共 50 条
- [21] Security Games for Cyber-Physical Systems [J]. SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 17 - 32
- [23] Security Synthesis for Cyber-Physical Systems [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (02): : 1027 - 1037
- [25] Analysis of security in cyber-physical systems [J]. Science China Technological Sciences, 2017, 60 : 1975 - 1977
- [26] Security in the Era of Cyber-Physical Systems of Systems [J]. ERCIM NEWS, 2014, (97): : 44 - 45
- [27] Understanding the impact of cyber-physical correlation on security analysis of Cyber-Physical Systems [J]. 2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 529 - 534
- [28] Pattern-Based Modeling of Cyber-Physical Systems For Analyzing Security [J]. PROCEEDINGS OF THE 24TH EUROPEAN CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS (EUROPLOP 2019), 2019,
- [29] On the Security of Cyber-Physical Robotic Systems Using Dynamic Modeling and Simulation [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
- [30] Threat modeling in cyber-physical systems [J]. 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 448 - 453