暂无分享,去创建一个
[1] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[2] Tianbo Lu,et al. Analysis of security threats and vulnerability for cyber-physical systems , 2013, Proceedings of 2013 3rd International Conference on Computer Science and Network Technology.
[3] Olumide Kayode,et al. Access Control Model for Google Cloud IoT , 2020, 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS).
[4] Virendra Pal Singh,et al. Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks , 2013 .
[5] Syed Hassan Ahmed,et al. Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).
[6] Sudip Mittal,et al. Security and Privacy in Smart Farming: Challenges and Opportunities , 2020, IEEE Access.
[7] Rajendra V. Boppana,et al. Analyzing the Vulnerabilities Introduced by DDoS Mitigation Techniques for Software-Defined Networks , 2019, NCS.
[8] Jay Lee,et al. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .
[9] Charles A. Kamhoua,et al. Enabling Cooperative IoT Security via Software Defined Networks (SDN) , 2018, 2018 IEEE International Conference on Communications (ICC).
[10] Lei Xu,et al. Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures , 2015, NDSS.
[11] Deepti Gupta,et al. Future Smart Connected Communities to Fight COVID-19 Outbreak , 2020, Internet of Things.
[12] Ismail Ahmedy,et al. Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol , 2018, IEEE Access.
[13] Mohsen Guizani,et al. Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks , 2018, IEEE Journal on Selected Areas in Communications.
[14] George Varghese,et al. P4: programming protocol-independent packet processors , 2013, CCRV.
[15] Shiyan Hu,et al. Introduction to Cyber-Physical System Security: A Cross-Layer Perspective , 2017, IEEE Transactions on Multi-Scale Computing Systems.
[16] Khaled M. Khan,et al. Cybersecurity for industrial control systems: A survey , 2020, Comput. Secur..
[17] Vijay Mann,et al. SPHINX: Detecting Security Attacks in Software-Defined Networks , 2015, NDSS.
[18] Ghazanfar Ali Safdar,et al. Survey on security and privacy issues in cyber physical systems , 2019, AIMS Electronics and Electrical Engineering.
[19] Amjad Gawanmeh,et al. Taxonomy Analysis of Security Aspects in Cyber Physical Systems Applications , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).
[20] Rawan S. Hassoubah,et al. Intrusion Detection of Hello Flood Attack in WSNs Using Location Verification Scheme , .
[21] Yang Li,et al. A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields , 2015 .
[22] Nikolaos M. Freris,et al. A software-defined architecture for control of IoT cyberphysical systems , 2018, Cluster Computing.