메뉴 건너뛰기




Volumn , Issue , 2015, Pages 795-800

Towards effective security control assignment in the Industrial Internet of Things

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; CRIME; INTELLIGENT CONTROL; INTERNET;

EID: 84964515504     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WF-IoT.2015.7389155     Document Type: Conference Paper
Times cited : (69)

References (13)
  • 2
    • 84977104892 scopus 로고    scopus 로고
    • S. Institute,[Online; accessed 23-July-2015]
    • S. Institute, "The Critical Security Controls for Effective Cyber Defense, " https://www. sans. org/media/critical-security-controls/CSC-5. pdf, 2015, [Online; accessed 23-July-2015].
    • (2015) The Critical Security Controls for Effective Cyber Defense
  • 4
    • 84987802592 scopus 로고    scopus 로고
    • Industrial network security: Securing critical infrastructure networks for smart grid, scada, and other industrial control systems
    • E. D. Knapp and J. T. Langill, Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress, 2014.
    • (2014) Syngress
    • Knapp, E.D.1    Langill, J.T.2
  • 8
    • 84964560452 scopus 로고    scopus 로고
    • Security Incidents Organization,[Online; accessed 23-July-2015]
    • Security Incidents Organization, "RISI Online Incident Database, " http: //www. risidata. com/Database, 2014, [Online; accessed 23-July-2015].
    • (2014) RISI Online Incident Database
  • 11
    • 84964473279 scopus 로고    scopus 로고
    • Cyberespionage attacks against energy suppliers, version 1. 21
    • California
    • D. Symantec, "Cyberespionage attacks against energy suppliers, version 1. 21, " Mountain View, California, 2014.
    • (2014) Mountain View
    • Symantec, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.