Author:
Kilinc Gorkem,Fovino Igor Nai,Ferigato Carlo,Koltuksuz Ahmet
Reference21 articles.
1. Bacnet (2009). URL http://www.bacnet.org/.
2. Identity-based encryption from the weil pairing;Boneh;SIAM J. Comput.,2003
3. Modeling and analysis of security protocols using role based specifications and petri nets;Bouroulet,2008
4. Carcano, A., Fovino, I.N., Masera, M., and Trombetta, A. (2010). State-based network intrusion detection systems for scada protocols: a proof of concept. In Proceedings of the 4th international conference on Critical information infrastructures security, CRITIS'09.
5. Security strategies for scada networks;Chandia,2007
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献