Author:
Chan Raymond,Chow Kam-Pui
Publisher
Springer International Publishing
Reference17 articles.
1. S. Abe, M. Fujimoto, S. Horata, Y. Uchida and T. Mitsunaga, Security threats of Internet-reachable ICSs, Proceedings of the Fifty-Fifth Annual Conference of the Society of Instrument and Control Engineers of Japan, pp. 750–755, 2016.
2. D. Beresford, Exploiting Siemens Simatic S7 PLCs, presented at Black Hat USA, 2011.
3. A. Cardenas, T. Roosta and S. Sastry, Rethinking security properties, threat models and the design space in sensor networks: A case study in SCADA systems, Ad Hoc Networks, vol. 7(8), pp. 1434–1447, 2009.
4. F. Cohen, A reference architecture approach to ICS security, Proceedings of the Fourth International Symposium on Resilient Control Systems, pp. 21–25, 2011.
5. B. Ghena, W. Beyer, A. Hillaker, J. Pevarnek and J. Haldeman, Green lights forever: Analyzing the security of traffic infrastructure, Proceedings of the Eighth USENIX Workshop on Offensive Technologies, 2014.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Security Framework for Railway System Deployments;Critical Infrastructure Protection XV;2022
2. Vulnerability Assessments of Building Management Systems;IFIP Advances in Information and Communication Technology;2020