共 62 条
[1]
Scanning the Cycle: Timing-based Authentication on PLCs
[J].
ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2021,
:886-900
[2]
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS
[J].
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018),
2018,
:566-581
[3]
[Anonymous], 2017, Attackers Deploy New ICS Attack Framework "TRITON"and Cause Operational Disruption to Critical Infrastructure
[4]
[Anonymous], 2018, Miracl cryptographic library
[5]
[Anonymous], 2018, Trisis has the security world spooked, stumped and searching for answers
[6]
[Anonymous], 2007, Man pleads guilty in caliso computer attack
[7]
[Anonymous], 2004, IACR Cryptol. ePrint Arch.
[8]
Barker E. B., 2007, Tech. Rep. 800 90A Rev 1
[9]
Bellare M, 2006, LECT NOTES COMPUT SC, V4004, P409