Detecting Intrusions in Cyber-Physical Systems of Smart Cities : Challenges and Directions
暂无分享,去创建一个
[1] Sherali Zeadally,et al. Cybersecurity and Privacy Solutions in Smart Cities , 2017, IEEE Communications Magazine.
[2] Al-Sakib Khan Pathan,et al. The State of the Art in Intrusion Prevention and Detection , 2014 .
[3] Radha Poovendran,et al. Cyber-Physical Systems: Close Encounters Between Two Parallel Worlds [Point of View] , 2010, Proc. IEEE.
[4] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[5] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[6] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[7] Frank Mueller,et al. Time-based intrusion detection in cyber-physical systems , 2010, ICCPS '10.
[8] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[9] Nicholas Hopper,et al. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks , 2013, IEEE Transactions on Mobile Computing.
[10] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[11] Song Deng,et al. Distributed intrusion detection based on hybrid gene expression programming and cloud computing in a cyber physical power system , 2017 .
[12] Michael Beigl,et al. Graph-based anomaly detection for smart cities: A survey , 2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[13] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[14] Tarek S. Sobh. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art , 2006, Comput. Stand. Interfaces.
[15] Lang Yu,et al. Intrusion detection using rough set classification , 2004, Journal of Zhejiang University. Science.
[16] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[17] Béla Genge,et al. Using Sensitivity Analysis and Cross-Association for the Design of Intrusion Detection Systems in Industrial Cyber-Physical Systems , 2017, IEEE Access.
[18] Ing-Ray Chen,et al. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.
[19] Quanyan Zhu,et al. Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.
[20] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[21] Ravi Sankar,et al. Prevention and detection of intrusions in wireless sensor networks , 2013 .
[22] Björn Scheuermann,et al. Misbehavior Detection in Industrial Wireless Networks: Challenges and Directions , 2018, Mob. Networks Appl..
[23] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.