메뉴 건너뛰기




Volumn , Issue , 2006, Pages 127-134

Security aspects of SCADA and corporate network interconnection: An overview

Author keywords

[No Author keywords available]

Indexed keywords

INDUSTRIAL APPLICATIONS; INTERCONNECTION NETWORKS; INTRANETS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SCADA SYSTEMS;

EID: 34848831147     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DEPCOS-RELCOMEX.2006.46     Document Type: Conference Paper
Times cited : (35)

References (11)
  • 1
    • 34848889797 scopus 로고    scopus 로고
    • W.F. Rush, J.A. Kinast, How to protect SCADA Systems from Cyber-Attacks: Recognizing Risks is the First Step in Protecting SCADA Systems, available on http://www.gasindustries.com/ articles/july03b.htm, in October, 2005.
    • W.F. Rush, J.A. Kinast, How to protect SCADA Systems from Cyber-Attacks: Recognizing Risks is the First Step in Protecting SCADA Systems, available on http://www.gasindustries.com/ articles/july03b.htm, in October, 2005.
  • 2
    • 34848909679 scopus 로고    scopus 로고
    • SCADA Security - Why the IT Security Approach Fails
    • May
    • A. Tilch, M. Ames, SCADA Security - Why the IT Security Approach Fails, AusCERT Conference 2004, May 2004.
    • (2004) AusCERT Conference
    • Tilch, A.1    Ames, M.2
  • 3
    • 0346236349 scopus 로고    scopus 로고
    • Art and Science, Addison-Wesley-Longman, June
    • M. Bishop, Computer Security: Art and Science, Addison-Wesley-Longman, June 2004.
    • (2004) Computer Security
    • Bishop, M.1
  • 4
    • 34848908108 scopus 로고    scopus 로고
    • N. Weaver, W. Paxson, S. Staniford, R. Cunnigham, A Taxonomy of Computer Worms, available on http://www.es.berkeley.edu/~nweaver/papers/taxonomy,pdf, in October, 2005.
    • N. Weaver, W. Paxson, S. Staniford, R. Cunnigham, A Taxonomy of Computer Worms, available on http://www.es.berkeley.edu/~nweaver/papers/taxonomy,pdf, in October, 2005.
  • 5
    • 34848880599 scopus 로고    scopus 로고
    • Network Security: Private Communication in a Public World, Prentice Hall, 2nd. Edition, 2002
    • C. Kaufman, R. Perlman, M. Speciner, Network Security: Private Communication in a Public World, Prentice Hall, 2nd. Edition, 2002
    • Kaufman, C.1    Perlman, R.2    Speciner, M.3
  • 10
    • 34848915568 scopus 로고    scopus 로고
    • J. Pollet, Safety Considerations for SCADA/DCS Cyber Attacks, available on http: //www.isa.org/InTechTemplate.cfm?Section=Departments4&template=/ ContentManagement/ ContentDisplay.cfm&ContentID=31538, in October, 2005.
    • J. Pollet, Safety Considerations for SCADA/DCS Cyber Attacks, available on http: //www.isa.org/InTechTemplate.cfm?Section=Departments4&template=/ ContentManagement/ ContentDisplay.cfm&ContentID=31538, in October, 2005.
  • 11
    • 21644440888 scopus 로고    scopus 로고
    • Security for Industrial Communication Systems
    • June
    • D. Dzung, M. Naedele, T.P. Von Hoff, M. Crevatin, Security for Industrial Communication Systems, Proc. IEEE, Vol. 93, No. 6, pp. 1152-1177, June, 2005.
    • (2005) Proc. IEEE , vol.93 , Issue.6 , pp. 1152-1177
    • Dzung, D.1    Naedele, M.2    Von Hoff, T.P.3    Crevatin, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.