systems , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[9] Ronald K. Klimberg,et al. Fundamentals of Forecasting Using Excel , 2009 .
[10] Mike Hibler,et al. An integrated experimental environment for distributed systems and networks , 2002, OPSR.