Cybersecurity best practices for creating resilient control systems
暂无分享,去创建一个
[1] Deborah A. Frincke,et al. CONCERNS ABOUT INTRUSIONS INTO REMOTELY ACCESSIBLE SUBSTATION CONTROLLERS AND SCADA SYSTEMS , 2000 .
[2] Robert Tibshirani,et al. An Introduction to the Bootstrap , 1994 .
[3] Jeffrey B. Roberts,et al. Safeguarding IEDs, Substations, and SCADA Systems Against Electronic Intrusions , 2001 .
[4] Ken Barnes,et al. Introduction to SCADA Protection and Vulnerabilities , 2004 .
[5] Paul W. Oman,et al. Intrusion Detection and Event Monitoring in SCADA Networks , 2007, Critical Infrastructure Protection.
[6] Edmund O. Schweitzer,et al. How would we know? , 2011, 2011 64th Annual Conference for Protective Relay Engineers.
[7] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .