1 |
S. Rizvi, R. J. Orr, A. Cox, P. Ashokkumar, and M. R. Rizvi, "Identifying the attack surface for IoT network," Internet of Things, Vol. 9, 2020.
|
2 |
R. Lee, J. Slowik, B. Miller, A. Cherepanov, and R. Lipovsky, "Industroyer/crashoverride: Zero things cool about a threat group targeting the power grid," Black Hat USA, 2017.
|
3 |
R.Spenneberg, M. Brüggemann, and H. Schwartke, "PLC-Blaster: A worm living solely in the PLC," Black Hat Asia, pp. 1-16, 2016.
|
4 |
D. Formby, S. Durbha, and R. Beyah, "Out of control: Ransomware for industrial control systems," RSA conference, 2017.
|
5 |
S. K. Damodaran and P. D. Rowe, " Limitations on observability of effects in cyber-physical systems," In Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security (HotSoS '19), pp. 1-10, April 2019.
|
6 |
H. Shin, W. Lee, J. Yun, and H. Kim, "Implementation of programmable CPS testbed for anomaly detection," USENIX Workshop on Cyber Security Experimentation and Test (CSET '19), Aug. 2019.
|
7 |
H. Shin, W. Lee, J. Yun, and H. Kim, "HAI 1.0: HIL-based augmented ICS security dataset," USENIX Workshop on Cyber Security Experimentation and Test (CSET '20), Aug. 2020.
|
8 |
B. E. Strom, A. Applebaum, D. P. Miller, K. C. Nickels, A. G. Pennington, and C. B. Thomas, "MITRE ATT&CK: Design and philosophy," MP180360, MITRE Corporation, July 2018.
|
9 |
E. M. Hutchins, M. J. Cloppert, and R. M. Amin, "Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains," Leading Issues in Information Warfare & Security Research, vol. 1, no. 1, pp. 80, 2011.
|
10 |
Pascal Ackerman, "Industrial Cybersecurity: Efficiently Secure Critical Infrastructure Systems," Packt Publishing, 2017.
|
11 |
J. Choi, H. Kim, S. Choi, J. Yun, B. Min, and H. Kim, "POSTER: Vendor- Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management," In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (AsiaCCS '19), pp. 682-684, July 2019.
|
12 |
S. Choi, W. Lee, H. Shin, J. Yun, and S. Kim, "POSTER: CPS Security Testbed Development Using Controller-in-the- Middle," In Proceedings of the 2018 on Asia Conference on Computer and Communications Security (ASIACCS '18), pp. 829-831, May 2018.
|
13 |
M. Guri, B. Zadov, D. Bykhovsky, and Y. Elovici, "PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1879-1890, 2020.
DOI
|