Author:
Li Weize,Xie Lun,Deng Zulan,Wang Zhiliang
Funder
National Key Technologies R&D Program of China
National Natural Science Foundation of China
Foundation of Beijing Engineering and Technology Center for Convergence Networks and Ubiquitous Services
Subject
Law,General Computer Science
Reference33 articles.
1. An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems;Almalawi;Comput Secur,2014
2. Cyber security of water SCADA systems – part I: analysis and experimentation of stealthy deception attacks;Amin;IEEE Trans Control Syst Technol,2013
3. Intrusion detection in SCADA networks;Barbosa;Mech Auton Manag Netw Serv,2010
4. Security for process control systems: an overview;Brundle;IEEE Secur Priv,2008
5. Challenges for securing cyber physical systems;Cárdenas,2009
Cited by
52 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献