Добірка наукової літератури з теми "Control-oriented attacks"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Control-oriented attacks".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Control-oriented attacks"
Cheng, Long, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, and Danfeng (Daphne) Yao. "Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches." ACM Transactions on Privacy and Security 24, no. 4 (November 30, 2021): 1–36. http://dx.doi.org/10.1145/3462699.
Повний текст джерелаPisu, Pierluigi, Jim Martin, and Zoleikha Abdollahi Biron. "A Control Oriented Perspective for Security in Connected and Automated Vehicles." Mechanical Engineering 139, no. 12 (December 1, 2017): S17—S20. http://dx.doi.org/10.1115/1.2017-dec-10.
Повний текст джерелаSánchez, Helem S., Damiano Rotondo, Teresa Escobet, Vicenç Puig, and Joseba Quevedo. "Bibliographical review on cyber attacks from a control oriented perspective." Annual Reviews in Control 48 (2019): 103–28. http://dx.doi.org/10.1016/j.arcontrol.2019.08.002.
Повний текст джерелаMa, Jian Hong, and Li Xia Ji. "Shrew Attack on Internet Congestion Control Protocol in Control Engineering." Advanced Materials Research 648 (January 2013): 277–80. http://dx.doi.org/10.4028/www.scientific.net/amr.648.277.
Повний текст джерелаBhardwaj, Akashdeep, Fadi Al-Turjman, Manoj Kumar, Thompson Stephan, and Leonardo Mostarda. "Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems." IEEE Access 8 (2020): 104956–66. http://dx.doi.org/10.1109/access.2020.2998983.
Повний текст джерелаTian, Wan Li, Lian Zhong Liu, and Meng Liu. "Roles Generation for Applications in RBAC Model." Applied Mechanics and Materials 411-414 (September 2013): 35–39. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.35.
Повний текст джерелаDelgado, Raimarius, Jaeho Park, Cheonho Lee, and Byoung Wook Choi. "Safe and Policy Oriented Secure Android-Based Industrial Embedded Control System." Applied Sciences 10, no. 8 (April 17, 2020): 2796. http://dx.doi.org/10.3390/app10082796.
Повний текст джерелаWang, Zibo, Yaofang Zhang, Zhiyao Liu, Tongtong Li, Yilu Chen, Chen Yang, Bailing Wang, and Zhusong Liu. "A Prioritizing Interdiction Surface-Based Vulnerability Remediation Composite Metric for Industrial Control Systems." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–16. http://dx.doi.org/10.1155/2022/6442778.
Повний текст джерелаBaig, Ahmed Fraz, and Sigurd Eskeland. "Security, Privacy, and Usability in Continuous Authentication: A Survey." Sensors 21, no. 17 (September 6, 2021): 5967. http://dx.doi.org/10.3390/s21175967.
Повний текст джерелаGenge, Béla, Piroska Haller, Adrian-Vasile Duka, and Hunor Sándor. "A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems." at - Automatisierungstechnik 67, no. 5 (May 27, 2019): 417–28. http://dx.doi.org/10.1515/auto-2019-0017.
Повний текст джерелаДисертації з теми "Control-oriented attacks"
Song, Sui. "Flow-oriented anomaly-based detection of denial of service attacks with flow-control-assisted mitigation." Thesis, 2006. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2006-036.
Повний текст джерелаErsan, Erkan. "On the (in)security of behavioral-based dynamic anti-malware techniques." Thesis, 2017. http://hdl.handle.net/1828/7935.
Повний текст джерелаGraduate
2018-02-07
0984
erkanersan@gmail.com
Частини книг з теми "Control-oriented attacks"
Caldeira, Filipe, Tiago Cruz, Paulo Simões, and Edmundo Monteiro. "Towards Protecting Critical Infrastructures." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 121–65. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8456-0.ch007.
Повний текст джерелаToapanta Toapanta, Segundo Moisés, Yaritza Julieth Terán Terranova, Bertha Alice Naranjo Sánchez, and Luis Enrique Mafla Gallegos. "Security and Privacy in Information Management in a Distributed Environment for Public Organizations." In Fuzzy Systems and Data Mining VI. IOS Press, 2020. http://dx.doi.org/10.3233/faia200716.
Повний текст джерелаEllefsen, Ian, and Sebastiaan von Solms. "A Community-Oriented Approach to CIIP in Developing Countries." In Securing Critical Infrastructures and Critical Control Systems, 240–61. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2659-1.ch010.
Повний текст джерелаAbassi, Ryma. "Trust Management in Vehicular Ad hoc NETwork." In Security and Privacy in Smart Sensor Networks, 47–62. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5736-4.ch003.
Повний текст джерелаТези доповідей конференцій з теми "Control-oriented attacks"
Hu, Hong, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai Liang. "Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks." In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016. http://dx.doi.org/10.1109/sp.2016.62.
Повний текст джерелаBiernacki, Lauren, Mark Gallagher, Valeria Bertacco, and Todd Austin. "Thwarting Control Plane Attacks with Displaced and Dilated Address Spaces." In 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2020. http://dx.doi.org/10.1109/host45689.2020.9300273.
Повний текст джерелаOgunsanya, B. O., and A. J. Ifebajo. "Developing a Proactive Environmental Management System (PEMS) in Offshore West Africa." In ASME 2001 Engineering Technology Conference on Energy. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/etce2001-17082.
Повний текст джерелаPeng, Yong, Yu Wang, Chong Xiang, Xifeng Liu, Zhe Wen, Dongqing Chen, and Chaojun Zhang. "Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment Environment." In 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2015. http://dx.doi.org/10.1109/iih-msp.2015.110.
Повний текст джерелаNiether, Sebastian, Bernhard Bobusch, David Marten, Georgios Pechlivanoglou, Christian Navid Nayeri, and Christian Oliver Paschereit. "Development of a Fluidic Actuator for Adaptive Flow Control on a Thick Wind Turbine Airfoil." In ASME Turbo Expo 2014: Turbine Technical Conference and Exposition. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/gt2014-25922.
Повний текст джерелаYu, Jinghua, Stefan Wagner Stefan Wagner, and Feng Luo. "A STPA-based Approach for Systematic Security Analysis of In-vehicle Diagnostic and Software Update Systems." In FISITA World Congress 2021. FISITA, 2021. http://dx.doi.org/10.46720/f2020-ves-020.
Повний текст джерелаAziminejad, Arash. "A Cyber-Physical Security Framework for Rail Transportation Data Systems." In 2022 Joint Rail Conference. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/jrc2022-78167.
Повний текст джерела