共 60 条
[21]
Go with the Flow: Toward Workflow-Oriented Security Assessment
[J].
PROCEEDINGS OF THE 2013 NEW SECURITY PARADIGMS WORKSHOP (NSPW'13),
2013,
:65-76
[22]
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2018,
:648-660
[23]
Towards Learning and Verifying Invariants of Cyber-Physical Systems by Code Mutation
[J].
FM 2016: FORMAL METHODS,
2016, 9995
:155-163
[24]
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks
[J].
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017),
2017,
:315-326
[25]
Crama Y., 1988, Annals of Operations Research, V16, P299, DOI 10.1007/BF02283750
[26]
AN INTRUSION-DETECTION MODEL
[J].
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,
1987, 13 (02)
:222-232
[27]
Feng C, 2019, 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), DOI [10.14722/ndss.2019.23265, 10.1109/imbioc.2019.8777851]
[28]
HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems
[J].
CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY,
2016,
:101-109
[29]
A Survey of Security in SCADA Networks: Current Issues and Future Challenges
[J].
IEEE ACCESS,
2019, 7
:135812-135831
[30]
A Dataset to Support Research in the Design of Secure Water Treatment Systems
[J].
CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016),
2018, 10242
:88-99