Performance Analysis of a Secured BACnet/IP Network
暂无分享,去创建一个
Dirk Timmermann | Björn Butzin | Frank Golatowski | Michael Nast | F. Golatowski | M. Nast | D. Timmermann | Björn Butzin
[1] Tae-Jin Park,et al. Performance evaluation of BACnet MS/TP protocol using experimental model , 2005, 2005 IEEE International Conference on Industrial Technology.
[2] Seung Ho Hong,et al. A Performance Analysis of BACnet® Local Area Networks , 2008 .
[3] Michael A. Galler,et al. Using the BACnet (R) firewall router | NIST , 2006 .
[4] Piyush Gupta,et al. A Comparative Analysis of SHA and MD 5 Algorithm , 2014 .
[5] Bart Preneel,et al. Power-analysis attack on an ASIC AES implementation , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[6] Hans Dobbertin. Cryptanalysis of MD5 Compress , 1996 .
[7] Falko Dressler,et al. Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor Networks , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[8] Thomas Rist,et al. Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[9] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[10] Jaspreet Kaur,et al. Securing BACnet's Pitfalls , 2015, SEC.
[11] David G. Holmberg,et al. BACnet wide area network security threat assessment , 2011 .