-
2
-
-
7044219697
-
Critical infrastructure protection: Challenges and efforts to secure control systems
-
GAO-04-354, Tech. Rep
-
"Critical infrastructure protection: Challenges and efforts to secure control systems," GAO-04-354, Tech. Rep.
-
-
-
-
3
-
-
4243454421
-
-
University of Virginia, Tech. Rep, November
-
K. Knight, M. Elder, J. Flinn, and P. Marx, "Summaries of three critical infrastructure applications," University of Virginia, Tech. Rep., November 1997.
-
(1997)
Summaries of three critical infrastructure applications
-
-
Knight, K.1
Elder, M.2
Flinn, J.3
Marx, P.4
-
5
-
-
13444284418
-
Enervista
-
Newnes, 6, Online, Available
-
D. Bailey and E. Wright, Practical SCADA for Industry. Newnes, 2003. [6] "Enervista." [Online]. Available: http://www.geindustrial. com/multilin/enervista/launchpad/
-
(2003)
Practical SCADA for Industry
-
-
Bailey, D.1
Wright, E.2
-
6
-
-
40949158432
-
An undirected attack against critical infrastructure,
-
US-CERT, Tech. Rep
-
T. Nash, "An undirected attack against critical infrastructure, " US-CERT, Tech. Rep., 2005.
-
(2005)
-
-
Nash, T.1
-
8
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the slammer worm," in IEEE Security and Privacy, 2003.
-
(2003)
IEEE Security and Privacy
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
9
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Internet quarantine: Requirements for containing self-propagating code," in INFOCOM, 2003.
-
(2003)
INFOCOM
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
14
-
-
14944380936
-
The top speed of flash worms
-
S. Staniford, D. Moore, V. Paxson, and N. Weaver, "The top speed of flash worms," in WORM, 2004.
-
(2004)
WORM
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
15
-
-
16344396406
-
Monitoring and early warning for internet worms
-
C. Zou, L. Gao, W. Gong, and D. Towsley, "Monitoring and early warning for internet worms," in Proceedings of the 10th ACM conference on Computer and communication security, 2003.
-
(2003)
Proceedings of the 10th ACM conference on Computer and communication security
-
-
Zou, C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
16
-
-
14344253939
-
Network telescopes: Observing small or distant security events
-
D. Moore, "Network telescopes: Observing small or distant security events," in USENIX Security, 2002.
-
(2002)
USENIX Security
-
-
Moore, D.1
-
21
-
-
84890863223
-
A cooperative immunization system for an untrusting internet
-
K. G. Anagnostakis, M. B. Greenwald, S. Ioannidis, A. D. Keromytis, and D. Li, "A cooperative immunization system for an untrusting internet," ICON, 2003.
-
(2003)
ICON
-
-
Anagnostakis, K.G.1
Greenwald, M.B.2
Ioannidis, S.3
Keromytis, A.D.4
Li, D.5
-
22
-
-
34248355450
-
Robust reactions to potential day-zero worms through, cooperation and validation
-
K. G. Anagnostakis, S. Ioannidis, A. D. Keromytis, and M. B. Greenwald, "Robust reactions to potential day-zero worms through, cooperation and validation," in Information Security Conference (ISC), 2006.
-
(2006)
Information Security Conference (ISC)
-
-
Anagnostakis, K.G.1
Ioannidis, S.2
Keromytis, A.D.3
Greenwald, M.B.4
-
23
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham, "Vigilante: End-to-end containment of internet worms," in ACM Symposium on Operating Systems Principles (SOSP), 2005.
-
(2005)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
24
-
-
34247241130
-
Contagalert: Using contagion theory for adaptive, distributed alert propagation
-
M. Treaster, W. Conner, I. Gupta, and K. Narhstedt, "Contagalert: Using contagion theory for adaptive, distributed alert propagation," in IEEE International Symposium on Network Computing and Applications (NCA), 2006.
-
(2006)
IEEE International Symposium on Network Computing and Applications (NCA)
-
-
Treaster, M.1
Conner, W.2
Gupta, I.3
Narhstedt, K.4
-
25
-
-
4444322842
-
-
D. Lie, J. Mitchell, C. Thekkath, and M. Horowitz, Specifying and verifying hardware for tamper-resistant software, in In Proceedings of the 2003 IEEE Symposium, on Security and Privacy, May 2003.
-
D. Lie, J. Mitchell, C. Thekkath, and M. Horowitz, "Specifying and verifying hardware for tamper-resistant software," in In Proceedings of the 2003 IEEE Symposium, on Security and Privacy, May 2003.
-
-
-
-
26
-
-
40949155164
-
-
Trusted computing group, Online, Available
-
"Trusted computing group." [Online], Available: https://www.trustedcomputinggroup.org/groups/tpm/
-
-
-
-
28
-
-
40949101349
-
A nonparametric multichart cusum test for rapid detection of dos attacks in computer networks
-
H. Kim, B. Rozovskii, and A. Tartakovsky, "A nonparametric multichart cusum test for rapid detection of dos attacks in computer networks," International Journal of Computing and Information Sciences, vol. 2, 2004.
-
(2004)
International Journal of Computing and Information Sciences
, vol.2
-
-
Kim, H.1
Rozovskii, B.2
Tartakovsky, A.3
-
29
-
-
0002916530
-
Continuous inspection, schemes
-
E. S. Page, "Continuous inspection, schemes," Biometrika, vol. 1, pp. 100-115, 1954.
-
(1954)
Biometrika
, vol.1
, pp. 100-115
-
-
Page, E.S.1
|