-
1
-
-
42549111888
-
-
National Strategy for the Physical Protection of Critical Infrastructures and Key Assets.Washington D.C.,Feb 2003
-
"National Strategy for the Physical Protection of Critical Infrastructures and Key Assets".Washington D.C.,Feb 2003, http://www.dhs.gov/interweb/assetlibrary/Physical_S trategy.pdf
-
-
-
-
2
-
-
42549164843
-
-
Gamez, D., Nadjm-Tehrani. S., Bigham, J., Balducelli, C., Burbeck. K., and Chyssler, T., Chapter 19 Safeguarding Critical Infrastructures. Edited by Professor Hassan B. Diab & Professor Albert Y. Zomaya. Dependable Computing Systems: Paradigms, Performance Issues, and Applications, Wiley STM. 2000.
-
Gamez, D., Nadjm-Tehrani. S., Bigham, J., Balducelli, C., Burbeck. K., and Chyssler, T., "Chapter 19 Safeguarding Critical Infrastructures". Edited by Professor Hassan B. Diab & Professor Albert Y. Zomaya. "Dependable Computing Systems: Paradigms, Performance Issues, and Applications", Wiley STM. 2000.
-
-
-
-
4
-
-
42549120911
-
-
The National Strategy to Secure Cyberspace, Washington D.C.,February,2003
-
"The National Strategy to Secure Cyberspace", Washington D.C.,February,2003,http://www.dhs.gov/interweb/assetlibrary/ National_Cyberspace_Strategy.pdf.
-
-
-
-
5
-
-
12344300052
-
-
Washington D.C, January. 2002
-
"Homeland Security Act of 2002". Washington D.C., January. 2002, http://www.dhs.gov/interweb/assetlibrary/hr_5005_enr.pdf.
-
Homeland Security Act of 2002
-
-
-
6
-
-
42549090817
-
-
IT-Grundschutz Manual 2004, http://www.bsi.bund.de/english/gshb/index. htm.
-
(2004)
Manual
-
-
IT-Grundschutz1
-
7
-
-
1542697911
-
IT Security for Industrial Control Systems
-
February
-
Falco, J., Stouffer, K., Wavering, A., and Proctor, F., "IT Security for Industrial Control Systems", NISTIR 6859, February 2002.
-
(2002)
NISTIR
, vol.6859
-
-
Falco, J.1
Stouffer, K.2
Wavering, A.3
Proctor, F.4
-
9
-
-
33847253058
-
Standardizing Industrial IT Security - A first Look at the IEC Approach
-
Sept
-
Naedele, M., "Standardizing Industrial IT Security - A first Look at the IEC Approach", Emerging Technologies and Factory Automation, 2005, ETFA 2005, 10th IEEE Conference on, Vol. 2, 19-22, Sept. 2005, pp. 857-863.
-
(2005)
Emerging Technologies and Factory Automation, 2005, ETFA 2005, 10th IEEE Conference on
, vol.2
, Issue.19-22
, pp. 857-863
-
-
Naedele, M.1
-
10
-
-
33847264121
-
The Myths and Facts behind Cyber Security Risks for Industrial Control Systems
-
VDE, Berlin, October
-
Byres, E. and Lowe. J., "The Myths and Facts behind Cyber Security Risks for Industrial Control Systems", VDE 2004 Congress. VDE, Berlin, October, 2004.
-
(2004)
VDE 2004 Congress
-
-
Byres, E.1
Lowe, J.2
-
11
-
-
21644440888
-
Security for Industrial Communications Systems
-
June
-
Dzung, D., Naedele. M., Von Hoff, T.P., and Crevatin, M., "Security for Industrial Communications Systems", Proceedings of the IEEE, Vol.93, No. 6, June 2005.
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.6
-
-
Dzung, D.1
Naedele, M.2
Von Hoff, T.P.3
Crevatin, M.4
-
12
-
-
42549090335
-
Industrial Information System Security - Part I, Part2, and Part 3
-
ABB Review
-
Naedele, M., and Dzung, D., "Industrial Information System Security - Part I, Part2, and Part 3", ABB Review 2005.
-
(2005)
-
-
Naedele, M.1
Dzung, D.2
-
13
-
-
42549166280
-
The role of Intrusion Detection Systems
-
September/October
-
McHugh, J., Christie, A., and Allen, J., "The role of Intrusion Detection Systems", IEEE Software, September/October/2000.
