Towards self-defending control systems in cybersecurity analysis and measures in industrial automation systems
暂无分享,去创建一个
[1] Jeffrey L. Hieb,et al. Cyber security risk assessment for SCADA and DCS networks. , 2007, ISA transactions.
[2] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[3] Majeed Soufian. Dynamic optimisation of an industrial web process , 2008 .
[4] Gary B. Lamont,et al. Digital control systems--theory, hardware, software , 1985 .
[5] Nabanita Mandal,et al. A survey on network security tools for open source , 2016, 2016 IEEE International Conference on Current Trends in Advanced Computing (ICCTAC).
[6] Farzad Sabahi,et al. Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[7] Dong Wei,et al. Protecting Smart Grid Automation Systems Against Cyberattacks , 2011, IEEE Transactions on Smart Grid.
[8] Steve Gold. Feature: The SCADA challenge: securing critical infrastructure , 2009 .
[9] E. Byres,et al. The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .
[10] A. Treytl,et al. Security measures in automation systems-a practice-oriented approach , 2005, 2005 IEEE Conference on Emerging Technologies and Factory Automation.
[11] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[12] Ken Munro. SCADA: SCADA - A critical situation , 2008 .
[13] Henning Trsek,et al. Cloud computing for industrial automation systems — A comprehensive overview , 2013, 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation (ETFA).
[14] Kevin Jones,et al. A review of cyber security risk assessment methods for SCADA systems , 2016, Comput. Secur..
[15] W. Marsden. I and J , 2012 .