Author:
Xian Guo ,Xue Ying,Feng Tao,Jiang Yongbo,Yan Yan
Subject
Signal Processing,Control and Systems Engineering,Software
Reference17 articles.
1. Masset, B. and Taburiaux, O., Simulating Industrial Control Systems Using Mininet, Ecole Polytechnique de Louvain, 2018. http://hdl.handle.net/2078.1/thesis:14706.
2. Stevens, C., Assembling cybersecurity: The politics and materiality of technical malware reports and the case of Stuxnet, Contemp. Secur. Policy, 2020, vol. 41, no. 1, pp. 129–152. https://doi.org/10.1080/13523260.2019.1675258
3. Kang, Ch., He, L., Han, Z., and Xia, Ye, Cyber Security Risk Analysis and Protection Structure Design for Power Distribution IoT, 2nd Int. Conf. on Smart Power & Internet Energy Systems (SPIES), Bangkok, 2020, IEEE, 2020, pp. 339–344. https://doi.org/10.1109/SPIES48661.2020.9242961
4. Geiger, M., Bauer, J., Masuch, M., and Franke, J., An analysis of Black Energy 3, Crashoverride, and Trisis, three malware approaches targeting operation technology systems, 25th IEEE Int. Conf. on Emerging Technologies and Factory Automation (ETFA), Vienna, 2020, IEEE, 2020, pp. 1537–1543. https://doi.org/10.1109/ETFA46521.2020.9212128
5. Rose, S., Borchert, O., Mitchell, S., and Connelly, S., Zero trust architecture, National Institute of Standards and Technology, 2019. https://doi.org/10.6028/NIST.SP.800-207
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献