Publisher
Springer International Publishing
Reference28 articles.
1. Falliere, N., Murchu, L. O., & Chien, E. (2011). W32. Stuxnet dossier. White paper, Symantec Corporate, Security Response, 5(6), 29.
2. Shin, S., & Gu, G. (2010). Conficker and beyond: A large-scale empirical study. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), Austin, 2010 (pp. 151–160).
3. Gorman, S., Dreazen, Y. J., & Cole, A. (2009). Insurgents hack US drones. Wall Street Journal, 17.
4. Li, B., Lu, R., Wang, W., & Choo, K.-K. R. (2016). DDOA: A Dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system. IEEE Transactions on Information Forensics and Security, 11(11), 2415–2425.
5. Bao, H., Lu, R., Li, B., & Deng, R. (2016). BLITHE: Behavior rule based insider threat detection for smart grid. EEE Internet of Things Journal, 3(2), 190–205.