메뉴 건너뛰기




Volumn 9781461473367, Issue , 2014, Pages 75-83

Cyber-physical systems security

Author keywords

[No Author keywords available]

Indexed keywords

CYBERSECURITY; EMBEDDED SYSTEMS; POPULATION STATISTICS; SENSITIVE DATA;

EID: 84925828049     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4614-7336-7_7     Document Type: Chapter
Times cited : (18)

References (34)
  • 3
    • 84155167232 scopus 로고    scopus 로고
    • Cyber-physical security of a smart grid infrastructure
    • M. Yilin, et al, "Cyber-Physical Security of a Smart Grid Infrastructure," Proceedings of the IEEE, Vol. 100, pp. 195-209, 2012.
    • (2012) Proceedings of the IEEE , vol.100 , pp. 195-209
    • Yilin, M.1
  • 5
    • 33745468784 scopus 로고    scopus 로고
    • Wireless sensor network denial of sleep attack
    • IAW '05. Proceedings from the Sixth Annual IEEE SMC
    • M. Brownfield, et al, "Wireless sensor network denial of sleep attack," in Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC, 2005, pp. 356-364.
    • (2005) Information Assurance Workshop, 2005 , pp. 356-364
    • Brownfield, M.1
  • 7
    • 85156147536 scopus 로고    scopus 로고
    • Impeding malware analysis using conditional code obfuscation
    • M. I. Sharif, et al, "Impeding Malware Analysis Using Conditional Code Obfuscation," in NDSS'08, 2008.
    • (2008) NDSS'08
    • Sharif, M.I.1
  • 8
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using CWSandbox
    • C. Willems, et al, "Toward Automated Dynamic Malware Analysis Using CWSandbox," Security & Privacy, IEEE, Vol. 5, pp. 32-39, 2007.
    • (2007) Security & Privacy, IEEE , vol.5 , pp. 32-39
    • Willems, C.1
  • 9
    • 34548737161 scopus 로고    scopus 로고
    • Exploring multiple execution paths for malware analysis
    • SP'07. IEEE Symposium on
    • A. Moser, et al, "Exploring Multiple Execution Paths for Malware Analysis," in Security and Privacy, 2007. SP'07. IEEE Symposium on, 2007, pp. 231-245.
    • (2007) Security and Privacy, 2007 , pp. 231-245
    • Moser, A.1
  • 12
    • 84866521231 scopus 로고    scopus 로고
    • Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic
    • ISI 2008. IEEE International Conference on
    • B. Thuraisingham, "Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic," in Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on, 2008, pp. xxix-xxx.
    • (2008) Intelligence and Security Informatics, 2008 , pp. xxix-xxx
    • Thuraisingham, B.1
  • 14
    • 84863028103 scopus 로고    scopus 로고
    • Data-provenance verification for secure hosts
    • K. Xu, et al, "Data-Provenance Verification For Secure Hosts," IEEE Trans. Dependable Secur. Comput., Vol. 9, pp. 173-183, 2012.
    • (2012) IEEE Trans. Dependable Secur. Comput. , vol.9 , pp. 173-183
    • Xu, K.1
  • 16
    • 49349096759 scopus 로고    scopus 로고
    • Diverse firewall design
    • IEEE Transactions on
    • A. X. Liu and M. G. Gouda, "Diverse Firewall Design," Parallel and Distributed Systems, IEEE Transactions on, Vol. 19, pp. 1237-1251, 2008.
    • (2008) Parallel and Distributed Systems , vol.19 , pp. 1237-1251
    • Liu, A.X.1    Gouda, M.G.2
  • 18
    • 51849091527 scopus 로고    scopus 로고
    • Secure control: Towards survivable cyber-physical systems
    • ICDCS '08. 28th International Conference on
    • A. A. Cardenas, et al, "Secure Control: Towards Survivable Cyber-Physical Systems," in Distributed Computing Systems Workshops, 2008. ICDCS '08. 28th International Conference on, 2008, pp. 495-500.
    • (2008) Distributed Computing Systems Workshops, 2008 , pp. 495-500
    • Cardenas, A.A.1
  • 19
  • 27
    • 84867805516 scopus 로고    scopus 로고
    • Behavior rule based intrusion detection for supporting secure medical cyber physical systems
    • 2012 21st International Conference on
    • R. Mitchell and I.-R. Chen, "Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems," in Computer Communications and Networks (ICCCN), 2012 21st International Conference on, 2012, pp. 1-7.
    • (2012) Computer Communications and Networks (ICCCN) , pp. 1-7
    • Mitchell, R.1    Chen, I.-R.2
  • 28
    • 80053414377 scopus 로고    scopus 로고
    • A hierarchical security architecture for cyber-physical systems
    • 2011 4th International Symposium on
    • Z. Quanyan, et al, "A hierarchical security architecture for cyber-physical systems," in Resilient Control Systems (ISRCS), 2011 4th International Symposium on, 2011, pp. 15-20.
    • (2011) Resilient Control Systems (ISRCS) , pp. 15-20
    • Quanyan, Z.1
  • 31
    • 80052996550 scopus 로고    scopus 로고
    • Security requirements analysis, specification, prioritization and policy development in cyber-physical systems
    • 2011 5th International Conference on
    • K. K. Fletcher and L. Xiaoqing, "Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems," in Secure Software Integration & Reliability Improvement Companion (SSIRI-C), 2011 5th International Conference on, 2011, pp. 106-113.
    • (2011) Secure Software Integration & Reliability Improvement Companion (SSIRI-C) , pp. 106-113
    • Fletcher, K.K.1    Xiaoqing, L.2
  • 32
    • 84857620651 scopus 로고    scopus 로고
    • Defense as a service cloud for cyber-physical systems
    • Applications and Worksharing (CollaborateCom), 2011 7th International Conference on
    • M. Azab and M. Eltoweissy, "Defense as a service cloud for Cyber-Physical Systems," in Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, 2011, pp. 392-401.
    • (2011) Collaborative Computing: Networking , pp. 392-401
    • Azab, M.1    Eltoweissy, M.2
  • 33
    • 81855183273 scopus 로고    scopus 로고
    • Cyber-physical systems security applied to telesurgical robotics
    • G. S. Lee and B. Thuraisingham, "Cyber-physical systems security applied to telesurgical robotics," Comput. Stand. Interfaces, Vol. 34, pp. 225-229, 2012.
    • (2012) Comput. Stand. Interfaces , vol.34 , pp. 225-229
    • Lee, G.S.1    Thuraisingham, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.