-
Notifications
You must be signed in to change notification settings - Fork 0
/
mybib.bib
330 lines (287 loc) · 12.5 KB
/
mybib.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
%% This BibTeX bibliography file was created using BibDesk.
%% https://bibdesk.sourceforge.io/
%% Created for Luca Dalmasso at 2022-10-12 09:34:59 +0200
%% Saved with string encoding Unicode (UTF-8)
@ARTICLE{755465,
author={Kessler, R.E.},
journal={IEEE Micro},
title={The Alpha 21264 microprocessor},
year={1999},
volume={19},
number={2},
pages={24-36},
doi={10.1109/40.755465}}
@ARTICLE{491460,
author={Yeager, K.C.},
journal={IEEE Micro},
title={The Mips R10000 superscalar microprocessor},
year={1996},
volume={16},
number={2},
pages={28-41},
doi={10.1109/40.491460}}
@misc{chisel,
author = {CHIPS Alliance},
date-added = {2022-10-12 09:26:03 +0200},
date-modified = {2022-10-12 09:34:56 +0200},
howpublished = {\url{https://github.com/chipsalliance/chisel3}},
title = {Chisel 3: A Modern Hardware Design Language},
year = {2022}}
@article{zhaosonicboom,
author = {Zhao, Jerry and Korpan, Ben and Gonzalez, Abraham and Asanovic, Krste},
booktitle = {Fourth Workshop on Computer Architecture Research with RISC-V},
month = {May},
title = {SonicBOOM: The 3rd Generation Berkeley Out-of-Order Machine},
year = {2020}}
@misc{picorv32,
author = {Claire Wolf},
date-added = {2022-10-11 17:57:51 +0200},
date-modified = {2022-10-11 18:00:11 +0200},
howpublished = {\url{https://github.com/YosysHQ/picorv32}},
title = {PicoRV32 - A Size-Optimized RISC-V CPU},
year = {2019}}
@misc{riscvIntro,
author = {RISC-V International},
date-added = {2022-10-11 16:04:57 +0200},
date-modified = {2022-10-11 16:07:43 +0200},
howpublished = {\url{https://riscv.org/wp-content/uploads/2021/08/RISC-V-Introduction-_-Aug-2021.pptx}},
title = {RISC-V Introduction},
year = {2021}}
@misc{ambaAPB,
author = {ARM},
date-added = {2022-10-07 14:45:42 +0200},
date-modified = {2022-10-07 14:46:17 +0200},
howpublished = {\url{https://developer.arm.com/documentation/ihi0024/latest/}},
title = {AMBA APB Protocol Specification},
year = {2021}}
@misc{ambaAHB,
author = {ARM},
date-added = {2022-10-07 14:43:23 +0200},
date-modified = {2022-10-07 14:44:46 +0200},
howpublished = {\url{https://developer.arm.com/documentation/ihi0033/latest/}},
title = {AMBA AHB Protocol Specification},
year = {2021}}
@misc{uart16550,
author = {SIDSA},
date-added = {2022-10-07 13:36:43 +0200},
date-modified = {2022-10-07 13:40:56 +0200},
howpublished = {\url{http://caro.su/msx/ocm_de1/16550.pdf}},
title = {UART 16550 IP Datasheet},
year = {2001}}
@misc{aftabManual,
author = {{CINI Cybersecurity National Laboratory, University of Tehran}},
date-added = {2022-10-07 13:25:14 +0200},
date-modified = {2022-10-10 18:29:10 +0200},
howpublished = {\url{https://github.com/RHESGroup/aftab/blob/master/doc/aftab_user_manual.pdf}},
title = {CNL RISC-V AFTAB Microprocessor User Manual},
year = {2022}}
@misc{riscvII,
author = {{Andrew Waterman, Yunsup Lee, Rimas Avizienis, David A. Patterson, Krste Asanovi{\'c}}},
date-added = {2022-10-07 13:21:19 +0200},
date-modified = {2022-10-10 18:30:00 +0200},
howpublished = {\url{https://www2.eecs.berkeley.edu/Pubs/TechRpts/2016/EECS-2016-161.pdf}},
title = {The RISC-V Privileged Architecture Version 1.9.1},
year = {2016}}
@misc{lecture04riscv,
author = {Yonghong Yan},
date-added = {2022-10-07 13:12:51 +0200},
date-modified = {2022-10-07 13:16:13 +0200},
howpublished = {\url{https://passlab.github.io/CSCE513/notes/lecture04_RISCV_ISA.pdf}},
title = {Lecture 04 RISC-V ISA, CSCE 513 Computer Architecture},
year = {2018}}
@misc{aftab,
author = {{CINI Cybersecurity National Laboratory, University of Tehran}},
date-added = {2022-10-07 12:37:31 +0200},
date-modified = {2022-10-10 18:29:03 +0200},
howpublished = {\url{https://github.com/RHESGroup/aftab}},
title = {CNL RISC-V AFTAB},
year = {2022}}
@misc{pulpino,
author = {ETH Zurich},
date-added = {2022-10-07 12:28:23 +0200},
date-modified = {2022-10-07 12:31:56 +0200},
howpublished = {\url{https://github.com/pulp-platform/pulpino}},
title = {PULPino},
year = {2019}}
@book{lee2016introduction,
