-
1
-
-
27744449156
-
Ten principles for securing control systems
-
J. Abshier, Ten principles for securing control systems, Control, vol. 18(10), pp. 77-81, 2005.
-
(2005)
Control
, vol.18
, Issue.10
, pp. 77-81
-
-
Abshier, J.1
-
2
-
-
1642282656
-
Securing control systems: What you need to know
-
J. Abshier and J. Weiss, Securing control systems: What you need to know, Control, vol. 17(2), pp. 43-48, 2004.
-
(2004)
Control
, vol.17
, Issue.2
, pp. 43-48
-
-
Abshier, J.1
Weiss, J.2
-
4
-
-
85052559033
-
Cryptographic Protection of SCADA Communications; Part 1: Background, Policies and Test Plan
-
American Gas Association, No. 12 Part 1, Draft 5, Washington, DC
-
American Gas Association, Cryptographic Protection of SCADA Communications; Part 1: Background, Policies and Test Plan, AGA Report No. 12 (Part 1), Draft 5, Washington, DC (www.gtiservices.org/security/ AGA12Draft5r3.pdf), 2005.
-
(2005)
AGA Report
-
-
-
5
-
-
36249015425
-
Cryptographic Protection of SCADA Communications; Part 2: Retrofit Link Encryption for Asynchronous Serial Communications
-
American Gas Association, No. 12 Part 2, Draft, Washington, DC
-
American Gas Association, Cryptographic Protection of SCADA Communications; Part 2: Retrofit Link Encryption for Asynchronous Serial Communications, AGA Report No. 12 (Part 2), Draft, Washington, DC (www.gtiservices.org/security/aga-12p2-draft-0512.pdf), 2005.
-
(2005)
AGA Report
-
-
-
6
-
-
33745471659
-
Next generation SCADA security: Best practices and client puzzles
-
C. Bowen III, T. Buennemeyer and R. Thomas, Next generation SCADA security: Best practices and client puzzles, Proceedings of the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop pp. 426-427, 2005.
-
(2005)
Proceedings of the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop
, pp. 426-427
-
-
Bowen III, C.1
Buennemeyer, T.2
Thomas, R.3
-
7
-
-
20844463674
-
Security in SCADA systems: How to handle the growing menace to process automation
-
T. Brown, Security in SCADA systems: How to handle the growing menace to process automation, Computing and Control Engineering Journal, vol. 16(3), pp. 42-47, 2005.
-
(2005)
Computing and Control Engineering Journal
, vol.16
, Issue.3
, pp. 42-47
-
-
Brown, T.1
-
8
-
-
33847264121
-
The myths and facts behind cyber security risks for industrial control systems
-
presented at the
-
E. Byres and J. Lowe, The myths and facts behind cyber security risks for industrial control systems, presented at the VDE Congress, 2004.
-
(2004)
VDE Congress
-
-
Byres, E.1
Lowe, J.2
-
9
-
-
36248931003
-
-
The White House, Washington, DC
-
W. Clinton, Presidential Decision Directive 63, The White House, Washington, DC (www.fas.org/irp/offdocs/pdd/pdd-63.htm), 1998.
-
(1998)
Presidential Decision Directive
, vol.63
-
-
Clinton, W.1
-
11
-
-
34250215846
-
SCADA systems: Vulnerabilities and remediation
-
J. Fernandez and A. Fernandez, SCADA systems: Vulnerabilities and remediation, Journal of Computing Sciences in Colleges, vol. 20(4), pp. 160-168, 2005.
-
(2005)
Journal of Computing Sciences in Colleges
, vol.20
, Issue.4
, pp. 160-168
-
-
Fernandez, J.1
Fernandez, A.2
-
12
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol. 4(3), pp. 224-274, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
13
-
-
0039675763
-
SCADA communication techniques and standards
-
D. Gaushell and W. Block, SCADA communication techniques and standards, Computer Applications in Power, vol. 6(3), pp. 45-50, 1993.
-
(1993)
Computer Applications in Power
, vol.6
, Issue.3
, pp. 45-50
-
-
Gaushell, D.1
Block, W.2
-
14
-
-
31944451961
-
Security of critical control systems sparks concern
-
D. Geer, Security of critical control systems sparks concern, IEEE Computer, vol. 39(1), pp. 20-23, 2006.
-
(2006)
IEEE Computer
, vol.39
, Issue.1
, pp. 20-23
-
-
Geer, D.1
-
16
-
-
26044448626
-
The MILS architecture for a secure global information grid
-
W. Harrison, N. Hanebutte, P. Oman and J. Alves-Foss, The MILS architecture for a secure global information grid, CrossTalk: The Journal of Defense Software Engineering, vol. 18(10), pp. 20-24, 2005.
-
(2005)
CrossTalk: The Journal of Defense Software Engineering
, vol.18
, Issue.10
, pp. 20-24
-
-
Harrison, W.1
Hanebutte, N.2
Oman, P.3
Alves-Foss, J.4
-
17
-
-
36248989664
-
-
Instrumentation Systems and Automation Society, Security Technologies for Manufacturing and Control Systems (ANSI/ISA-TR99.00.01-2004), Research Triangle Park, North Carolina, 2004.
