共 44 条
[1]
Ado K., SHA-1 Has Been Compromised In Practice
[2]
[Anonymous], 2018, Advisory (ICSA-13-291-01B). DNP3 Implementation Vulnerability (Update B) | ICS-CERT. Advisory Database
[4]
Boyd Colin., 2006, Proceedings of the 2006 Australasian workshops on Grid computing and e-research, Darlinghurst, Australia, P183
[5]
Byres E, 2013, DNP3 Vulnerabilities Part 1 of 2 - NERC's Electronic Security Perimeter is Swiss Cheese | Tofino Industrial Security Solution
[6]
Cagalaban G., 2016, Improving SCADA Control Systems Security with Software Vulnerability, DOI [10.1007/978-3-642-22706-6, DOI 10.1007/978-3-642-22706-6]
[7]
Choi D, 2013, J INF SCI ENG, V29, P281
[9]
Down the Rabbit Hole: Fostering Active Learning through Guided Exploration of a SCADA Cyber Range
[J].
APPLIED SCIENCES-BASEL,
2021, 11 (20)
[10]
Delfs H., 2015, Introduction to Cryptography: Principles and Applications, P11