首页 > 最新文献

Proceedings of the 4th ACM Workshop on Cyber-Physical System Security最新文献

英文 中文
On The Limits of Detecting Process Anomalies in Critical Infrastructure 关键基础设施过程异常检测的局限性
Pub Date : 2018-05-22 DOI: 10.1145/3198458.3198466
A. Mathur
Critical infrastructure are Cyber-Physical Systems that provide essential services to the society. Such infrastructure includes plants for power generation and distribution and for water treatment and distribution. Several such plants operate under a high availability constraint. In the presence of ever increasing cyber attacks, as demonstrated by several events in the past, it becomes imperative and challenging for a plant to meet the availability requirement. Such attacks raise the importance of adding to a plant mechanisms for attack prevention, detection, and secure control. Preventive measures aim to control the incoming and outgoing network traffic and prevent unauthorised access to the plant. Detection mechanisms aim at detecting whether the plant is behaving as expected and raise alarms otherwise. Mechanisms for secure control aim at ensuring that the plant remains in a stable state despite an attack. When a preventive mechanism fails, the detection mechanism ought to detect whether the process under control is moving into an undesirable state and, if so, raise an appropriate alarm. While an alarm will likely alert an operator, it may be too late and damage may have occurred. To prevent such damage, a secure control mechanism ensures that despite the plant entering an abnormal state, the plant components, e.g., pumps and generators, do not get damaged and the process continues to function albeit in degraded mode. The ongoing process in the plant is said to be anomalous when its state is not in accordance with the plant design. A number of proposed detection mechanisms rely on the physics of the process to detect anomalous behavior. Several such mechanisms have been implemented in testbeds. In this talk we analyze two methods for the detection of process anomalies, namely the CUSUM method[2], and a relatively newer method based on the notion of state entanglement [1]. Both methods are based on models of the underlying process in the plant. CUSUM is a statistical technique for detecting change points in a time series that corresponds to a process variable. The method uses two parameters, namely bias and threshold. The bias is determined from the mean of the process variable of concern. The bias so obtained is used in conjunction with the predicted and observed state of the plant. The process is said to have changed its behavior when the CUSUM statistic exceeds a pre-specified threshold. The occurrence of a change implies process anomaly. State entanglement uses the joint state space of one or more components of the plant to construct a state space that consists of prohibited states during plant operation. The prohibited state space of the components leads to one or more invariants. The invariants so derived are coded as monitors and placed in the plant network and in the controllers. A monitor raises an alarm when the process enters a prohibited state. While both methods mentioned above have been evaluated experimentally, we wish to identif
关键基础设施是为社会提供基本服务的信息物理系统。这类基础设施包括发电和配电厂以及水处理和配电厂。有几个这样的工厂在高可用性约束下运行。正如过去的几起事件所证明的那样,在网络攻击日益增加的情况下,工厂满足可用性要求变得势在必行,也具有挑战性。这种攻击提高了在工厂中添加攻击预防、检测和安全控制机制的重要性。预防措施的目的是控制进出的网络流量,防止未经授权进入工厂。检测机制的目的是检测核电站是否像预期的那样运行,并发出警报。安全控制机制旨在确保电站在受到攻击时仍保持稳定状态。当预防机制失效时,检测机制应该检测所控制的进程是否正在进入不希望的状态,如果是,则发出适当的警报。虽然警报可能会提醒操作员,但可能为时已晚,并且可能已经发生损坏。为了防止这种损害,一个安全的控制机制确保即使电站进入异常状态,电站部件(如泵和发电机)也不会受到损坏,并且该过程在降级模式下继续运行。当工厂中正在进行的过程的状态与工厂设计不一致时,就说它是异常的。许多提出的检测机制依赖于过程的物理特性来检测异常行为。一些这样的机制已经在测试台上实现了。在这次演讲中,我们分析了两种检测过程异常的方法,即CUSUM方法[2]和基于状态纠缠概念的相对较新的方法[1]。这两种方法都是基于工厂中潜在过程的模型。CUSUM是一种统计技术,用于检测与过程变量对应的时间序列中的变化点。该方法使用两个参数,即偏差和阈值。偏差由所关注的过程变量的平均值确定。得到的偏差与预测的和观察到的工厂状态结合使用。当CUSUM统计数据超过预先指定的阈值时,进程就会改变其行为。变更的发生意味着流程异常。状态纠缠利用植物的一个或多个组件的联合状态空间来构建由植物运行过程中禁止状态组成的状态空间。组件的禁止状态空间导致一个或多个不变量。由此导出的不变量被编码为监视器,并放置在植物网络和控制器中。当进程进入禁止状态时,监视器会发出警报。虽然上述两种方法都经过了实验评估,但我们希望确定这些方法无法检测到异常或导致假警报的条件。通过我们的分析,我们揭示了这些方法的固有局限性,这些局限性可能导致不可接受的假警报率,以及它们无法检测协调的网络攻击。我们的分析基于一系列越来越复杂的攻击者配置文件,以及捕获植物组件之间状态关系的影响图,以揭示两种方法的优势和局限性。
{"title":"On The Limits of Detecting Process Anomalies in Critical Infrastructure","authors":"A. Mathur","doi":"10.1145/3198458.3198466","DOIUrl":"https://doi.org/10.1145/3198458.3198466","url":null,"abstract":"Critical infrastructure are Cyber-Physical Systems that provide essential services to the society. Such infrastructure includes plants for power generation and distribution and for water treatment and distribution. Several such plants operate under a high availability constraint. In the presence of ever increasing cyber attacks, as demonstrated by several events in the past, it becomes imperative and challenging for a plant to meet the availability requirement. Such attacks raise the importance of adding to a plant mechanisms for attack prevention, detection, and secure control. Preventive measures aim to control the incoming and outgoing network traffic and prevent unauthorised access to the plant. Detection mechanisms aim at detecting whether the plant is behaving as expected and raise alarms otherwise. Mechanisms for secure control aim at ensuring that the plant remains in a stable state despite an attack. When a preventive mechanism fails, the detection mechanism ought to detect whether the process under control is moving into an undesirable state and, if so, raise an appropriate alarm. While an alarm will likely alert an operator, it may be too late and damage may have occurred. To prevent such damage, a secure control mechanism ensures that despite the plant entering an abnormal state, the plant components, e.g., pumps and generators, do not get damaged and the process continues to function albeit in degraded mode. The ongoing process in the plant is said to be anomalous when its state is not in accordance with the plant design. A number of proposed detection mechanisms rely on the physics of the process to detect anomalous behavior. Several such mechanisms have been implemented in testbeds. In this talk we analyze two methods for the detection of process anomalies, namely the CUSUM method[2], and a relatively newer method based on the notion of state entanglement [1]. Both methods are based on models of the underlying process in the plant. CUSUM is a statistical technique for detecting change points in a time series that corresponds to a process variable. The method uses two parameters, namely bias and threshold. The bias is determined from the mean of the process variable of concern. The bias so obtained is used in conjunction with the predicted and observed state of the plant. The process is said to have changed its behavior when the CUSUM statistic exceeds a pre-specified threshold. The occurrence of a change implies process anomaly. State entanglement uses the joint state space of one or more components of the plant to construct a state space that consists of prohibited states during plant operation. The prohibited state space of the components leads to one or more invariants. The invariants so derived are coded as monitors and placed in the plant network and in the controllers. A monitor raises an alarm when the process enters a prohibited state. While both methods mentioned above have been evaluated experimentally, we wish to identif","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116276378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Session details: Keynote 3 会议细节:主题演讲3
Jianying Zhou
{"title":"Session details: Keynote 3","authors":"Jianying Zhou","doi":"10.1145/3258581","DOIUrl":"https://doi.org/10.1145/3258581","url":null,"abstract":"","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132729695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Control Theory for Practical Cyber-Physical Security: Extended Abstract 实用网络物理安全的控制理论:扩展摘要
Pub Date : 2018-05-22 DOI: 10.1145/3198458.3198467
H. Sandberg
In this talk, we discuss how control theory can contribute to the analysis and design of secure cyber-physical systems. We start by reviewing conditions for undetectable false-data injection attacks on feedback control systems. In particular, we highlight how a physical understanding of the controlled process can guide us in the allocation of protective measures. We show that protecting only a few carefully selected actuators or sensors can give indirect protection to many more components. We then illustrate how such analysis is exploited in the design of a resilient control scheme for a microgrid energy management system.
