共 38 条
[1]
Adepu S., 2016, WATER DEFENSE A METH, P6
[3]
Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant
[J].
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:449-460
[5]
Using Process Invariants to Detect Cyber Attacks on a Water Treatment System
[J].
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016,
2016, 471
:91-104
[6]
Generalized attacker and attack models for Cyber Physical Systems
[J].
PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1,
2016,
:283-292
[7]
An Investigation into the Response of a Water Treatment System to Cyber Attacks
[J].
2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE),
2016,
:141-148
[8]
Model-based Attack Detection Scheme for Smart Water Distribution Networks
[J].
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17),
2017,
:101-113
[9]
Allen-Bradley, 2012, LOGIX5000 CONTROLLER, V1756
[10]
[Anonymous], 2016, CYBER PHYS SYST SECU