Uneingeschränkter Zugang

Exploration of Quantum Cryptography Security Applications for Industrial Control Systems


Zitieren

Khan, M. T., Serpanos, D., & Shrobe, H. E. (2017). A formally reliable cognitive middleware for the security of industrial control systems. Electronics, 6(3), 58-. Search in Google Scholar

Auffret, J. P., Snowdon, J. L., Stavrou, A., Katz, J. S., Kelley, D., & Rahman, R. S., et al. (2017). Cybersecurity leadership: competencies, governance, and technologies for industrial control systems. Journal of Interconnection Networks, 17(1), 1740001. Search in Google Scholar

Handayani, S., Sri, U. M. W., Megasari, R., & Kustiandi, J. (2020). Integrating information technology and stem learning models in industrial 4.0 revolution. KnE Social Sciences. Search in Google Scholar

Gao, H. Y., Hu, A. H., Shen, W. Q., & Jiang, Z. X. (2019). Group consensus of multi-agent systems subjected to cyber-attacks. Chinese Physics B, 28(6). Search in Google Scholar

Barboni, A., Rezaee, H., Boem, F., & Parisini, T. (2020). Detection of covert cyber-attacks in interconnected systems: a distributed model-based approach. IEEE Transactions on Automatic Control, PP(99), 1-1. Search in Google Scholar

Zhang, Y., Yang, T., & Tang, Z. (2021). Active fault-tolerant control for load frequency control in multi- area power systems with physical faults and cyber attacks. International Transactions on Electrical Energy Systems. Search in Google Scholar

Ameri, K., Hempel, M., Sharif, H., Lopez, J., & Perumalla, K. (2023). Design of a novel information system for semi-automated management of cybersecurity in industrial control systems. ACM transactions on management information systems. Search in Google Scholar

Herath, T. C., Herath, H. S. B., & D'Arcy, J. (2020). Organizational adoption of information security solutions: an integrative lens based on innovation adoption and the technology-organization-environment framework. The data base for advances in information systems(2), 51. Search in Google Scholar

Du, M. (2020). Application of information communication network security management and control based on big data technology. International Journal of Communication Systems. Search in Google Scholar

Xue, S. (2019). Face database security information verification based on recognition technology. International Journal of Network Security, 21(4), 601-606. Search in Google Scholar

Zeng, Z., Li, Y., Cao, Y., Zhao, Y., Zhong, J., & Sidorov, D., et al. (2020). Blockchain technology for information security of the energy internet: fundamentals, features, strategy and application. Energies, 13. Search in Google Scholar

Chen, J., Li, C., & Wang, Y. (2018). Research on meteorological information network security system based on vpn technology. MATEC Web of Conferences, 232. Search in Google Scholar

Griscioli, F., & Pizzonia, M. (2021). Usbcaptchain: preventing (un)conventional attacks from promiscuously used usb devices in industrial control systems1. Journal of Computer Security, 29(1), 1-26. Search in Google Scholar

Dehlaghi-Ghadim, A., Balador, A., Moghadam, M. H., Hansson, H., & Conti, M. (2023). Icssim-a framework for building industrial control systems security testbeds. Computers in Industry. Search in Google Scholar

Koay, A. M. Y., Ko, R. K. L., Hettema, H., & Radke, K. (2023). Machine learning in industrial control system (ics) security: current landscape, opportunities and challenges. Journal of intelligent information systems. Search in Google Scholar

Jadidi, Z., Hagemann, J., & Quevedo, D. (2022). Multi-step attack detection in industrial control systems using causal analysis. Computers in Industry, 142. Search in Google Scholar

Portmann, C., & Renner, R. (2022). Security in quantum cryptography. Reviews of Modern Physics. Search in Google Scholar

Huang, A., Barz, S., Andersson, E., & Makarov, V. (2018). Implementation vulnerabilities in general quantum cryptography. New Journal of Physics, 20(10). Search in Google Scholar

Avanesov, A. S., & Kronberg, D. A. (2020). Possibilities of using practical limitations of an eavesdropper in quantum cryptography. Quantum Electronics, 50(5), 454-460. Search in Google Scholar

Wanchun Liu, Petar Popovski, Yonghui Li & Branka Vucetic. (2020). Wireless Networked Control Systems With Coding-Free Data Transmission for Industrial IoT. IEEE Internet of Things Journal(3),1788-1801. Search in Google Scholar

Marcin Bednarek & Tadeusz Dąbrowski. (2018). Analysis of Reliability States of an Industrial Network Data Transmission System. Journal of KONBiN(1),137-152. Search in Google Scholar

Wojciech GREGA. (2012). Information Technologies Supporting Control and Monitoring of Power Systems. Przeglad Elektrotechniczny(5a). Search in Google Scholar

eISSN:
2444-8656
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
Volume Open
Fachgebiete der Zeitschrift:
Biologie, andere, Mathematik, Angewandte Mathematik, Allgemeines, Physik