共 10 条
[1]
[Anonymous], 2016, CCS, DOI [DOI 10.1145/2976749, DOI 10.1145/2976749.2978388]
[2]
[Anonymous], PROC ACM CONF SIGCOM
[3]
Antonioli D., 2015, P 1 ACM WORKSH CYB P, P91
[4]
Aydeger A, 2015, 2015 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORK (NFV-SDN), P31, DOI 10.1109/NFV-SDN.2015.7387401
[5]
Dong X, 2015, PROC 1 ACM WORKSHOP, P61
[6]
Lantz B., 2010, P 9 ACM SIGCOMM WORK, P1, DOI [10.1145/1868447.1868466, DOI 10.1145/1868447.1868466]
[7]
Lee R. M., 2016, Analysis of the cyber attack on the Ukrainian power grid: Defense use case
[8]
Mathur AP, 2016, 2016 INTERNATIONAL WORKSHOP ON CYBER-PHYSICAL SYSTEMS FOR SMART WATER NETWORKS (CYSWATER), P31, DOI 10.1109/CySWater.2016.7469060
[9]
Riley M., 2017, Russians are suspects in nuclear site hackings, sources say