共 50 条
- [21] Detecting the Network Attack Vectors on SCADA Systems 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 707 - 712
- [22] Cyber Threats and Defence Approaches in SCADA systems 2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 324 - 327
- [23] Security Fusion Implementation and Optimization in SCADA Systems 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 620 - 625
- [24] An Approach to Detect Malicious Activities in SCADA Systems 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
- [26] SCADA Systems Management based on WEB Services EMERGING MARKETS QUERIES IN FINANCE AND BUSINESS 2014, EMQFB 2014, 2015, 32 : 464 - 470
- [27] A Plausible Solution to SCADA Security: Honeypot Systems 2013 EIGHTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2013), 2013, : 443 - 448
- [28] A Survey of SCADA-Specific Intrusion Detection Systems INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND AUTOMATION (ICCEA 2014), 2014, : 66 - 72
- [29] Long Term Key Management Architecture for SCADA Systems 2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 314 - 319
- [30] Implementation of Substation SCADA and Automation Systems in the Port of Durban 2018 IEEE PES/IAS POWERAFRICA CONFERENCE, 2018, : 214 - 219