Author:
Kim Byoungkoo,Kang Dong-Ho,Na Jung-Chan,Chang Beom-Hwan,Chung Tai-Myoung
Reference13 articles.
1. Yoon J, Kim W, Seo J (2012) Control system network security technology trend. 22(5):22–27
2. Yoo H, Yoon J, Sohn T (2013) Whitelist-based technique to detect abnormal situation for control system security. J Korea Inf Commun Soc 38B(08):641–653
3. Yoon J, Kim W, Seo J (2012) Study on technology requirement using the technological trend of security products concerning the industrial control system. J Korea Inst Inform Secur Crytology 22(5):22–26
4. Zhu B, Joseph A, Sastry S (2011) A taxonomy of cyber attacks on SCADA systems. In: Proceedings of IEEE international conference on internet things (iThings/CPSCom), pp 308–388. Dalian, China, Oct 2011
5. Guide to Industrial Control Systems (ICS) Security. NIST Special Publication 800(82), Jun 2011
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Intrusion Detection System for Industrial Network;Lecture Notes in Networks and Systems;2022-09-01