Security for the Robot Operating System
暂无分享,去创建一个
Peter Schartner | Stefan Rass | Severin Kacianka | Bernhard Dieber | Benjamin Breiling | Sebastian Taurer | S. Rass | P. Schartner | Bernhard Dieber | Benjamin Breiling | Sebastian Taurer | Severin Kacianka
[1] Peter Schartner,et al. Secure communication for the robot operating system , 2017, 2017 Annual IEEE International Systems Conference (SysCon).
[2] Henrik I. Christensen,et al. SROS: Securing ROS over the wire, in the graph, and through the kernel , 2016, ArXiv.
[3] Peter Schartner,et al. Application-level security for ROS-based applications , 2016, 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[4] Miklós Kozlovszky,et al. Increasing ROS 1.x communication security for medical surgery robot , 2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[5] Anton V. Uzunov. A survey of security solutions for distributed publish/subscribe systems , 2016, Comput. Secur..
[6] Vicente Matellán Olivera,et al. Cybersecurity in Autonomous Systems: Evaluating the performance of hardening ROS , 2016 .
[7] Peter Fairley,et al. Cybersecurity at U.S. utilities due for an upgrade: Tech to detect intrusions into industrial control systems will be mandatory [News] , 2016 .
[8] Eduardo B. Fernández,et al. Security solution frames and security patterns for authorization in distributed, collaborative systems , 2015, Comput. Secur..
[9] David Hutchison,et al. A survey of cyber security management in industrial control systems , 2015, Int. J. Crit. Infrastructure Prot..
[10] Christian Esposito,et al. On Security in Publish/Subscribe Services: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[11] Leandros A. Maglaras,et al. Intrusion detection in SCADA systems using machine learning techniques , 2014, 2014 Science and Information Conference.
[12] Yi Zhang,et al. ROSRV: Runtime Verification for Robots , 2014, RV.
[13] Sonia Chernova,et al. Message authentication codes for secure remote non-native client connections to ROS enabled robots , 2014, 2014 IEEE International Conference on Technologies for Practical Robot Applications (TePRA).
[14] F. Bullo,et al. Attack Detection and Identification in Cyber-Physical Systems , 2013, IEEE Transactions on Automatic Control.
[15] David Mascareñas,et al. A preliminary cyber-physical security assessment of the Robot Operating System (ROS) , 2013, Defense, Security, and Sensing.
[16] Adriano Valenzano,et al. Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.
[17] Dale C. Rowe,et al. A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.
[18] Sasu Tarkoma,et al. Publish / Subscribe Systems: Design and Principles , 2012 .
[19] Stamatis Karnouskos,et al. Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[20] Jugal K. Kalita,et al. Surveying Port Scans and Their Detection Methodologies , 2011, Comput. J..
[21] Taekyoung Kwon,et al. An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.
[22] Wael Adi,et al. Mechatronic Security and Robot Authentication , 2009, 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security.
[23] Thomas P. von Hoff,et al. Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.
[24] Alexander L. Wolf,et al. Security issues and requirements for Internet-scale publish-subscribe systems , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[25] Joe Weiss,et al. Industrial Control System (ICS) Cyber Security for Water and Wastewater Systems , 2014 .
[26] Eric Rescorla,et al. Datagram Transport Layer Security Version 1.2 , 2012, RFC.
[27] Sasu Tarkoma,et al. Security Design for an Inter-Domain Publish/Subscribe Architecture , 2011, Future Internet Assembly.
[28] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[29] Gary McGraw,et al. Software Penetration Testing , 2005, IEEE Secur. Priv..
[30] E. Byres,et al. The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .