共 31 条
[3]
Cheung S., 2007, P SCADA SEC SCI S MI, P1
[4]
Coffey K., 2018, Guide to Vulnerability Analysis for Computer Networks and Systems, P59, DOI [DOI 10.1007/978-3-319-92624-7_3, 10.1007/978-3-319-92624-7_3, DOI 10.1007/978-3-319]
[6]
Davis KR, 2012, INT CONF SMART GRID, P342, DOI 10.1109/SmartGridComm.2012.6486007
[7]
Security for industrial communications systems
[J].
PROCEEDINGS OF THE IEEE,
2005, 93 (06)
:1152-1177
[9]
HADIOSMANOVIC D., 2014, Proceedings of the 30th Annual Computer Security Applications Conference, P126
[10]
Hadziosmanovic Dina, 2012, Research in Attacks, Intrusions, and Defenses. Proceedings of the 15th International Symposium, RAID 2012, P354, DOI 10.1007/978-3-642-33338-5_18