ADD: added more bibliography
This commit is contained in:
parent
0d09963096
commit
67764f62f8
52
building_automation.bib
Normal file
52
building_automation.bib
Normal file
@ -0,0 +1,52 @@
|
||||
@ARTICLE{bas:sec0,
|
||||
author={Granzer, W. and Praus, F. and Kastner, W.},
|
||||
journal={Industrial Electronics, IEEE Transactions on},
|
||||
title={Security in Building Automation Systems},
|
||||
year={2010},
|
||||
volume={57},
|
||||
number={11},
|
||||
pages={3622-3630},
|
||||
keywords={building management systems;computer network security;home automation;message authentication;air conditioning control;building automation system;heating control;security critical service;security threat analysis;ventilation control;Air conditioning;Automatic control;Automation;Communication system control;Communication system security;Control systems;Heating;Lighting control;Temperature control;Ventilation;Building automation;embedded networks;integration;security},
|
||||
doi={10.1109/TIE.2009.2036033},
|
||||
ISSN={0278-0046},
|
||||
month={Nov},}
|
||||
|
||||
@INPROCEEDINGS{bas:sec1,
|
||||
author={Novak, T. and Treytl, A. and Palensky, P.},
|
||||
booktitle={Emerging Technologies and Factory Automation, 2007. ETFA. IEEE Conference on},
|
||||
title={Common approach to functional safety and system security in building automation and control systems},
|
||||
year={2007},
|
||||
pages={1141-1148},
|
||||
keywords={building management systems;building automation;control systems;functional safety;modern automated buildings;product life;system security;Automatic control;Automation;Buildings;Communication system security;Computer network reliability;Computer security;Control systems;Data security;Health and safety;Protocols},
|
||||
doi={10.1109/EFTA.2007.4416910},
|
||||
month={Sept},}
|
||||
|
||||
@INPROCEEDINGS{bas:sec2,
|
||||
author={Granzer, W. and Kastner, W. and Neugschwandtner, G. and Praus, F.},
|
||||
booktitle={Factory Communication Systems, 2006 IEEE International Workshop on},
|
||||
title={Security in networked building automation systems},
|
||||
year={2006},
|
||||
pages={283-292},
|
||||
keywords={Automatic control;Automation;Communication system control;Communication system security;Control systems;Data security;Daylighting;Intelligent networks;Protocols;Spine},
|
||||
doi={10.1109/WFCS.2006.1704168},
|
||||
month={},}
|
||||
|
||||
@INPROCEEDINGS{bas:sec3,
|
||||
author={Jacobsson, Andreas and Davidsson, Paul},
|
||||
booktitle={Internet of Things (WF-IoT), 2015 IEEE 2nd World Forum on},
|
||||
title={Towards a model of privacy and security for smart homes},
|
||||
year={2015},
|
||||
pages={727-732},
|
||||
keywords={Automation;Logic gates;Privacy;Risk analysis;Security;Smart homes;Software;IoT;privacy;security;smart home},
|
||||
doi={10.1109/WF-IoT.2015.7389144},
|
||||
month={Dec},}
|
||||
|
||||
@INPROCEEDINGS{bas:sec4,
|
||||
author={Brauchli, A. and Depeng Li},
|
||||
booktitle={Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on},
|
||||
title={A solution based analysis of attack vectors on smart home systems},
|
||||
year={2015},
|
||||
pages={1-6},
|
||||
keywords={data privacy;home automation;security of data;attack vector solution based analysis;central Europe;digital STROM installation;home-automation solution;privacy constraints;secure smart home systems;Decision support systems;Home appliances;Privacy;Security;Servers;Smart homes;Smart phones},
|
||||
doi={10.1109/SSIC.2015.7245682},
|
||||
month={Aug},}
|
6
threat_modeling.bib
Normal file
6
threat_modeling.bib
Normal file
@ -0,0 +1,6 @@
|
||||
@book{threat:shostack,
|
||||
title={Threat modeling: Designing for security},
|
||||
author={Shostack, Adam},
|
||||
year={2014},
|
||||
publisher={John Wiley \& Sons}
|
||||
}
|
Loading…
Reference in New Issue
Block a user