共 55 条
[2]
Generalized attacker and attack models for Cyber Physical Systems
[J].
PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1,
2016,
:283-292
[3]
Ahmed Chuadhry Mujeeb, 2020, WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, P219, DOI 10.1145/3395351.3399364
[4]
Scanning the Cycle: Timing-based Authentication on PLCs
[J].
ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2021,
:886-900
[6]
Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems
[J].
PROCEEDINGS OF THE 6TH ACM CYBER-PHYSICAL SYSTEM SECURITY WORKSHOP, CPSS 2020,
2020,
:23-29
[7]
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS
[J].
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018),
2018,
:566-581
[8]
Model-based Attack Detection Scheme for Smart Water Distribution Networks
[J].
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17),
2017,
:101-113
[9]
Ahmed CM, 2020, ARXIV PREPRINT ARXIV
[10]
A Tale of Two Testbeds: A Comparative Study of Attack Detection Techniques in CPS
[J].
CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2020,
2020, 12332
:17-30