共 204 条
[2]
WaterJam: An Experimental case study of Jamming Attacks on a Water Treatment System
[J].
2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C),
2017,
:341-347
[3]
Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant
[J].
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:449-460
[5]
Agarwal S., 2022, P 15 WORKSHOP CYBER, P1
[6]
Agrawal N., 2022, Security perspective analysis of industrial cyber physical systems (i-cps): A decade -wide survey
[7]
Ahmadi A, 2018, I C SOFTWARE KNOWL I, P9
[8]
Aircrack-ng, ABOUT US
[9]
SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2019, 93
:860-876
[10]
Al Nafea Roaa, 2021, 2021 International Conference on Information Technology (ICIT), P779, DOI 10.1109/ICIT52682.2021.9491638