在这次演讲中,我们将讨论控制理论如何有助于安全网络物理系统的分析和设计。我们首先回顾对反馈控制系统进行不可检测的假数据注入攻击的条件。我们特别强调,对受控过程的物理理解如何指导我们分配保护措施。我们表明,只保护少数精心选择的致动器或传感器可以间接保护更多的组件。然后,我们说明了如何在微电网能源管理系统的弹性控制方案的设计中利用这种分析。
{"title":"Control Theory for Practical Cyber-Physical Security: Extended Abstract","authors":"H. Sandberg","doi":"10.1145/3198458.3198467","DOIUrl":"https://doi.org/10.1145/3198458.3198467","url":null,"abstract":"In this talk, we discuss how control theory can contribute to the analysis and design of secure cyber-physical systems. We start by reviewing conditions for undetectable false-data injection attacks on feedback control systems. In particular, we highlight how a physical understanding of the controlled process can guide us in the allocation of protective measures. We show that protecting only a few carefully selected actuators or sensors can give indirect protection to many more components. We then illustrate how such analysis is exploited in the design of a resilient control scheme for a microgrid energy management system.","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125233582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: Session 1: Risk Analysis and Security Testing for CPS 会议详情:会议1:CPS的风险分析和安全测试
D. Gollmann
{"title":"Session details: Session 1: Risk Analysis and Security Testing for CPS","authors":"D. Gollmann","doi":"10.1145/3258579","DOIUrl":"https://doi.org/10.1145/3258579","url":null,"abstract":"","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122072109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Practical Threat Scenario Testing in an Electric Power ICS Testbed 电力ICS试验台实际威胁场景测试研究
Pub Date : 2018-05-22 DOI: 10.1145/3198458.3198461
Ahnaf Siddiqi, Nils Ole Tippenhauer, D. Mashima, Binbin Chen
Industrial control system networks in real world usually require a complex composition of many different devices, protocols, and services. Unfortunately, such practical setups are rarely documented publicly in sufficient technical detail to allow third parties to use the system as reference for their research. As a result, security researchers often have to work with abstract and simplified system assumptions, which might not translate well to practice. In this work, we provide a comprehensive overview of the network services provided by industrial devices found in the EPIC (Electric Power and Intelligent Control) system at SUTD. We provide a detailed network topology of the different network segments, enumerate hosts, models, protocols, and services provided. We argue that such a detailed system description can serve as an enabler for more practical security research. In particular, we discuss how the reported information can be used for emulating a diverse set of important threat scenarios in the smart grid domain. In addition, the provided details allow other researchers to build more detailed models or simulations.