-
(2000)
IEEE Software
-
-
McHugh, J.1
Christie, A.2
Allen, J.3
-
14
-
-
42549093334
-
-
Hale. J., and Bose, A.,Information Survivability in the Electric Utility Industry, ISW'98, http://www.cert.org/research/isw/isw98/ all_the_papers/no19.html.
-
Hale. J., and Bose, A.,"Information Survivability in the Electric Utility Industry", ISW'98, http://www.cert.org/research/isw/isw98/ all_the_papers/no19.html.
-
-
-
-
15
-
-
42549094738
-
-
Goetz, E., Cyber Security of the Electric Power Industry, Institute for Security Technology Studies at Dartmouth College, December, 2002 [NERC-CIP,2005] http:/Avww.nerc.com/~filez/standards/Reliability_Standards. html#Critical_Infrastructure_Protection.
-
Goetz, E., "Cyber Security of the Electric Power Industry", Institute for Security Technology Studies at Dartmouth College", December, 2002 [NERC-CIP,2005] http:/Avww.nerc.com/~filez/standards/Reliability_Standards. html#Critical_Infrastructure_Protection.
-
-
-
-
16
-
-
1642265495
-
Protecting the Grid From Cyber Attack, Part 11: Safeguarding IEDS, Substations and SCADA Systems, Utility
-
Oman. P., Schweitzer, E., and Roberts, J., "Protecting the Grid From Cyber Attack, Part 11: Safeguarding IEDS, Substations and SCADA Systems", Utility Automation, 7(1), 2002, pp. 25-32.
-
(2002)
Automation
, vol.7
, Issue.1
, pp. 25-32
-
-
Oman, P.1
Schweitzer, E.2
Roberts, J.3
-
17
-
-
0003516333
-
-
Chalmers University of Technology, Göteborg, Sweden, March
-
Axelsson, S., "Intrusion Detection Systems: A Survey and Taxonomy", Chalmers University of Technology, Göteborg, Sweden, March/2000.
-
(2000)
Intrusion Detection Systems: A Survey and Taxonomy
-
-
Axelsson, S.1
-
18
-
-
0012127229
-
Intrusion and Intrusion Detection
-
Aug, DOI 10.1007/s 102070100001, URL
-
McHugh, J., "Intrusion and Intrusion Detection", International Journal of Information Security, Volume 1, Issue 1, Aug 2001, Pages 14-35, DOI 10.1007/s 102070100001, URL http://dx.doi.org/10.1007/s102070100001.
-
(2001)
International Journal of Information Security
, vol.1
, Issue.1
, pp. 14-35
-
-
McHugh, J.1
-
19
-
-
0038223829
-
-
NIST Special Publication on Intrusion Detection System
-
Bace, R., and Mell, P. "Intrusion Detection Systems", NIST Special Publication on Intrusion Detection System,http://csrc.nist.gov/ publication/nistpubs/800-31/sp800-31.pdf.
-
Intrusion Detection Systems
-
-
Bace, R.1
Mell, P.2
-
20
-
-
1642408137
-
Survey of Intrusion Detection Research
-
Technical Report 02-04, Chalmers University of Technology, Göteborg, Sweeden
-
Lundin, E., and Jonson, E., "Survey of Intrusion Detection Research", Technical Report 02-04, Chalmers University of Technology, Göteborg, Sweeden, 2001.
-
(2001)
-
-
Lundin, E.1
Jonson, E.2
-
21
-
-
10444240629
-
Intrusion Detection: A Bibliograpy
-
Technical Report SSIR-2001-01. September, SUPELEC, France
-
Mé, L., and Michel, C., "Intrusion Detection: a Bibliograpy", Technical Report SSIR-2001-01. September,2001. SUPELEC, France.
-
(2001)
-
-
Mé, L.1
Michel, C.2
-
22
-
-
0003451777
-
-
Final Technical Report. Computer Science Lab, SRI International, Menlo Park, California, Feb
-
Lunt, T., Tamaru. T., Gilham, F., Jagannathan. R., Neumann, P., Javitz, H., Valdes. A., and Garvey, T., "A Real Time Intrusion Detection Expert System (IDES)", Final Technical Report. Computer Science Lab., SRI International, Menlo Park, California, Feb., 1992.
