Security of Cyber Physical System
暂无分享,去创建一个
[1] Wenye Wang,et al. Greenbench: A benchmark for observing power grid vulnerability under data-centric threats , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[2] Ing-Ray Chen,et al. Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[3] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[4] Timothy W. Finin,et al. CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies , 2011, 2011 IEEE International Symposium on Policies for Distributed Systems and Networks.
[5] David K. Y. Yau,et al. Impact of integrity attacks on real-time pricing in smart grids , 2013, CCS.
[6] Steven Tom,et al. Recommended Practice for Patch Management of Control Systems , 2008 .
[7] Rosalind W. Picard,et al. Non-contact, automated cardiac pulse measurements using video imaging and blind source separation , 2022 .
[8] Min Song,et al. Detecting Compromised Nodes in Wireless Sensor Networks , 2007 .
[9] William H. Sanders,et al. Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[10] Sangkyum Kim,et al. Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems , 2010, 2010 IEEE International Conference on Data Mining.
[11] Frank Mueller,et al. Time-based intrusion detection in cyber-physical systems , 2010, ICCPS '10.
[12] Vladimir Oleshchuk,et al. Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.
[13] Saurabh Amin,et al. In quest of benchmarking security risks to cyber-physical systems , 2013, IEEE Network.
[14] Farinaz Koushanfar,et al. Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.
[15] Yuan Qi,et al. Minimizing private data disclosures in the smart grid , 2012, CCS '12.
[16] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[17] Xi Fang,et al. Truthful incentive mechanisms for k-anonymity location privacy , 2013, 2013 Proceedings IEEE INFOCOM.
[18] Qing Wang,et al. Security threats and measures for the cyber-physical systems , 2013 .
[19] Min Wu,et al. How secure are power network signature based time stamps? , 2012, CCS.