Author:
Stellios Ioannis,Kotzanikolaou Panayiotis,Psarakis Mihalis
Publisher
Springer International Publishing
Reference47 articles.
1. Alves T, Das R, Morris T (2018) Embedding encryption and machine learning intrusion prevention systems on programmable logic controllers. IEEE Embed Syst Lett 10:99–102
2. Andrea M (2015) GE MDS PulseNET hidden support account remote code execution vulnerability.
https://www.zerodayinitiative.com/advisories/ZDI-15-440/
3. Antón SD, Fraunholz D, Lipps C, Pohl F, Zimmermann M, Schotten HD (2017) Two decades of scada exploitation: a brief history. In: 2017 IEEE Conference on Application, Information and Network Security (AINS). IEEE, pp 98–104
4. Berger H (2014) Automating with SIMATIC S7-400 inside TIA portal: configuring, programming and testing with STEP 7 Professional. Wiley
5. Brian G, Fritz Sands TTMZDI Hacker machine interface: the state of scada HMI vulnerabilities. White paper, Trend Micro
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献