共 58 条
[1]
Al Ghazo AT, 2019, 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM)
[2]
Adaptive Encrypted Traffic Fingerprinting With Si-Directional Dependence
[J].
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016),
2016,
:177-188
[3]
TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior
[J].
IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE,
2019,
:379-392
[4]
[Anonymous], IEC Industrial Communication Networks
[5]
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[6]
Automation I, 2018, Market Share Of Different PLCs
[7]
Biham E., 2019, Rogue7: Rogue Engineering-Station attacks on S7 Simatic PLCs
[8]
Biondi Philippe., 2015, Scapy
[10]
Cho KT, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P911