메뉴 건너뛰기




Volumn , Issue , 2007, Pages 442-449

Attack containment framework for large-scale critical infrastructures

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION STRUCTURE; LARGE-SCALE CRITICAL INFRASTRUCTURES;

EID: 40949122089     PISSN: 10952055     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCCN.2007.4317859     Document Type: Conference Paper
Times cited : (1)

References (30)
  • 2
    • 7044219697 scopus 로고    scopus 로고
    • Critical infrastructure protection: Challenges and efforts to secure control systems
    • GAO-04-354, Tech. Rep
    • "Critical infrastructure protection: Challenges and efforts to secure control systems," GAO-04-354, Tech. Rep.
  • 5
    • 13444284418 scopus 로고    scopus 로고
    • Enervista
    • Newnes, 6, Online, Available
    • D. Bailey and E. Wright, Practical SCADA for Industry. Newnes, 2003. [6] "Enervista." [Online]. Available: http://www.geindustrial. com/multilin/enervista/launchpad/
    • (2003) Practical SCADA for Industry
    • Bailey, D.1    Wright, E.2
  • 6
    • 40949158432 scopus 로고    scopus 로고
    • An undirected attack against critical infrastructure,
    • US-CERT, Tech. Rep
    • T. Nash, "An undirected attack against critical infrastructure, " US-CERT, Tech. Rep., 2005.
    • (2005)
    • Nash, T.1
  • 9
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self-propagating code
    • D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Internet quarantine: Requirements for containing self-propagating code," in INFOCOM, 2003.
    • (2003) INFOCOM
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 13
    • 0042474227 scopus 로고    scopus 로고
    • Modeling the spread of active worms
    • Z. Chen, L. Gao, and K. Kwiat, "Modeling the spread of active worms," in IEEE INFOCOM, 2003.
    • (2003) IEEE INFOCOM
    • Chen, Z.1    Gao, L.2    Kwiat, K.3
  • 16
    • 14344253939 scopus 로고    scopus 로고
    • Network telescopes: Observing small or distant security events
    • D. Moore, "Network telescopes: Observing small or distant security events," in USENIX Security, 2002.
    • (2002) USENIX Security
    • Moore, D.1
  • 25
    • 4444322842 scopus 로고    scopus 로고
    • D. Lie, J. Mitchell, C. Thekkath, and M. Horowitz, Specifying and verifying hardware for tamper-resistant software, in In Proceedings of the 2003 IEEE Symposium, on Security and Privacy, May 2003.
    • D. Lie, J. Mitchell, C. Thekkath, and M. Horowitz, "Specifying and verifying hardware for tamper-resistant software," in In Proceedings of the 2003 IEEE Symposium, on Security and Privacy, May 2003.
  • 26
    • 40949155164 scopus 로고    scopus 로고
    • Trusted computing group, Online, Available
    • "Trusted computing group." [Online], Available: https://www.trustedcomputinggroup.org/groups/tpm/
  • 29
    • 0002916530 scopus 로고
    • Continuous inspection, schemes
    • E. S. Page, "Continuous inspection, schemes," Biometrika, vol. 1, pp. 100-115, 1954.
    • (1954) Biometrika , vol.1 , pp. 100-115
    • Page, E.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.