暂无分享,去创建一个
[1] Agostino Cortesi,et al. Penetration Testing ROS , 2019, Studies in Computational Intelligence.
[2] Miklós Kozlovszky,et al. Increasing ROS 1.x communication security for medical surgery robot , 2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[3] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[4] Peter Schartner,et al. Application-level security for ROS-based applications , 2016, 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[5] Lander Usategui San Juan,et al. Industrial robot ransomware: Akerbeltz , 2019, 2020 Fourth IEEE International Conference on Robotic Computing (IRC).
[6] Irati Zamalloa Ugarte,et al. Robot hazards: from safety to security , 2018, ArXiv.
[7] Lander Usategui San Juan,et al. The shift in the robotics paradigm — The Hardware Robot Operating System (H-ROS); an infrastructure to create interoperable robot components , 2017, 2017 NASA/ESA Conference on Adaptive Hardware and Systems (AHS).
[8] Sean Rivera,et al. ROSploit: Cybersecurity Tool for ROS , 2019, 2019 Third IEEE International Conference on Robotic Computing (IRC).
[9] Gorka Olalde Mendia,et al. Robotics CTF (RCTF), a playground for robot hacking , 2018, ArXiv.
[10] Morgan Quigley,et al. ROS: an open-source Robot Operating System , 2009, ICRA 2009.
[11] Todd R. Andel,et al. Cybersecurity issues in robotics , 2017, 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA).
[12] Vicente Matellán Olivera,et al. Cybersecurity in Autonomous Systems: Hardening ROS Using Encrypted Communications and Semantic Rules , 2017, ROBOT.
[13] Vicente Matellán Olivera,et al. Cybersecurity in Autonomous Systems: Evaluating the performance of hardening ROS , 2016 .
[14] David Mascareñas,et al. A preliminary cyber-physical security assessment of the Robot Operating System (ROS) , 2013, Defense, Security, and Sensing.
[15] Bernhard Dieber,et al. Introducing the Robot Vulnerability Database (RVD) , 2019, ArXiv.
[16] Federico Maggi,et al. Rogue Automation: Vulnerable and Malicious Code in Industrial Programming , 2020 .
[17] Henrik I. Christensen,et al. SROS: Securing ROS over the wire, in the graph, and through the kernel , 2016, ArXiv.
[18] Endika Gil-Uriarte,et al. DevSecOps in Robotics , 2020, ArXiv.