Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference50 articles.
1. The use of attack trees in assessing vulnerabilities in SCADA systems;Byres,2004
2. Event and Intrusion Detection Systems for Cyber-Physical Power Systems;Adhikari,2015
3. Cascade-based attack vulnerability on the US power grid;J.;Saf. Sci.,2009
4. M.E. Locasto, K. Wang, A.D. Keromytis, S.J. Stolfo, FLIPS: Hybrid adaptive intrusion prevention, in: Paper presented at the International Symposium on Recent Advances in Intrusion Detection (RAID ’05). In Proceedings, 2005.
5. A risk mitigation approach for autonomous cloud intrusion response system;Kholidy;J. Comput.,2016
Cited by
58 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献