SCADA Security: Concepts and Recommendations
暂无分享,去创建一个
[1] Aunshul Rege‐Patwardhan. Cybercrimes against critical infrastructures: a study of online criminal organization and techniques , 2009 .
[2] Elisa Bertino,et al. Editorial: Security and privacy protection vs sustainable development , 2018, Comput. Secur..
[3] Alfredo De Santis,et al. An intelligent security architecture for distributed firewalling environments , 2013, J. Ambient Intell. Humaniz. Comput..
[4] Sujeet Shenoi,et al. Security Strategies for SCADA Networks , 2007, Critical Infrastructure Protection.
[5] Francesco Palmieri,et al. Adaptive Stealth Energy-Related DoS Attacks against Cloud Data Centers , 2014, 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[6] Ali Dehghantanha,et al. Towards secure model for SCADA systems , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[7] Filippo Attivissimo,et al. SCADA/HMI Systems in Advanced Educational Courses , 2007, IEEE Transactions on Instrumentation and Measurement.
[8] Aniello Castiglione,et al. Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace , 2013, CD-ARES Workshops.
[9] Robert Radvanovsky,et al. Handbook of SCADA/Control Systems Security, Second Edition , 2016 .
[10] Robert Radvanovsky,et al. Handbook of SCADA/control systems security , 2013 .
[11] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[12] Paul K. Kerr,et al. The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability , 2010 .
[13] Ning Lu,et al. Safeguarding SCADA Systems with Anomaly Detection , 2003, MMM-ACNS.
[14] Helge Janicke,et al. SCADA security in the light of Cyber-Warfare , 2012, Comput. Secur..
[15] Adnan Salihbegovic,et al. Web based multilayered distributed SCADA/HMI system in refinery application , 2009, Comput. Stand. Interfaces.
[16] Mohamed Endi,et al. Three-layer PLC/SCADA system Architecture in process automation and data monitoring , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).
[17] J. Pollet. Developing a solid SCADA security strategy , 2002, 2nd ISA/IEEE Sensors for Industry Conference,.