现实世界中的工业控制系统网络通常需要许多不同设备、协议和服务的复杂组合。不幸的是,这样的实际设置很少公开记录足够的技术细节,以允许第三方使用该系统作为他们研究的参考。因此,安全研究人员经常不得不使用抽象和简化的系统假设,这可能无法很好地转化为实践。在这项工作中,我们全面概述了SUTD EPIC(电力和智能控制)系统中工业设备提供的网络服务。我们提供了不同网段的详细网络拓扑,列举了所提供的主机、模型、协议和服务。我们认为,这种详细的系统描述可以作为更实际的安全研究的推动者。特别地,我们讨论了如何将报告的信息用于模拟智能电网领域中的各种重要威胁场景。此外,提供的细节允许其他研究人员建立更详细的模型或模拟。
{"title":"On Practical Threat Scenario Testing in an Electric Power ICS Testbed","authors":"Ahnaf Siddiqi, Nils Ole Tippenhauer, D. Mashima, Binbin Chen","doi":"10.1145/3198458.3198461","DOIUrl":"https://doi.org/10.1145/3198458.3198461","url":null,"abstract":"Industrial control system networks in real world usually require a complex composition of many different devices, protocols, and services. Unfortunately, such practical setups are rarely documented publicly in sufficient technical detail to allow third parties to use the system as reference for their research. As a result, security researchers often have to work with abstract and simplified system assumptions, which might not translate well to practice. In this work, we provide a comprehensive overview of the network services provided by industrial devices found in the EPIC (Electric Power and Intelligent Control) system at SUTD. We provide a detailed network topology of the different network segments, enumerate hosts, models, protocols, and services provided. We argue that such a detailed system description can serve as an enabler for more practical security research. In particular, we discuss how the reported information can be used for emulating a diverse set of important threat scenarios in the smart grid domain. In addition, the provided details allow other researchers to build more detailed models or simulations.","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129524192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Session details: Session 2: Access Control for CPS 会话详细信息:会话2:CPS访问控制
Jianying Zhou
{"title":"Session details: Session 2: Access Control for CPS","authors":"Jianying Zhou","doi":"10.1145/3258582","DOIUrl":"https://doi.org/10.1145/3258582","url":null,"abstract":"","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127828776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments 太长,没有强制:分布式环境中复杂策略的定性分层风险感知数据使用控制模型
Pub Date : 2018-05-22 DOI: 10.1145/3198458.3198463
F. Martinelli, C. Michailidou, P. Mori, A. Saracino
Distributed environments such as Internet of Things, have an increasing need of introducing access and usage control mechanisms, to manage the rights to perform specific operations and regulate the access to the plethora of information daily generated by these devices. Defining policies which are specific to these distributed environments could be a challenging and tedious task, mainly due to the large set of attributes that should be considered, hence the upcoming of unforeseen conflicts or unconsidered conditions. In this paper we propose a qualitative risk-based usage control model, aimed at enabling a framework where is possible to define and enforce policies at different levels of granularity. In particular, the proposed framework exploits the Analytic Hierarchy Process (AHP) to coalesce the risk value assigned to different attributes in relation to a specific operation, in a single risk value, to be used as unique attribute of usage control policies. Two sets of experiments that show the benefits both in policy definition and in performance, validate the proposed model, demonstrating the equivalence of enforcement among standard policies and the derived single-attributed policies.
物联网等分布式环境越来越需要引入访问和使用控制机制,以管理执行特定操作的权利,并规范对这些设备每天产生的大量信息的访问。定义特定于这些分布式环境的策略可能是一项具有挑战性和乏味的任务,主要是因为需要考虑大量的属性,因此会出现不可预见的冲突或未考虑的条件。在本文中,我们提出了一个定性的基于风险的使用控制模型,旨在使框架能够在不同粒度级别上定义和执行策略。特别地,所提出的框架利用层次分析法(AHP)将分配给与特定操作相关的不同属性的风险值合并为单个风险值,作为使用控制策略的唯一属性。两组实验显示了策略定义和性能方面的好处,验证了所提出的模型,证明了标准策略和派生的单属性策略之间执行的等效性。
{"title":"Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments","authors":"F. Martinelli, C. Michailidou, P. Mori, A. Saracino","doi":"10.1145/3198458.3198463","DOIUrl":"https://doi.org/10.1145/3198458.3198463","url":null,"abstract":"Distributed environments such as Internet of Things, have an increasing need of introducing access and usage control mechanisms, to manage the rights to perform specific operations and regulate the access to the plethora of information daily generated by these devices. Defining policies which are specific to these distributed environments could be a challenging and tedious task, mainly due to the large set of attributes that should be considered, hence the upcoming of unforeseen conflicts