-
Instrumentation Systems and Automation Society, Security Technologies for Manufacturing and Control Systems (ANSI/ISA-TR99.00.01-2004), Research Triangle Park, North Carolina, 2004.
-
-
-
-
18
-
-
36248966509
-
-
Instrumentation Systems and Automation Society, Integrating Electronic Security into the Manufacturing and Control Systems Environment (ANSI/ ISA-TR99.00.02-2004), Research Triangle Park, North Carolina, 2004.
-
Instrumentation Systems and Automation Society, Integrating Electronic Security into the Manufacturing and Control Systems Environment (ANSI/ ISA-TR99.00.02-2004), Research Triangle Park, North Carolina, 2004.
-
-
-
-
19
-
-
33644653529
-
System threats and vulnerabilities (power system protection)
-
T. Kropp, System threats and vulnerabilities (power system protection), IEEE Power and Energy, vol. 4(2), pp. 46-50, 2006.
-
(2006)
IEEE Power and Energy
, vol.4
, Issue.2
, pp. 46-50
-
-
Kropp, T.1
-
21
-
-
36248933699
-
-
LynuxWorks (www.lynuxworks.com).
-
LynuxWorks
-
-
-
22
-
-
0037377597
-
SCADA and IP: Is network convergence really here?
-
R. McClanahan, SCADA and IP: Is network convergence really here? IEEE Industry Applications, vol. 9(2), pp. 29-36, 2003.
-
(2003)
IEEE Industry Applications
, vol.9
, Issue.2
, pp. 29-36
-
-
McClanahan, R.1
-
23
-
-
27644559364
-
Trends in process control systems security
-
A. Miller, Trends in process control systems security, IEEE Security and Privacy, vol. 3(5), pp. 57-60, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.5
, pp. 57-60
-
-
Miller, A.1
-
25
-
-
36248933698
-
Supervisory Control and Data Acquisition (SCADA) Systems
-
National Communications System, Arlington, Virginia
-
National Communications System, Supervisory Control and Data Acquisition (SCADA) Systems, Technical Bulletin 04-1, Arlington, Virginia, 2004.
-
(2004)
Technical Bulletin
, vol.4 -1
-
-
-
26
-
-
36248938653
-
-
Office of Energy Assurance, 21 Steps to Improve Cyber Security of SCADA Networks, U.S. Department of Energy
-
Office of Energy Assurance, 21 Steps to Improve Cyber Security of SCADA Networks, U.S. Department of Energy, Washington, DC, 2002.
-
(2002)
-
-
Washington, D.C.1
-
29
-
-
36248937170
-
-
Ph.D. Dissertation, Department of Computer Engineering and Computer Science, University of Louisville, Louisville, Kentucky
-
S. Patel, Secure Internet-Based Communication Protocol for SCADA Networks, Ph.D. Dissertation, Department of Computer Engineering and Computer Science, University of Louisville, Louisville, Kentucky, 2006.
-
(2006)
Secure Internet-Based Communication Protocol for SCADA Networks
-
-
Patel, S.1
-
30
-
-
0003994024
-
Critical Foundations: Protecting America's Infrastructures
-
President's Commission on Critical Infrastructure Protection, Report Number 040-000-00699-1, United States Government Printing Office, Washington, DC
-
President's Commission on Critical Infrastructure Protection, Critical Foundations: Protecting America's Infrastructures, Report Number 040-000-00699-1, United States Government Printing Office, Washington, DC, 1997.
-
(1997)
-
-
-
32
-
-
36248947246
-
-
W. Rush and A. Shah, Impact of Information Security Systems on Real-Time Process Control, Final Report, NIST Project SB1341-02-C-081, Gas Technology Institute, Des Plaines, Illinois (www.isd.mel.nist.gov/ projects/processcontrol/testbed/GTI_Final April2005.pdf), 2005.
-
W. Rush and A. Shah, Impact of Information Security Systems on Real-Time Process Control, Final Report, NIST Project SB1341-02-C-081, Gas Technology Institute, Des Plaines, Illinois (www.isd.mel.nist.gov/ projects/processcontrol/testbed/GTI_Final April2005.pdf), 2005.
-
-
-
-
33
-
-
35048887882
-
-
National Institute of Standards and Technology, Gaithersburg, Maryland
-
K. Stouffer, J. Falco and K. Kent, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security - Initial Public Draft, National Institute of Standards and Technology, Gaithersburg, Maryland, 2006.
-
(2006)
Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security - Initial Public Draft
-
-
Stouffer, K.1
Falco, J.2
Kent, K.3
-
36
-
-
33750391626
-
Low-latency cryptographic protection for SCADA communications
-
Applied Cryptography and Network Security, M. Jakobsson, M. Yung and J. Zhou Eds, Springer, Berlin-Heidelberg, Germany, pp
-
A. Wright, J. Kinast and J. McCarty, Low-latency cryptographic protection for SCADA communications, in Applied Cryptography and Network Security (LNCS 3089), M. Jakobsson, M. Yung and J. Zhou (Eds.), Springer, Berlin-Heidelberg, Germany, pp. 263-277, 2004.
-
(2004)
LNCS
, vol.3089
, pp. 263-277
-
-
Wright, A.1
Kinast, J.2
McCarty, J.3
|