共 50 条
- [1] Passive Inference of Attacks on SCADA Communication Protocols [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, : 62 - 67
- [2] Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations [J]. IEEE NETWORK, 2023, 37 (01): : 111 - 117
- [3] Analysis of SCADA System Vulnerabilities to DDoS Attacks [J]. 2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 591 - 594
- [4] Uncovering Industrial Control Systems Vulnerabilities by Examining SCADA Virtual Packages and Their Communication Protocols [J]. 21ST INTERNATIONAL CONGRESS ON MODELLING AND SIMULATION (MODSIM2015), 2015, : 725 - 731
- [5] Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 6695 - 6709
- [6] Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations [J]. TRUSTED'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON TRUSTWORTHY EMBEDDED DEVICES, 2016, : 45 - 54
- [7] Correctness proofs for SCADA communication protocols [J]. WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 2, 2005, : 392 - 397
- [8] Hardware Speculation Vulnerabilities and Mitigations [J]. 2021 IEEE 18TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2021), 2021, : 609 - 614
- [10] Secure Communication Protocols for SCADA Systems: Analysis and Comparisons of Different Secure Communication Protocols [J]. PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 209 - 214