Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time
暂无分享,去创建一个
[1] Wouter Joosen,et al. A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks , 2009, 2009 First International Conference on Networks & Communications.
[2] Soodabeh Soleymani,et al. A New Distribution Network Reconfiguration Approach using a Tree Model , 2009 .
[3] Dmitry P. Zegzhda,et al. Sustainability of cyber-physical systems in the context of targeted destructive influences , 2018, 2018 IEEE Industrial Cyber-Physical Systems (ICPS).
[4] O. I. Sheluhin,et al. Network Traffic Anomalies Detection Using a Fixing Method of Multifractal Dimension Jumps in a Real-Time Mode , 2018, Automatic Control and Computer Sciences.
[5] Zhang Qi,et al. A Framework of Cyber-Security Protection for Warship Systems , 2015, 2015 Sixth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA).
[6] Biplab Sikdar,et al. Anomaly detection in diurnal CPS monitoring data using a local density approach , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).
[7] Piyush Maheshwari,et al. Security Issues of Cyber Physical System: A Review , 2016 .
[8] Anatoly Shalyto,et al. Combining De Bruijn Graphs, Overlap Graphs and Microassembly for De Novo Genome Assembly , 2013 .
[9] Peter D. Zegzhda,et al. Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks , 2018, Autom. Control. Comput. Sci..
[10] Haifeng HONG,et al. Directed graph-based distribution network reconfiguration for operation mode adjustment and service restoration considering distributed generation , 2017 .
[11] Naixue Xiong,et al. A General Real-Time Control Approach of Intrusion Response for Industrial Automation Systems , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[12] Fengjun Li,et al. Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.