Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System
暂无分享,去创建一个
[1] Khaled Elleithy,et al. Advances in Computer, Information, and Systems Sciences, and Engineering: Proceedings of IETA 2005, TeNe 2005 and EIAE 2005 , 2006 .
[2] Ragnar Schierholz,et al. Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration , 2009, 2009 IEEE Conference on Emerging Technologies & Factory Automation.
[3] Ulf Lindqvist,et al. Using Model-based Intrusion Detection for SCADA Networks , 2006 .
[4] Hyukmin Kwon,et al. Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property , 2012 .
[5] Francesco Parisi-Presicce,et al. DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework , 2007 .
[6] Huy-Kang Kim,et al. Risk Analysis and Monitoring Model of Urban SCADA Network Infrastructure , 2011 .