Author:
Garitano Iñaki,Iturbe Mikel,Ezpeleta Enaitz,Zurutuza Urko
Publisher
Springer International Publishing
Reference34 articles.
1. Falliere N, Murchu LO, Chien E (2011) W32.Stuxnet dossier. White paper, Symantec Corporation, Security Response
2. Homan J, McBride S, Caldwell R (2016) Irongate ICS Malware: nothing to see here… masking malicious activity on SCADA systems [Online]. Available:
https://www.fireeye.com/blog/threat-research/2016/06/irongate_ics_malware.html
(Retrieved: 2018-07-13)
3. Cheminod M, Durante L, Valenzano A (2013) Review of security issues in industrial networks. IEEE Trans Ind Inf 9(1):277–293
4. Ding D, Han QL, Xiang Y, Ge X, Zhang XM (2018) A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275:1674–1683
5. Urbina DI, Giraldo J, Cardenas AA, Valente J, Faisal M, Tippenhauer NO, Ruths J, Candell R, Sandberg H (2016) Survey and new directions for physics-based attack detection in control systems. NIST GCR 16–010. Technical report, National Institute of Standards and Technology