|
Cite as: Kush,N., Ahmed, E., Branagan,M. and Foo, E. (2014). Poisoned GOOSE: Exploiting the GOOSE Protocol. In Proc. Twelfth Australasian Information Security Conference (AISC 2014) Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 17-22 |
(from crpit.com) (local if available) |