Author:
Acarali Dilara,Rajarajan Muttukrishnan,Chema Doron,Ginzburg Mark
Publisher
Springer International Publishing
Reference28 articles.
1. Energy Shield (2019). https://energy-shield.eu/. Accessed 18 Dec 2019
2. Antonakakis, M., et al.: Understanding the Mirai Botnet. In: 26th USENIX Security Symposium (USENIX Security 2017), pp. 1093–1110 (2017)
3. Asri, S., Pranggono, B.: Impact of distributed denial-of-service attack on advanced metering infrastructure. Wireless Pers. Commun. 83(3), 2211–2223 (2015). https://doi.org/10.1007/s11277-015-2510-3
4. Brereton, P., Kitchenham, B.A., Budgen, D., Turner, M., Khalil, M.: Lessons from applying the systematic literature review process within the software engineering domain. J. Syst. Softw. 80(4), 571–583 (2007)
5. Chatfield, B., Haddad, R.J., Chen, L.: Low-computational complexity intrusion detection system for jamming attacks in smart grids. In: 2018 International Conference on Computing, Networking and Communications (ICNC), pp. 367–371. IEEE (2018)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献