author = {Lee, Edward Ashford and Seshia, Sanjit A},
publisher = {Mit Press},
title = {Introduction to embedded systems: A cyber-physical systems approach},
year = {2016}}
@inproceedings{jiang2013towards,
author = {Jiang, Frank and Frater, Michael R},
booktitle = {2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems},
organization = {IEEE},
pages = {30--35},
title = {Towards a reliable aquatic-based Cyber Physical System: A new contextsituation aware low overhead routing scheme},
year = {2013}}
@inproceedings{cardenas2008secure,
author = {Cardenas, Alvaro A and Amin, Saurabh and Sastry, Shankar},
booktitle = {2008 The 28th International Conference on Distributed Computing Systems Workshops},
organization = {IEEE},
pages = {495--500},
title = {Secure control: Towards survivable cyber-physical systems},
year = {2008}}
@article{humayed2017cyber,
author = {Humayed, Abdulmalik and Lin, Jingqiang and Li, Fengjun and Luo, Bo},
journal = {IEEE Internet of Things Journal},
number = {6},
pages = {1802--1831},
publisher = {IEEE},
title = {Cyber-physical systems security---A survey},
volume = {4},
year = {2017}}
@inproceedings{barrere2018cps,
author = {Barr{\`e}re, Mart{\'\i}n and Hankin, Chris and Barboni, Angelo and Zizzo, Giulio and Boem, Francesca and Maffeis, Sergio and Parisini, Thomas},
booktitle = {2018 IEEE 24th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)},
organization = {IEEE},
pages = {240--241},
title = {CPS-MT: A Real-Time Cyber-Physical System Monitoring Tool for Security Research},
year = {2018}}
@article{baldoni2016futuro,
author = {R. {Baldoni} and R. {De Nicola}},
journal = {CINI-Consorzio Interuniversitario Nazionale Informatica},
title = {The Future of Cybersecurity in Italy},
year = {2016}}
@article{krause2014nato,
author = {Krause, Hannes},
journal = {The Tallinn Papers},
number = {3},
pages = {1--6},
title = {NATO on its way towards a comfort zone in cyber defence},
volume = {1},
year = {2014}}
@article{ruefle2014computer,
author = {Ruefle, Robin and Dorofee, Audrey and Mundie, David and Householder, Allen D and Murray, Michael and Perl, Samuel J},
journal = {IEEE Security \& Privacy},
number = {5},
pages = {16--26},
publisher = {IEEE},
title = {Computer security incident response team development and evolution},
volume = {12},
year = {2014}}
@inproceedings{patriciu2009guide,
author = {Patriciu, Victor-Valeriu and Furtuna, Adrian Constantin},
booktitle = {Proceedings of the 8th WSEAS International Conference on E-Activities and information security and privacy},
organization = {World Scientific and Engineering Academy and Society (WSEAS)},
pages = {172--177},
title = {Guide for designing cyber security exercises},
year = {2009}}
@inproceedings{urias2018cyber,
author = {Urias, Vincent E and Stout, William MS and Van Leeuwen, Brian and Lin, Han},
booktitle = {2018 International Carnahan Conference on Security Technology (ICCST)},
organization = {IEEE},
pages = {1--5},
title = {Cyber Range Infrastructure Limitations and Needs of Tomorrow: A Position Paper},
year = {2018}}
@misc{nist2018,
author = {{NIST}},
howpublished = {\url{https://www.nist.gov/system/files/documents/2018/02/13/cyber_ranges.pdf}},
note = {[Online; accessed 28-November-2019]},
title = {Cyber Ranges},
year = {2018}}
@misc{kaspersky2019,
author = {{KasperskyLab}},
howpublished = {\url{https://ics-cert.kaspersky.com/reports/2019/03/27/threat-landscape-for-industrial-automation-systems-h2-2018/}},
note = {[Online; accessed 28-November-2019]},
title = {Threat landscape for industrial automation systems},
year = {2019}}
@inproceedings{deckard2018cybertropolis,
author = {Deckard, Gary M},
booktitle = {2018 IEEE International Symposium on Technologies for Homeland Security (HST)},
organization = {IEEE},
pages = {1--4},
title = {Cybertropolis: breaking the paradigm of cyber-ranges and testbeds},
year = {2018}}
@article{vykopal2017kypo,
author = {Vykopal, Jan and O{\v{s}}lej{\v{s}}ek, Radek and {\v{C}}eleda, Pavel and Vizvary, Martin and Tovar{\v{n}}{\'a}k, Daniel},
publisher = {SciTePress},
title = {Kypo cyber range: Design and use cases},
year = {2017}}
@article{siaterlis2012use,
