PLC security and critical infrastructure protection
暂无分享,去创建一个
[1] Sandip C. Patel,et al. Security enhancement for SCADA communication protocols using augmented vulnerability trees , 2006, CAINE.
[2] Daniel P. W. Ellis,et al. Worm anatomy and model , 2003, WORM '03.
[3] Rahat Masood,et al. SWAM: Stuxnet Worm Analysis in Metasploit , 2011, 2011 Frontiers of Information Technology.
[4] E. J. Byres,et al. On shaky ground - A study of security vulnerabilities in control protocols , 2006 .
[5] Stephen E. McLaughlin. On Dynamic Malware Payloads Aimed at Programmable Logic Controllers , 2011, HotSec.
[6] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[7] Igor Nai Fovino,et al. An experimental investigation of malware attacks on SCADA systems , 2009, Int. J. Crit. Infrastructure Prot..
[8] David M. Nicol,et al. Simulating realistic network worm traffic for worm warning system design and testing , 2003, WORM '03.
[9] Robert E. Johnson,et al. Survey of SCADA security challenges and potential attack vectors , 2010, 2010 International Conference for Internet Technology and Secured Transactions.
[10] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[11] A.A. Creery,et al. Industrial cybersecurity for a power system and SCADA networks - Be secure , 2007, IEEE Industry Applications Magazine.