Autonomic computing meets SCADA security
暂无分享,去创建一个
[1] Thomas A. Corbi,et al. The dawning of the autonomic computing era , 2003, IBM Syst. J..
[2] Daniel Martins,et al. A Hybrid Approach for Big Data Outlier Detection from Electric Power SCADA System , 2017, IEEE Latin America Transactions.
[3] Yingxu Wang,et al. Cognitive informatics models of the brain , 2006, IEEE Trans. Syst. Man Cybern. Syst..
[4] B. S. Bindhumadhava,et al. SCADA communication protocols: vulnerabilities, attacks and possible mitigations , 2013, CSI Transactions on ICT.
[5] Haider Abbas,et al. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges , 2016, IEEE Access.
[6] Igor Nai Fovino,et al. A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems , 2011, IEEE Transactions on Industrial Informatics.
[7] Yingxu Wang,et al. Cognitive informatics models of the brain , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[8] Robin A. Gandhi,et al. An integrated framework for control system simulation and regulatory compliance monitoring , 2011, Int. J. Crit. Infrastructure Prot..
[9] Julie A. McCann,et al. A survey of autonomic computing—degrees, models, and applications , 2008, CSUR.
[10] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[11] Shushma Patel,et al. A layered reference model of the brain (LRMB) , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[12] Sherif Abdelwahed,et al. Towards realizing self-protecting SCADA systems , 2014, CISR '14.
[13] Salim Hariri,et al. Autonomic Computing: An Overview , 2004, UPP.
[14] Pieter H. Hartel,et al. A log mining approach for process monitoring in SCADA , 2010, International Journal of Information Security.
[15] Salim Hariri,et al. The application of autonomic computing for the protection of industrial control systems , 2011 .
[16] Nils Ole Tippenhauer,et al. HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems , 2016, CPS-SPC '16.
[17] M. Reiser,et al. Security intelligence for industrial control systems , 2016, IBM J. Res. Dev..
[18] Dong Wei,et al. Survivable SCADA Via Intrusion-Tolerant Replication , 2014, IEEE Transactions on Smart Grid.
[19] Stamatis Karnouskos,et al. Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[20] Lasith Yasakethu,et al. Anomaly Detection via One Class SVM for Protection of SCADA Systems , 2013, 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[21] Maninder Singh,et al. The Journey of QoS-Aware Autonomic Cloud Computing , 2017, IT Professional.
[22] Manuel Rodríguez-Martínez,et al. Autonomic Computing Drives Innovation of Energy Smart Grids , 2012, Complex Adaptive Systems.
[23] Matthew Roughan,et al. Case Studies of SCADA Firewall Configurations and the Implications for Best Practices , 2016, IEEE Transactions on Network and Service Management.
[24] Li Yang,et al. A KNOWLEDGE EXPRESSION METHOD OF SCADA NETWORK ATTACK AND DEFENCE BASED ON FACTOR STATE SPACE , 2012 .