共 14 条
[1]
[Anonymous], 2009, WORKSH FUT DIR CYB P
[2]
[Anonymous], 2016, CCS, DOI [DOI 10.1145/2976749, DOI 10.1145/2976749.2978388]
[3]
[Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
[4]
Ardenas A., 2008, Proceedings of the 3rd conference on Hot topics in security, San Jose, CA, P1
[5]
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
[6]
Falliere N., 2011, W32 STUXNET DOSSIER, V5, P29
[7]
Formby David., 2016, Who's in control of your control system? device fingerprinting for cyber-physical systems
[8]
Greenberg A., 2017, Wired
[9]
Holleczek T, 2009, IEEE ICC, P1185