Cyber-physical Systems Security
暂无分享,去创建一个
Vir V. Phoha | E. Karim | V. Phoha | E. Karim
[1] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[2] Jonathon T. Giffin,et al. Impeding Malware Analysis Using Conditional Code Obfuscation , 2008, NDSS.
[3] Bhavani M. Thuraisingham,et al. Cyberphysical systems security applied to telesurgical robotics , 2012, Comput. Stand. Interfaces.
[4] Mohamed Eltoweissy,et al. Defense as a service cloud for Cyber-Physical Systems , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[5] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[6] Frank Mueller,et al. Time-based intrusion detection in cyber-physical systems , 2010, ICCPS '10.
[7] Bhavani M. Thuraisingham. Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic , 2008, ISI.
[8] Mohamed G. Gouda,et al. Diverse Firewall Design , 2008, IEEE Trans. Parallel Distributed Syst..
[9] Thoshitha T. Gamage,et al. Confidentiality Preserving Security Properties for Cyber-Physical Systems , 2011, 2011 IEEE 35th Annual Computer Software and Applications Conference.
[10] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[11] Thoshitha T. Gamage,et al. Information flow security in cyber-physical systems , 2011, CSIIRW '11.
[12] Nabil R. Adam. Cyber-physical systems security , 2009, CSIIRW '09.
[13] Quanyan Zhu,et al. A hierarchical security architecture for cyber-physical systems , 2011, 2011 4th International Symposium on Resilient Control Systems.
[14] Xiaoqing Frank Liu,et al. Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems , 2011, 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion.
[15] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[16] Yao Zheng,et al. The Relation of CMM and Software Lifecycle Model , 2007 .
[17] Deian Stefan,et al. Data-Provenance Verification For Secure Hosts , 2012, IEEE Transactions on Dependable and Secure Computing.
[18] Tadayoshi Kohno. Security for cyber-physical systems: case studies with medical devices, robots, and automobiles , 2012, WISEC '12.
[19] Pankaj Gupta,et al. Algorithms for routing lookups and packet classification , 2000 .
[20] Hari Balakrishnan,et al. Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks , 2009, NSDI.
[21] Bruce M. McMillin,et al. Analysis of information flow security in cyber-physical systems , 2010, Int. J. Crit. Infrastructure Prot..
[22] Ing-Ray Chen,et al. Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[23] M. Brownfield,et al. Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[24] Prathiba Reddy Nalabolu. Detecting malicious code in sensor network applications using Petri nets , 2007 .
[25] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[26] Min Song,et al. Detecting Compromised Nodes in Wireless Sensor Networks , 2007 .
[27] Suku Nair,et al. Cyber-physical security using system-level PUFs , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.