共 50 条
- [31] Methodology for Identifying Critical Vulnerabilities in Distributed Systems 2018 INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2018, : 654 - 658
- [33] Uncovering Industrial Control Systems Vulnerabilities by Examining SCADA Virtual Packages and Their Communication Protocols 21ST INTERNATIONAL CONGRESS ON MODELLING AND SIMULATION (MODSIM2015), 2015, : 725 - 731
- [34] The direct dependence of SCADA systems on communications infrastructure and electric power supply 8TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING, INTER-ENG 2014, 2015, 19 : 681 - 688
- [35] Peeking Under the Skirts of a Nation: Finding ICS Vulnerabilities in the Critical Digital Infrastructure PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 137 - 144
- [36] Analysis of SCADA System Vulnerabilities to DDoS Attacks 2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 591 - 594
- [37] An Approach to Identification of Critical Infrastructure Systems PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2015 (ICNAAM-2015), 2016, 1738
- [38] A secure fog-based platform for SCADA-based IoT critical infrastructure SOFTWARE-PRACTICE & EXPERIENCE, 2020, 50 (05): : 503 - 518
- [40] Robust and resilient critical infrastructure systems Proceedings of the 36th Annual Hawaii International Conference on System Sciences, HICSS 2003, 2003,