共 15 条
[1]
[Anonymous], 2002, Proceedings of the 9th ACM conference on Computer and communications security, CCS'02, DOI DOI 10.1145/586110.586144
[2]
[Anonymous], ALCFTR19940085 HUM S
[3]
Carcano A., 2009, INT J CRITICAL INFRA, V2
[4]
Clarke G., 2004, MODERN SCADA PROTOCO
[5]
Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
[6]
East S, 2009, IFIP ADV INF COMM TE, V311, P67
[7]
Modbus/DNP3 State-based Intrusion Detection System
[J].
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA),
2010,
:729-736
[8]
Fovino IN, 2010, C HUM SYST INTERACT, P679, DOI 10.1109/HSI.2010.5514494
[9]
Frank P M., 1987, Triennial World Congress of the International Federation of Automatic Control, V3, P63, DOI DOI 10.1016/S1474-6670(17)55353-7
[10]
Gross P., 2004, P INT WORKSH DEBS