1 |
Baker, George H., and Allan Berg. "Supervisory control and data acquisition (SCADA) systems." The Critical Infrastructure Protection Report 1.6 (2002).
|
2 |
Shahzad, A., et al. "The SCADA review: system components, architecture, protocols and future security trends." American Journal of Applied Sciences 11.8 (2014): 1418.
DOI
|
3 |
Sajid, Anam, Haider Abbas, and Kashif Saleem. "Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges." IEEE Access 4 (2016): 1375-1384.
DOI
|
4 |
Luders, Stefan. Control systems under attack?. No. CERN-OPEN-2005-025. 2005.
|
5 |
H. M. N. Al Hamadi, C. Y. Yeun, and M. J. Zemerly, "A novel security scheme for the smart grid and SCADA networks,'' Wireless Pers. Commun., vol. 73, no. 4, pp. 1547-1559, 2013. ,
DOI
|
6 |
U.S. Department of Homeland Security, "ICSALERT-13-016-02: Offline Brute-Force Password Tool Targeting Siemens S7," ICS-CERT, December 2013. Available: https://ics-cert.us-cert.gov/alerts/ICSALERT-13-016-02.
|
7 |
Syverson, Paul. "A taxonomy of replay attacks [cryptographic protocols]." Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings. IEEE, 1994.
|
8 |
H. M. N. Al Hamadi, C. Y. Yeun, and M. J. Zemerly, "A novel security scheme for the smart grid and SCADA networks,'' Wireless Pers. Commun., vol. 73, no. 4, pp. 1547-1559, 2013. ,
DOI
|
9 |
Baker, George H., and Allan Berg. "Supervisory control and data acquisition (SCADA) systems." The Critical Infrastructure Protection Report 1.6 (2002).
|
10 |
http://www.etnews.com/20160405000068, 전자신문 etnews, 2016,04.05
|
11 |
Coffed, Jeff. "The threat of GPS jamming: The risk to an information utility." Report of EXELIS, Jan (2014)
|
12 |
3. 신천식. "GPS 전파교란 대응기술 동향." TTA Journal 149 (2013): 92-99.
|
13 |
New Technologies deployed to counter the threat of GPS Jamming,' Cellular-news, 2013. 2. 13
|
14 |
임종인, and 장규현. "전자적 제어시스템 침해 위협에 따른 법적 대응방안." 정보보호학회지 20.4 (2010): 52-65.
|
15 |
http://www.telegraph.co.uk/news/worldnews/1575293/Schoolboy-hacks-into-citys-tram-system.html, The telegraph, 11 Jan 2008, By Graeme Baker
|
16 |
Poulsen, Kevin. "Hacker disables more than 100 cars remotely." Internet]. Available: www.wired.com/threatlevel/2010/03/hacker-bricks-cars (2010).
|
17 |
Greenberg, Andy. "Hackers remotely kill a jeep on the highway-With me in it." Wired 7 (2015): 21.
|
18 |
Ghena, Branden, et al. "Green Lights Forever: Analyzing the Security of Traffic Infrastructure." WOOT 14 (2014): 7-7.
|
19 |
Ishtiaq Roufa, Rob Millerb, et al. "Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study." 19th USENIX Security Symposium, Washington DC. 2010
|
20 |
Francillon, Aurélien, Boris Danev, and Srdjan Capkun. "Relay attacks on passive keyless entry and start systems in modern cars." Proc. Network and Distributed System Security Symp.
|
21 |
Radcliffe, Jerome. "Hacking medical devices for fun and insulin: Breaking the human SCADA system." Black Hat Conference presentation slides. Vol. 2011. 2011.
|