Author:
Yuan Yuan,Sun Fuchun,Zhu Quanyan
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Control and Systems Engineering
Reference36 articles.
1. V. M. Igure, S. A. Laughter, and R. D. Williams, “Security issues in SCADA networks,” Computers & Security, vol. 25, no. 7, pp. 498–506, October 2006.
2. S. Amin, G. A. Schwartz, and A. Hussain, “In quest of benchmarking security risks to cyber-physical systems,” IEEE Network Magazine, vol. 27, no. 1, pp. 19–24, February 2013.
3. Q. Zhu, C. Rieger, and T. Basar, “A hierarchical security architecture for cyber-physical systems,” Proc. of the 4th International Symposium on Resilient Control Systems, Boise, ID, USA, pp. 15–20, August 2011.
4. J. Matusitza and E. Mineib, “Cyberterrorism: its effects on health-related infrastructures,” Journal of Digital Forensic Practice, vol. 2, no. 4, pp. 161–171, September 2009.
5. G. Carl, G. Kesidis, R. R. Brooks, and S. Rai, “Denial-of-service attack-detection techniques,” IEEE Internet Computing Magazine, vol. 10, no. 1, pp. 82–89, February 2006.
Cited by
59 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献