-
1
-
-
1642307675
-
-
March
-
National Security Telecommunications Advisory Committee (NSTAC), Information Assurance Task Force, Electric Power Risk Assessment, March, 1997. Available at: www.ncs.gov/n5_hp/Reports/EPRA/electric.html.
-
(1997)
Electric Power Risk Assessment
-
-
-
2
-
-
0038226150
-
-
Technical Note, CMU/SEI-2001-TN-001, Survivable Systems Group, Software Engineering Institute, Carnegie Mellon University, March
-
A. Moore, R. Ellison, and R. Linger, Attack Modeling for Information Security and Survivability, Technical Note, CMU/SEI-2001-TN-001, Survivable Systems Group, Software Engineering Institute, Carnegie Mellon University, March, 2001.
-
(2001)
Attack Modeling for Information Security and Survivability
-
-
Moore, A.1
Ellison, R.2
Linger, R.3
-
3
-
-
15944389600
-
-
Technical Report, CMU/SEI-2001-TR-029, Survivable Systems Group, Software Engineering Institute, Carnegie Mellon University, March
-
R. Linger, and A. Moore, Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models, Technical Report, CMU/SEI-2001-TR-029, Survivable Systems Group, Software Engineering Institute, Carnegie Mellon University, March, 2001.
-
(2001)
Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models
-
-
Linger, R.1
Moore, A.2
-
4
-
-
1042267106
-
-
Sandia Report, SAND97-3010/1, January 1998, Sandia National Laboratories, Albuquerque, New Mexico, U.S.A.
-
L. Painton Swiler, C. Philips, and T. Gaylor, A Graph-Based Network-Vulnerability Analysis System, Sandia Report, SAND97-3010/1, January 1998, Sandia National Laboratories, Albuquerque, New Mexico, U.S.A., 1998.
-
(1998)
A Graph-based Network-vulnerability Analysis System
-
-
Swiler, L.P.1
Philips, C.2
Gaylor, T.3
-
5
-
-
1542323457
-
STATL: An attack language for state-based intrusion detection
-
Dept. of Computer Science, University of California, Santa Barbara, CA
-
S. Eckman, G. Vigna and R. Kemmerer, STATL: An Attack Language for State-based Intrusion Detection, technical report, Dept. of Computer Science, University of California, Santa Barbara, CA, 2000.
-
(2000)
Technical Report
-
-
Eckman, S.1
Vigna, G.2
Kemmerer, R.3
-
6
-
-
0003267366
-
A data mining framework for building intrusion detection models
-
San Anotnio, Texas, U.S.A.
-
W. Lee, S. Stolfo, J. Mok, and W. Kui, "A Data Mining Framework for Building Intrusion Detection Models," in Proceedings of the 7th USENIX Security Symposium, San Anotnio, Texas, U.S.A., 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Lee, W.1
Stolfo, S.2
Mok, J.3
Kui, W.4
-
8
-
-
15944412607
-
Keynote speech
-
part of the International Conference on Dependable Systems and Networks, DSN-2001, Goteborg, Sweden
-
R. Maxion, Keynote Speech, Information Survivability Workshop, part of the International Conference on Dependable Systems and Networks, DSN-2001, Goteborg, Sweden, 2001.
-
(2001)
Information Survivability Workshop
-
-
Maxion, R.1
-
10
-
-
15944375576
-
-
CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, ISW'98 Number 19, CERT-CC
-
J. Hale and A. Bose, Information Survivability in the electric Power Industry, CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, ISW'98 Number 19, CERT-CC 1998.
-
(1998)
Information Survivability in the Electric Power Industry
-
-
Hale, J.1
Bose, A.2
-
11
-
-
12244249374
-
Distributed agreement in a security application
-
28th International Symposium on Fault-Tolerant Computing, IEEE Computer Society Press, Munich, Germany, June 23 -25
-
A. W. Krings and M.A. McQueen, "Distributed Agreement in a Security Application," Digest of FastAbstracts: FTCS-28, 28th International Symposium on Fault-Tolerant Computing, IEEE Computer Society Press, Munich, Germany, June 23 -25, 1998, pp. 37-38.
-
(1998)
Digest of FastAbstracts: FTCS-28
, pp. 37-38
-
-
Krings, A.W.1
McQueen, M.A.2
-
12
-
-
12244250054
-
A two-layer approach to survivability of net-worked computing systems
-
L'Aquila, Italy, Aug 06 - Aug 12
-
A. W. Krings, W.S. Harrison, et.al., "A Two-Layer Approach to Survivability of Net-worked Computing Systems," Proc. International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet, L'Aquila, Italy, Aug 06 - Aug 12, pp. 1-12, 2001.
-
(2001)
Proc. International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet
, pp. 1-12
-
-
Krings, A.W.1
Harrison, W.S.2
-
13
-
-
15944364849
-
Protecting the grid from cyber attack, Part 1: Recognizing our vulnerabilities
-
Nov./Dec.
-
P. Oman, E. Schweitzer, and J. Roberts, "Protecting the Grid from Cyber Attack, Part 1: Recognizing Our Vulnerabilities," Utility Automation, Vol. 6(7), Nov./Dec. 2001, pp. 16-22.
-
(2001)
Utility Automation
, vol.6
, Issue.7
, pp. 16-22
-
-
Oman, P.1
Schweitzer, E.2
Roberts, J.3
-
14
-
-
1642265495
-
Protecting the grid from cyber attack, Part 2: Safeguarding IEDs, substations, and SCADA systems
-
Jan./Feb.
-
P. Oman, E. Schweitzer, and J. Roberts, "Protecting the Grid from Cyber Attack, Part 2: Safeguarding IEDs, Substations, and SCADA Systems," Utility Automation, Vol. 7(1), Jan./Feb. 2002, pp. 25-32.
-
(2002)
Utility Automation
, vol.7
, Issue.1
, pp. 25-32
-
-
Oman, P.1
Schweitzer, E.2
Roberts, J.3
-
15
-
-
15944396198
-
Critical energy infrastructure survivability, inherent limitations, obstacles and mitigation strategies
-
to appear
-
F. Sheldon, T. Potok, A. Krings, & P. Oman, "Critical Energy Infrastructure Survivability, Inherent Limitations, Obstacles and Mitigation Strategies," to appear in the International Journal of Power and Energy Systems, 2004.
-
(2004)
International Journal of Power and Energy Systems
-
-
Sheldon, F.1
Potok, T.2
Krings, A.3
Oman, P.4
|