共 32 条
[1]
Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant
[J].
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:449-460
[2]
Alcaraz Cristina, 2015, Risks and Security of Internet and Systems. 9th International Conference, CRiSIS 2014. Revised Selected Papers: LNCS 8924, P17, DOI 10.1007/978-3-319-17127-2
[3]
[Anonymous], 2011, CISC VIS NETW IND GL
[4]
[Anonymous], TECHNICAL REPORT
[5]
Atassi A., 2014, STATE ART INTRUSION, P211
[6]
Briesemeister L., 2010, P 8 INT C PRIV SEC T, P17
[7]
Byres E. J., 2004, P INT INFR SURV WORK, P1
[8]
Caselli Marco, 2015, P 1 ACM WORKSH CYB P, P13, DOI [10.1145/2732198.2732200, DOI 10.1145/2732198.2732200]
[9]
Chen CM, 2013, 2013 IEEE 1ST INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, NETWORKS, AND APPLICATIONS (CPSNA), P13, DOI 10.1109/CPSNA.2013.6614240
[10]
Cheung S., 2007, Proceedings of the SCADA Security Scientific Symposium, P127