|
J. Huang, D. Nicol, and R. Bobba,“A framework integrating attribute-based policies into role-based access control,” the 17th ACM symposium on Access Control Models and Technologies, pp. 187-196, 2012
|
|
B. Genge, D. Rusu, and P. Haller, “A connection pattern-based approach to detect network traffic anomalies in critical infrastructures,” European Workshop on System Security, pp. 1-6, 2014
|
|
M. Keinert, A. Lechler, and A. Verl, “Concept of a computerized numerical control kernel for execution on multi-core processors,” 2016 IEEE 14th International Workshop on Advanced Motion Control (AMC), pp. 581-586, 2016
|
|
S. Karnouskos, “Stuxnet worm impact on industrial cyber-physical system security,” IEEE Industrial Electronics Society, pp.4490-4494, 2011
|
|
N. Paxton, D. Jang, and S. Russell, “Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis,” 2015 48th Hawaii International Conference on System Sciences, pp. 5244-5252, 2015
|
|
Y. Peng, C. Jiang, and F. Xie, “Industrial control system cybersecurity research,” J Tsinghua Univ (Sci & Technol), no. 10, pp.1396-1408, 2012
|
|
C. Shen, D. Zhang, and J. Liu, “The Strategy of TC 3.0: A Revolutionary Evolution in Trusted Computing,” Engineering Sciences, vol. 18, no. 6,pp. 53-57, 2016
|
|
C. Shen, and X. Chen, “Construction of the Information Security Infrastructure Based on Trusted Computing,” Journal of Sichuan University (Engineering Science Edition), vol. 46, no. 1, pp .1-7, 2014
|
|
Y. Sun, and Y. Wang, Y. Hong, “Research and application of trusted software base,” Journal of Information Security Research, vol. 3,no. 4,pp. 316-322, 2017
|
|
M. Wollschlaeger, T. Sauter, and J. Jasperneite, “The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0,” IEEE Industrial Electronics Magazine, vol. 11, no. 1, pp. 17-27, 2017
|
|
N. Wallace, and T. Atkison, “Observing industrial control system attacks launched via metasploit framework,” ACM Southeast Conference, no. 22, 2013
|
|
?. Yüksel, J. Hartog, and S. Etalle, “Reading between the fields: practical, effective intrusion detection for industrial control systems,” ACM Symposium on Applied Computing, pp. 2063-207, 2016
|
|
A. Yang, L. Sun,and X. Wang, “Intrusion detection technique for industrial control systems,” Journal of Computer Research and Development, vol. 53,no. 9,pp. 2039-2054, 2016
|
|
S. Yi, C. Zhang, and F. Xie, “Security analysis of industrial control network protocols based on Peach,” J Tsinghua Univ (Sci & Technol),no. 1,pp. 50-54, 2017
|
|
Y. Zhang, H. Zhao, and L. Wang, “A non-parametric CUSUM intrusion detection method based on industrial control model,” Journal of Southeast University (Natural Science Edition), vol. 42, no. s1, pp. 55-59, 2012
|
|
X. Zhang, and C. Shen, “A novel design of trusted platform control module,” Geomatics and Information Science of Wuhan University, vol. 33, no. 10, pp. 1011-1014, 2008
|