![]() on Critical Infrastructure Protection, 2009.ĭ. Trombetta, Design and Implementation of a Secure Modbus Protocol, Conf. Hein, The ANDIX research OS - ARM TrustZone meets industrial control systems security, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN), 2015. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol. Hu et al., N-variant systems: A secretless framework for security through diversity, pp. on Distributed Computing Systems, 2008.ī. Sastry, Secure control: Towards survivable cyberphysical systems, Int. on Software Reliability Engineering (IS- SRE'05, 2005.Ī. Vouk, An experimental evaluation on reliability features of N-version programming, Int. ![]() ![]() Verissimo, The Crutial Way of Critical Infrastructure Protection, IEEE Security & Privacy Magazine, vol. Dependable and Secure Computing, IEEE Transactions on, vol. Lane, Prime: Byzantine replication under attack.
0 Comments
Leave a Reply. |