Creating Convincing Industrial-Control-System Honeypots
暂无分享,去创建一个
[1] Sebastian Obermeier,et al. A flexible architecture for Industrial Control System honeypots , 2015, 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE).
[2] Neil Rowe,et al. Web Honeypots for Spies , 2018, 2018 International Conference on Computational Science and Computational Intelligence (CSCI).
[3] Barry E. Mullins,et al. Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices , 2014, Int. J. Crit. Infrastructure Prot..
[4] Neil C. Rowe,et al. Introduction to Cyberdeception , 2016, Springer International Publishing.
[5] Catherine A. Theohary,et al. Cyber Operations in DOD Policy and Plans: Issues for Congress , 2014 .
[6] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[7] Márk Félegyházi,et al. CryPLH: Protecting Smart Energy Systems from Targeted Attacks with a PLC Honeypot , 2014, SmartGridSec.
[8] William Owen Redwood. Cyber Physical System Vulnerability Research , 2016 .
[9] Hsinchun Chen,et al. SCADA honeypots: An in-depth analysis of Conpot , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[10] Omar Salim Kidege,et al. Industrial Network Security – A Critical Review , 2017 .
[11] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[12] Ryan Cunningham,et al. Honeypot-Aware Advanced Botnet Construction and Maintenance , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[13] Samuel Lewis Litchfield. HoneyPhy: A physics-aware CPS honeypot framework , 2017 .
[14] Ehab Al-Shaer,et al. Honeypot Deception Tactics , 2019, Autonomous Cyber Deception.
[15] Anjali Sardana,et al. Honeypots: A New Paradigm to Information Security , 2011 .