or unconsidered conditions. In this paper we propose a qualitative risk-based usage control model, aimed at enabling a framework where is possible to define and enforce policies at different levels of granularity. In particular, the proposed framework exploits the Analytic Hierarchy Process (AHP) to coalesce the risk value assigned to different attributes in relation to a specific operation, in a single risk value, to be used as unique attribute of usage control policies. Two sets of experiments that show the benefits both in policy definition and in performance, validate the proposed model, demonstrating the equivalence of enforcement among standard policies and the derived single-attributed policies.","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115176793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space 在工业数据空间建立信任的生态系统和物联网设备架构
Pub Date : 2018-05-22 DOI: 10.1145/3198458.3198459
G. Brost, Manuel Huber, Michael Weiß, Mykola Protsenko, J. Schütte, Sascha Wessel
The most recent and prominent advances in industrial computing include the growing interconnectivity of cyber-physical devices, as well as the increasing variety of complex applications exchanging data across company domains. In this context, the data becomes a valuable business asset and a trade good. The Industrial Data Space is a platform designed for the industry, allowing organizations the efficient data exchange and trade. The possibilities such platforms enable inevitably come along with new security risks regarding the establishment of trust, communication security, data usage control, or the integrity of participating systems. We define the key security requirements for the operation of such platforms in untrusted environments and present an overall security architecture for the whole ecosystem including the secure design and implementation of an architecture for the participating cyber-physical devices. On these devices, we allow for the controlled and isolated execution of services for application-specific gathering, processing and exchanging of data between organizations.
工业计算领域最新和最突出的进展包括网络物理设备的互联性不断增强,以及跨公司领域交换数据的复杂应用程序的种类不断增加。在这种情况下,数据成为有价值的商业资产和贸易商品。工业数据空间是一个为工业设计的平台,允许组织进行有效的数据交换和交易。这些平台不可避免地带来了新的安全风险,包括建立信任、通信安全、数据使用控制或参与系统的完整性。我们定义了这些平台在不可信环境中运行的关键安全要求,并为整个生态系统提供了一个整体的安全架构,包括参与网络物理设备的架构的安全设计和实现。在这些设备上,我们允许对特定于应用程序的服务进行受控和隔离的执行,以便在组织之间收集、处理和交换数据。
{"title":"An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space","authors":"G. Brost, Manuel Huber, Michael Weiß, Mykola Protsenko, J. Schütte, Sascha Wessel","doi":"10.1145/3198458.3198459","DOIUrl":"https://doi.org/10.1145/3198458.3198459","url":null,"abstract":"The most recent and prominent advances in industrial computing include the growing interconnectivity of cyber-physical devices, as well as the increasing variety of complex applications exchanging data across company domains. In this context, the data becomes a valuable business asset and a trade good. The Industrial Data Space is a platform designed for the industry, allowing organizations the efficient data exchange and trade. The possibilities such platforms enable inevitably come along with new security risks regarding the establishment of trust, communication security, data usage control, or the integrity of participating systems. We define the key security requirements for the operation of such platforms in untrusted environments and present an overall security architecture for the whole ecosystem including the secure design and implementation of an architecture for the participating cyber-physical devices. On these devices, we allow for the controlled and isolated execution of services for application-specific gathering, processing and exchanging of data between organizations.","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127547369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Session details: Keynote 1 会议详情:主题演讲1
D. Gollmann
{"title":"Session details: Keynote 1","authors":"D. Gollmann","doi":"10.1145/3258578","DOIUrl":"https://doi.org/10.1145/3258578","url":null,"abstract":"","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134374901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 3: SCADA Security and Digital Twins 会议详情:会议3:SCADA安全性和数字孪生
N. Tippenhauer
{"title":"Session details: Session 3: SCADA Security and Digital Twins","authors":"N. Tippenhauer","doi":"10.1145/3258583","DOIUrl":"https://doi.org/10.1145/3258583","url":null,"abstract":"","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131668044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1