共 17 条
[12]
Naedele M, 2007, PROC 40 ANN HAWAII I, P115
[13]
Nicholson A, 2012, PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, P188
[14]
Security and Privacy Challenges in Industrial Internet of Things
[J].
2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC),
2015,
[15]
Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
[J].
2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID),
2016,
:30-31
[16]
Sinha P., 2010, RISKS SECURITY INTER, P1, DOI DOI 10.1109/CRISIS.2010.5764915
[17]
Zhu Bonnie, 2011, Proceedings of the 2011 IEEE International Conference on Internet of Things and 4th IEEE International Conference on Cyber, Physical and Social Computing (iThings/CPSCom 2011), P380, DOI 10.1109/iThings/CPSCom.2011.34