Availability Models of Industrial Internet of Things Wired System Considering Cyberattacks
暂无分享,去创建一个
[1] Yohei Tanaka,et al. Tracking attack sources based on traceback honeypot for ICS network , 2017, 2017 56th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE).
[2] Liang Cheng,et al. Detecting Payload Attacks on Programmable Logic Controllers (PLCs) , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).
[3] Khaled M. Khan,et al. Cybersecurity for industrial control systems: A survey , 2020, Comput. Secur..
[4] Shingo Abe,et al. Security threats of Internet-reachable ICS , 2016, 2016 55th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE).
[5] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[6] D. A. Dube,et al. Risk management guidelines , 1992 .
[7] Chong Xiang,et al. Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment Environment , 2015, 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP).
[8] Bünyamin Ciylan,et al. Cyber security in industrial control systems: Analysis of DoS attacks against PLCs and the insider effect , 2018, 2018 6th International Istanbul Smart Grids and Cities Congress and Fair (ICSG).
[9] Christian Diedrich,et al. Identifying false data injection attacks in industrial control systems using artificial neural networks , 2017, 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).
[10] Threat landscape for industrial automation systems , 2018 .
[11] Robert E. Johnson,et al. Survey of SCADA security challenges and potential attack vectors , 2010, 2010 International Conference for Internet Technology and Secured Transactions.
[12] Nasser Modiri,et al. Information Security Management , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.
[13] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[14] Vyacheslav S. Kharchenko,et al. IoT Server Availability Considering DDoS-attacks: Analysis of Prevention Methods and Markov Model , 2019, 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT).