-
1
-
-
85052559033
-
Cryptographic Protection of SCADA Communications; Part 1: Background, Policies and Test Plan
-
American Gas Association, No. 12 Part 1, Draft 5, Washington, DC
-
American Gas Association, Cryptographic Protection of SCADA Communications; Part 1: Background, Policies and Test Plan, AGA Report No. 12 (Part 1), Draft 5, Washington, DC (www.gtiservices.org/security/ AGA12Draft5r3.pdf), 2005.
-
(2005)
AGA Report
-
-
-
2
-
-
36249015425
-
Cryptographic Protection of SCADA Communications; Part 2: Retrofit Link Encryption for Asynchronous Serial Communications
-
American Gas Association, No. 12 Part 2, Draft, Washington, DC
-
American Gas Association, Cryptographic Protection of SCADA Communications; Part 2: Retrofit Link Encryption for Asynchronous Serial Communications, AGA Report No. 12 (Part 2), Draft, Washington, DC (www.gtiservices.org/security/aga-12p2-draft-0512.pdf), 2005.
-
(2005)
AGA Report
-
-
-
3
-
-
34047209277
-
-
American Petroleum Institute, Washington, DC
-
American Petroleum Institute, API 1164: SCADA Security, Washington, DC, 2004.
-
(2004)
API 1164: SCADA Security
-
-
-
4
-
-
84864173616
-
A reference model for control and automation systems in electric power
-
Technical Report SAND2005-1000C, Sandia National Laboratories, Albuquerque, New Mexico
-
M. Berg and J. Stamp, A reference model for control and automation systems in electric power, Technical Report SAND2005-1000C, Sandia National Laboratories, Albuquerque, New Mexico, 2005.
-
(2005)
-
-
Berg, M.1
Stamp, J.2
-
5
-
-
34047192955
-
-
British Columbia Institute of Technology, National Infrastructure Security Co-ordination Centre, London, United Kingdom
-
British Columbia Institute of Technology, Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks, National Infrastructure Security Co-ordination Centre, London, United Kingdom, 2005.
-
(2005)
Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks
-
-
-
6
-
-
36248946167
-
-
E. Byres, J. Carter, A. Elramly and D. Ho.man, Worlds in collision: Ethernet on the plant floor, Proceedings of the ISA Emerging Technologies Conference, 2002.
-
E. Byres, J. Carter, A. Elramly and D. Ho.man, Worlds in collision: Ethernet on the plant floor, Proceedings of the ISA Emerging Technologies Conference, 2002.
-
-
-
-
9
-
-
0025508369
-
Network security via private key certificates
-
D. Davis and R. Swick, Network security via private key certificates, Operating Systems Review, vol. 24, pp. 64-67, 1990.
-
(1990)
Operating Systems Review
, vol.24
, pp. 64-67
-
-
Davis, D.1
Swick, R.2
-
10
-
-
36248992375
-
-
J. Graham and S. Patel, Security considerations in SCADA communication protocols, Technical Report TR-ISRL-04-01, Intelligent System Research Laboratory, Department of Computer Engineering and Computer Science, University of Louisville, Louisville, Kentucky, 2004.
-
J. Graham and S. Patel, Security considerations in SCADA communication protocols, Technical Report TR-ISRL-04-01, Intelligent System Research Laboratory, Department of Computer Engineering and Computer Science, University of Louisville, Louisville, Kentucky, 2004.
-
-
-
-
11
-
-
36249008014
-
-
Instrumentation Systems and Automation Society, Security Technologies for Manufacturing and Control Systems (ANSI/ISA-TR99.00.01-2004), Research Triangle Park, North Carolina, 2004.
-
Instrumentation Systems and Automation Society, Security Technologies for Manufacturing and Control Systems (ANSI/ISA-TR99.00.01-2004), Research Triangle Park, North Carolina, 2004.
-
-
-
-
12
-
-
36248999413
-
-
Instrumentation Systems and Automation Society, Integrating Electronic Security into the Manufacturing and Control Systems Environment (ANSI/ ISA-TR99.00.02-2004), Research Triangle Park, North Carolina, 2004.
-
Instrumentation Systems and Automation Society, Integrating Electronic Security into the Manufacturing and Control Systems Environment (ANSI/ ISA-TR99.00.02-2004), Research Triangle Park, North Carolina, 2004.
-
-
-
-
13
-
-
33750422800
-
Framework for SCADA security policy
-
Technical Report SAND2005-1002C, Sandia National Laboratories, Albuquerque, New Mexico
-
D. Kilman and J. Stamp, Framework for SCADA security policy, Technical Report SAND2005-1002C, Sandia National Laboratories, Albuquerque, New Mexico, 2005.
-
(2005)
-
-
Kilman, D.1
Stamp, J.2
-
14
-
-
34047234442
-
An architecture for SCADA network forensics
-
M. Olivier and S. Shenoi Eds, Springer, New York, pp
-
T. Kilpatrick, J. Gonzalez, R. Chandia, M. Papa and S. Shenoi, An architecture for SCADA network forensics, in Advances in Digital Forensics II, M. Olivier and S. Shenoi (Eds.), Springer, New York, pp. 273-285, 2006.
-
(2006)
Advances in Digital Forensics II
, pp. 273-285
-
-
Kilpatrick, T.1
Gonzalez, J.2
Chandia, R.3
Papa, M.4
Shenoi, S.5
-
15
-
-
10644222357
-
-
California
-
K. Mandia, C. Prosise and M. Pepe, Incident Response and Computer Forensics, McGraw-Hill/Osborne, Emeryville, California, 2003.
-
(2003)
Incident Response and Computer Forensics, McGraw-Hill/Osborne, Emeryville
-
-
Mandia, K.1
Prosise, C.2
Pepe, M.3
-
17
-
-
36249020377
-
-
National Institute of Standards and Technology, System Protection Profile - Industrial Control Systems v1.0, Gaithersburg, Maryland, 2004.
-
National Institute of Standards and Technology, System Protection Profile - Industrial Control Systems v1.0, Gaithersburg, Maryland, 2004.
-
-
-
-
18
-
-
33845546517
-
Integrating digital forensics in network architectures
-
M. Pollitt and S. Shenoi Eds, Springer, New York, pp
-
K. Shanmugasundaram, H. Bronnimann and N. Memon, Integrating digital forensics in network architectures, in Advances in Digital Forensics M. Pollitt and S. Shenoi (Eds.), Springer, New York, pp. 127-140, 2005.
-
(2005)
Advances in Digital Forensics
, pp. 127-140
-
-
Shanmugasundaram, K.1
Bronnimann, H.2
Memon, N.3
-
19
-
-
24344492645
-
Fornet: A distributed forensics system
-
K. Shanmugasundaram, N. Memon, A. Savant and H. Bronnimann, Fornet: A distributed forensics system, Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, 2003.
-
(2003)
Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security
-
-
Shanmugasundaram, K.1
Memon, N.2
Savant, A.3
Bronnimann, H.4
-
20
-
-
36248930469
-
-
M. Smith and M. Copps, DNP3 V3.00 Data Object Library Version 0.02, DNP Users Group, Pasadena, California, 1993
-
M. Smith and M. Copps, DNP3 V3.00 Data Object Library Version 0.02, DNP Users Group, Pasadena, California, 1993.
-
-
-
-
21
-
-
35048887882
-
-
National Institute of Standards and Technology, Gaithersburg, Maryland
-
K. Stouffer, J. Falco and K. Kent, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security - Initial Public Draft, National Institute of Standards and Technology, Gaithersburg, Maryland, 2006.
-
(2006)
Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security - Initial Public Draft
-
-
Stouffer, K.1
Falco, J.2
Kent, K.3
|