共 46 条
[1]
Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant
[J].
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:449-460
[2]
Using Process Invariants to Detect Cyber Attacks on a Water Treatment System
[J].
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016,
2016, 471
:91-104
[3]
Alves T., ARM WHITE PAPER, V3, P18
[4]
Anati I., 2013, P 2 INT WORKSH HARDW, P1, DOI 10.1.1.405. 8266
[5]
Brandl H., 2010, Proceedings of the Tenth International Conference on Quality Software (QSIC 2010), P3, DOI 10.1109/QSIC.2010.53
[6]
C<prime>ardenas A. A., 2008, P USENIX WORKSH HOT
[7]
Castelluccia C, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P400
[9]
Towards Learning and Verifying Invariants of Cyber-Physical Systems by Code Mutation
[J].
FM 2016: FORMAL METHODS,
2016, 9995
:155-163
[10]
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks
[J].
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017),
2017,
:315-326