共 55 条
- [1] Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS [J]. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 566 - 581
- [2] Alpaño PVS, 2017, TENCON IEEE REGION, P2825, DOI 10.1109/TENCON.2017.8228342
- [3] Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices [J]. IEEE ACCESS, 2016, 4 : 959 - 979
- [4] Andress J, 2014, The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
- [5] Ankarali Z. E., 2016, P 4 INT C WIR MOB CO, P246
- [6] Ankarali ZE, 2014, 2014 EAI 4TH INTERNATIONAL CONFERENCE ON WIRELESS MOBILE COMMUNICATION AND HEALTHCARE (MOBIHEALTH), P246, DOI 10.1109/MOBIHEALTH.2014.7015957
- [7] [Anonymous], 2013, Wireless Mobile Communication and Healthcare, DOI DOI 10.1007/978-3-642-37893-5_19
- [8] [Anonymous], 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, DOI DOI 10.1109/HEALTH.2011.6026732
- [9] [Anonymous], 2015, COMPUTERWORLD
- [10] Arksey H., 2005, Int J Soc Res Methodol, V8, P19, DOI DOI 10.1080/1364557032000119616