Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study
- 26 January 2016
- book chapter
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableThis publication has 13 references indexed in Scilit:
- A new connected device-based Failure Mode and Effects Analysis modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Intelligent Checkers to Improve Attack Detection in Cyber Physical SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Go with the flowPublished by Association for Computing Machinery (ACM) ,2013
- Attack Detection and Identification in Cyber-Physical SystemsIEEE Transactions on Automatic Control, 2013
- Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception AttacksIEEE Transactions on Control Systems Technology, 2012
- Introduction to Industrial Control NetworksIEEE Communications Surveys & Tutorials, 2012
- View Consistency in Architectures for Cyber-Physical SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Attacks against process control systemsPublished by Association for Computing Machinery (ACM) ,2011
- Control-flow integrity principles, implementations, and applicationsACM Transactions on Information and System Security, 2009
- Safe and Secure Networked Control Systems under Denial-of-Service AttacksLecture Notes in Computer Science, 2009