共 50 条
- [1] Cyber-Attack for BGP Systems Using CoPNet Model [J]. 2012 SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2012, : 10 - 15
- [2] An Overview of Cyber-Attack Vectors on SCADA Systems [J]. 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354
- [3] How to protect SCADA systems from cyber-attack [J]. Gas Utility Manager, 2003, 47 (09): : 12 - 18
- [5] Protocols, Solutions, and Testbeds for Cyber-Attack Prevention in Industrial SCADA Systems [J]. Studies in Big Data, 2021, 99 : 355 - 380
- [6] Adaptive cyber-attack modeling system [J]. SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201
- [7] Using Spy Node to Identify Cyber-Attack in Power Systems as a Novel Approach [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2015, : 581 - 586
- [8] Analysis of Cyber-Attack in Big Data IoT and Cyber-Physical Systems - A Technical Approach to Cybersecurity Modeling [J]. 2019 IEEE 5TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2019,
- [9] Here's what you need to know to protect SCADA systems from cyber-attack [J]. Rush, W.F., 1600, Oildom Publishing Co. of Texas Inc. (230):