Author:
Xia Dailing,Sun Yanbin,Guan Quanlong
Reference31 articles.
1. Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. Mag. 9(3), 49–51 (2011)
2. Bai, X.: Discussion on industrial control system security threat and protection application. China information technology (2018)
3. Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.: Toward a comprehensive insight to the eclipse attacks of tor hidden services. IEEE Internet Things J. 6(2), 1584–1593 (2019)
4. Qi, W.: Review on information security of industrial control systems. Commun. Power Technol. 36(05), 225–226 (2019)
5. Tian, Z., Li, M., Qiu, M., Sun, Y., Su, S.: Block-DEF: a secure digital evidence system using blockchain. Inf. Sci. 491, 151–165 (2019).
https://doi.org/10.1016/j.ins.2019.04.011