author = {Siaterlis, Christos and Garcia, Andres Perez and Genge, B{\'e}la},
journal = {IEEE Communications Surveys \& Tutorials},
number = {2},
pages = {929--942},
publisher = {IEEE},
title = {On the use of Emulab testbeds for scientifically rigorous experiments},
volume = {15},
year = {2012}}
@inproceedings{rosenstein2012secure,
author = {Rosenstein, Michael and Corvese, Frank},
booktitle = {CSET},
title = {A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed.},
year = {2012}}
@misc{ciscoCR,
author = {{CISCO}},
howpublished = {\url{https://www.cisco.com/c/dam/en_us/about/doing_business/legal/service_descriptions/docs/asf-cyber-range-large.pdf}},
note = {[Online; accessed 28-November-2019]},
title = {Cisco Cyber Range},
year = {2016}}
@article{cintuglu2016survey,
author = {Cintuglu, Mehmet Hazar and Mohammed, Osama A and Akkaya, Kemal and Uluagac, A Selcuk},
journal = {IEEE Communications Surveys \& Tutorials},
number = {1},
pages = {446--464},
publisher = {IEEE},
title = {A survey on smart grid cyber-physical system testbeds},
volume = {19},
year = {2016}}
@inproceedings{holm2015survey,
author = {Holm, Hannes and Karresand, Martin and Vidstr{\"o}m, Arne and Westring, Erik},
booktitle = {Nordic Conference on Secure IT Systems},
organization = {Springer},
pages = {11--26},
title = {A survey of industrial control system testbeds},
year = {2015}}
@inproceedings{7781277,
author = {A. {Ashok} and S. {Krishnaswamy} and M. {Govindarasu}},
booktitle = {2016 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT)},
doi = {10.1109/ISGT.2016.7781277},
issn = {2472-8152},
keywords = {cyber-physical systems;power engineering computing;power system security;smart power grids;remote accessible testbed;smart grid;cyber physical system;attack-defense platform;vulnerability assessment;impact analysis;product testing;experimental orchestration framework;PowerCyber CPS security testbed;Iowa State University;ISU;Security;Power systems;User interfaces;Computer architecture;Software;Phasor measurement units;Load modeling},
month = {Sep.},
pages = {1-5},
title = {PowerCyber: A remotely accessible testbed for Cyber Physical security of the Smart Grid},
year = {2016},
bdsk-url-1 = {https://doi.org/10.1109/ISGT.2016.7781277}}
@inproceedings{ahmed2016scada,
author = {Ahmed, Irfan and Roussev, Vassil and Johnson, William and Senthivel, Saranyan and Sudhakaran, Sneha},
booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop},
organization = {ACM},
pages = {1--9},
title = {A SCADA system testbed for cybersecurity and forensic research and pedagogy},
year = {2016}}
@inproceedings{mathur2016swat,
author = {Mathur, Aditya P and Tippenhauer, Nils Ole},
booktitle = {2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater)},
organization = {IEEE},
pages = {31--36},
title = {SWaT: a water treatment testbed for research and training on ICS security},
year = {2016}}
@inproceedings{tebekaemi2016designing,
author = {Tebekaemi, Eniye and Wijesekera, Duminda},
booktitle = {Proceedings of the First International Conference on Cyber-Technologies and Cyber-Systems},
pages = {41--49},
title = {Designing an IEC 61850 based power distribution substation simulation/emulation testbed for cyber-physical security studies},
year = {2016}}
@inproceedings{kavallieratos2019towards,
author = {Kavallieratos, Georgios and Katsikas, Sokratis K and Gkioulos, Vasileios},
booktitle = {Proceedings of the 5th on Cyber-Physical System Security Workshop},
organization = {ACM},
pages = {25--34},
title = {Towards a Cyber-Physical Range},
year = {2019}}
@inproceedings{morris2013industrial,
author = {Morris, Thomas H and Gao, Wei},
booktitle = {Proceedings of the 1st International Symposium on ICS \& SCADA Cyber Security Research},
pages = {22--29},
title = {Industrial control system cyber attacks},
year = {2013}}
@inproceedings{russo2018scenario,
author = {Russo, Enrico and Costa, Gabriele and Armando, Alessandro},
booktitle = {2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)},
organization = {IEEE},
pages = {1--4},
title = {Scenario Design and Validation for Next Generation Cyber Ranges},
year = {2018}}