Security Challenges in Cyber-Physical Production Systems
暂无分享,去创建一个
[1] U. Lindemann. Methodische Entwicklung technischer Produkte , 2009 .
[2] Christian Kreiner,et al. Integrated design for tackling safety and security challenges of smart products and digital manufacturing , 2017 .
[3] Johannes Diemer. Sichere Industrie-4.0-Plattformen auf Basis von Community-Clouds , 2017, Handbuch Industrie 4.0.
[4] J. Gausemeier,et al. Die neue Richtlinie VDI 2206: Entwicklungsmethodik für mechatronische Systeme , 2003 .
[5] Steve Lipner,et al. Security development lifecycle , 2010, Datenschutz und Datensicherheit - DuD.
[6] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[7] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..
[8] Zhao Yang Dong,et al. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.
[9] С. В. Иванов,et al. Анализ результатов лечения больных хроническим панкреатитом , 2016 .
[10] Arndt Lüder,et al. Development of a method for the implementation of interoperable tool chains applying mechatronical thinking — Use case engineering of logic control , 2012, Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012).
[11] A. N. Zincir-Heywood,et al. Intrusion Detection Systems , 2008 .
[12] Eric Byres. The air gap: SCADA's enduring security myth , 2013, CACM.
[13] Peter Kieseberg,et al. Humans forget, machines remember: Artificial intelligence and the Right to Be Forgotten , 2017, Comput. Law Secur. Rev..
[14] Kristofer Hell,et al. Wiederverwendung im Engineering , 2016 .
[15] Stefan Katzenbeisser,et al. Protecting Software through Obfuscation , 2016, ACM Comput. Surv..
[16] Christian S. Collberg,et al. Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection , 2009, Addison-Wesley Software Security Series.
[17] Gary Mcgraw. Software security , 2004, IEEE Security & Privacy Magazine.
[18] Mayuree K.Rathva,et al. Watermarking Relational Databases , 2013 .
[19] Edgar R. Weippl,et al. An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata , 2014, Electron. Mark..
[20] Rakesh Agrawal,et al. Watermarking Relational Databases , 2002, Very Large Data Bases Conference.
[21] Sergey Bratus,et al. Katana: A Hot Patching Framework for ELF Executables , 2010, 2010 International Conference on Availability, Reliability and Security.