메뉴 건너뛰기




Volumn , Issue , 2004, Pages 342-349

Analyzing the security and survivability of real-time control systems

Author keywords

Critical Infrastructure Protection; Cyber Attack; Cyber Vulnerabilities; SCADA Systems; Security Analysis

Indexed keywords

ALGORITHMS; CONFORMAL MAPPING; CONTROL SYSTEMS; CYBERNETICS; GRAPH THEORY; LARGE SCALE SYSTEMS; MATHEMATICAL MODELS; OPTIMIZATION; SCADA SYSTEMS; SCHEDULING; SECURITY OF DATA; TELECOMMUNICATION NETWORKS;

EID: 15944405288     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (18)

References (15)
  • 1
    • 1642307675 scopus 로고    scopus 로고
    • March
    • National Security Telecommunications Advisory Committee (NSTAC), Information Assurance Task Force, Electric Power Risk Assessment, March, 1997. Available at: www.ncs.gov/n5_hp/Reports/EPRA/electric.html.
    • (1997) Electric Power Risk Assessment
  • 2
    • 0038226150 scopus 로고    scopus 로고
    • Technical Note, CMU/SEI-2001-TN-001, Survivable Systems Group, Software Engineering Institute, Carnegie Mellon University, March
    • A. Moore, R. Ellison, and R. Linger, Attack Modeling for Information Security and Survivability, Technical Note, CMU/SEI-2001-TN-001, Survivable Systems Group, Software Engineering Institute, Carnegie Mellon University, March, 2001.
    • (2001) Attack Modeling for Information Security and Survivability
    • Moore, A.1    Ellison, R.2    Linger, R.3
  • 4
  • 5
    • 1542323457 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • Dept. of Computer Science, University of California, Santa Barbara, CA
    • S. Eckman, G. Vigna and R. Kemmerer, STATL: An Attack Language for State-based Intrusion Detection, technical report, Dept. of Computer Science, University of California, Santa Barbara, CA, 2000.
    • (2000) Technical Report
    • Eckman, S.1    Vigna, G.2    Kemmerer, R.3
  • 8
    • 15944412607 scopus 로고    scopus 로고
    • Keynote speech
    • part of the International Conference on Dependable Systems and Networks, DSN-2001, Goteborg, Sweden
    • R. Maxion, Keynote Speech, Information Survivability Workshop, part of the International Conference on Dependable Systems and Networks, DSN-2001, Goteborg, Sweden, 2001.
    • (2001) Information Survivability Workshop
    • Maxion, R.1
  • 10
    • 15944375576 scopus 로고    scopus 로고
    • CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, ISW'98 Number 19, CERT-CC
    • J. Hale and A. Bose, Information Survivability in the electric Power Industry, CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, ISW'98 Number 19, CERT-CC 1998.
    • (1998) Information Survivability in the Electric Power Industry
    • Hale, J.1    Bose, A.2
  • 11
    • 12244249374 scopus 로고    scopus 로고
    • Distributed agreement in a security application
    • 28th International Symposium on Fault-Tolerant Computing, IEEE Computer Society Press, Munich, Germany, June 23 -25
    • A. W. Krings and M.A. McQueen, "Distributed Agreement in a Security Application," Digest of FastAbstracts: FTCS-28, 28th International Symposium on Fault-Tolerant Computing, IEEE Computer Society Press, Munich, Germany, June 23 -25, 1998, pp. 37-38.
    • (1998) Digest of FastAbstracts: FTCS-28 , pp. 37-38
    • Krings, A.W.1    McQueen, M.A.2
  • 13
    • 15944364849 scopus 로고    scopus 로고
    • Protecting the grid from cyber attack, Part 1: Recognizing our vulnerabilities
    • Nov./Dec.
    • P. Oman, E. Schweitzer, and J. Roberts, "Protecting the Grid from Cyber Attack, Part 1: Recognizing Our Vulnerabilities," Utility Automation, Vol. 6(7), Nov./Dec. 2001, pp. 16-22.
    • (2001) Utility Automation , vol.6 , Issue.7 , pp. 16-22
    • Oman, P.1    Schweitzer, E.2    Roberts, J.3
  • 14
    • 1642265495 scopus 로고    scopus 로고
    • Protecting the grid from cyber attack, Part 2: Safeguarding IEDs, substations, and SCADA systems
    • Jan./Feb.
    • P. Oman, E. Schweitzer, and J. Roberts, "Protecting the Grid from Cyber Attack, Part 2: Safeguarding IEDs, Substations, and SCADA Systems," Utility Automation, Vol. 7(1), Jan./Feb. 2002, pp. 25-32.
    • (2002) Utility Automation , vol.7 , Issue.1 , pp. 25-32
    • Oman, P.1    Schweitzer, E.2    Roberts, J.3
  • 15
    • 15944396198 scopus 로고    scopus 로고
    • Critical energy infrastructure survivability, inherent limitations, obstacles and mitigation strategies
    • to appear
    • F. Sheldon, T. Potok, A. Krings, & P. Oman, "Critical Energy Infrastructure Survivability, Inherent Limitations, Obstacles and Mitigation Strategies," to appear in the International Journal of Power and Energy Systems, 2004.
    • (2004) International Journal of Power and Energy Systems
    • Sheldon, F.1    Potok, T.2    Krings, A.3    Oman, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.