共 50 条
- [1] Adepu S, 2016, 2016 IEEE 40 ANN COM, DOI DOI 10.1109/COMPSAC.2016
- [2] Investigation of Cyber Attacks on a Water Distribution System [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 274 - 291
- [3] Access Control in Water Distribution Networks: A Case Study [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS), 2017, : 184 - 191
- [4] WaterJam: An Experimental case study of Jamming Attacks on a Water Treatment System [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 341 - 347
- [5] Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 449 - 460
- [6] Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS [J]. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 566 - 581
- [7] Model-based Attack Detection Scheme for Smart Water Distribution Networks [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 101 - 113
- [8] Ahmed Chuadhry Mujeeb, 2017, P 3 INT WORKSH CYB P, P25, DOI DOI 10.1145/3055366.3055375
- [9] Security of interdependent and identical networked control systems [J]. AUTOMATICA, 2013, 49 (01) : 186 - 192
- [10] Amin S, 2009, LECT NOTES COMPUT SC, V5469, P31, DOI 10.1007/978-3-642-00602-9_3