Author:
Qin Xi,Mai Kelvin,Ortiz Neil,Koneru Keerthi,Cardenas Alvaro A.
Reference40 articles.
1. Clarke G.andReynders D.(2003).Practical Modern SCADA Protocols: DNP3 60870.5 and Related Systems p.548.
2. Burst‐based anomaly detection on the DNP3 protocol;Yun J.‐H.;International Journal of Control and Automation,2013
3. Webstore International Electrotechnical Commission(2006).Telecontrol equipment and systems ‐ Part 5‐104: Transmission protocols ‐ network access for IEC 60870‐5‐101 using standard transport profiles.
4. Analysis of Secure TCP/IP Profile in 61850 Based Substation Automation System for Smart Grids
5. Sørensen J.S.andJaatun M.(2008).An analysis of the manufacturing messaging specification protocol pp.602–615 01 2008.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Methodology to Measure the “Cost” of CPS Attacks: Not all CPS Networks are Created Equal;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08