Author:
Shahin Mohammad,Maghanaki Mazdak,Hosseinzadeh Ali,Chen F. Frank
Reference325 articles.
1. A. e. (1) Elhabashy, L. j. (2) Wells, J. a. (3) Camelio, Cyber-physical security research efforts in manufacturing - A literature review, in: Procedia Manufacturing, Elsevier B.V., 2019: pp. 921–931. https://doi.org/10.1016/j.promfg.2019.06.115.
2. Sons of Stuxnet - IEEE Spectrum;Cherry,2011
3. US/Israel responsible for major cyber attack: Iran’s nuclear industry damaged by Stuxnet virus;Rai;Peace News for Nonviolent Action,2011
4. Trojan horse, (n.d.). https://us.norton.com/online-threats/glossary/t/trojan-horse.html (accessed October 20, 2019).
5. W. Yu, Y. Yalin, R. Haodan, Research on the Technology of Trojan Horse Detection, 2019 12th International Conference on Intelligent Computation Technology and Automation (ICICTA), Intelligent Computation Technology and Automation (ICICTA), 2019 12th International Conference On (2019) 117–119. https://doi.org/10.1109/ICICTA49267.2019.00032.