-
(1992)
A Real Time Intrusion Detection Expert System (IDES)
-
-
Lunt, T.1
Tamaru, T.2
Gilham, F.3
Jagannathan, R.4
Neumann, P.5
Javitz, H.6
Valdes, A.7
Garvey, T.8
-
23
-
-
42549112797
-
-
Porras, P.A., and Neumann, P.G., EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances, Proc. National Information Systems Security Confrenece, Baltimore. MD, Oct. 1997.
-
Porras, P.A., and Neumann, P.G., "EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances", Proc. National Information Systems Security Confrenece, Baltimore. MD, Oct. 1997.
-
-
-
-
24
-
-
0029716418
-
-
Forrest. S., Hofmeyer, S.A., Somayaji, A., and Longstaff, T.A., A Sense of Self for Unix Process, Proc. 1996 IEEE Symp. on Security and Privacy, pp. 120-128, 06-08 May 1996. Oakland,CA.IEEE Computer Security Press. Los Alamitos, CA.
-
Forrest. S., Hofmeyer, S.A., Somayaji, A., and Longstaff, T.A., "A Sense of Self for Unix Process", Proc. 1996 IEEE Symp. on Security and Privacy, pp. 120-128, 06-08 May 1996. Oakland,CA.IEEE Computer Security Press. Los Alamitos, CA.
-
-
-
-
25
-
-
42549119227
-
Desenvolvimento de um Sistema Adaptativo de Detecção de Intrusos em Redes de Computadores
-
PhD Thesis, Instituto de Física de São Carlos. USP, Sâo Carlos, SP
-
Cansian. A.M., "Desenvolvimento de um Sistema Adaptativo de Detecção de Intrusos em Redes de Computadores", PhD Thesis, Instituto de Física de São Carlos. USP, Sâo Carlos, SP, 1997.
-
(1997)
-
-
Cansian, A.M.1
-
26
-
-
0036804085
-
Network Intrusion and Fault Detection: A Statistical Anomaly Approach
-
Oct
-
Manikopoulos, C., and Papavassiliou,S., "Network Intrusion and Fault Detection: A Statistical Anomaly Approach", IEEE Communication Magazine, Vol. 40, No. 10, pp. 76-82, Oct 2002.
-
(2002)
IEEE Communication Magazine
, vol.40
, Issue.10
, pp. 76-82
-
-
Manikopoulos, C.1
Papavassiliou, S.2
-
27
-
-
0028714365
-
Automated Detection of Vulnerabilities in privileged Programs by Execution Monitoring
-
December 5-9
-
Fink, G., Ko, C., and Levitt, K., "Automated Detection of Vulnerabilities in privileged Programs by Execution Monitoring", Proc. Of the 10th Annual Computer Security Apps. Conf., pp. 134-144, December 5-9, 1994.
-
(1994)
Proc. Of the 10th Annual Computer Security Apps. Conf
, pp. 134-144
-
-
Fink, G.1
Ko, C.2
Levitt, K.3
-
28
-
-
0141757198
-
Intrusion Detection Using Neural Networks and Support Vector Machines
-
Mukkamala, S., Janoski, G., and Sung, A., "Intrusion Detection Using Neural Networks and Support Vector Machines". IEEE Proceedings, 2002.
-
(2002)
IEEE Proceedings
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
29
-
-
0038011179
-
-
Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari. A., Yang, H., and Zhou, S., Specification-based anomaly detection: a new approach for detecting network intrusions, In Proceedings of the 9th ACM Conference on Computer and Communications Security (Washington, DC, USA, November 18-22, 2002). V. Atluri, Ed. CCS '02. ACM Press, New York, NY.
-
Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari. A., Yang, H., and Zhou, S., "Specification-based anomaly detection: a new approach for detecting network intrusions", In Proceedings of the 9th ACM Conference on Computer and Communications Security (Washington, DC, USA, November 18-22, 2002). V. Atluri, Ed. CCS '02. ACM Press, New York, NY.
-
-
-
-
30
-
-
17444432965
-
Hierarchical Kohonenen Net for Anomaly Detection in Network Security
-
April
-
Sarasamma, S.T., Qiuming, A., and Huff, J., "Hierarchical Kohonenen Net for Anomaly Detection in Network Security", IEEE Trans. on System, Man, and Cybernetics - Part B. Cybernetics, Vol. 35, No.2, April 2005.
-
(2005)
IEEE Trans. on System, Man, and Cybernetics - Part B. Cybernetics
, vol.35
, Issue.2
-
-
Sarasamma, S.T.1
Qiuming, A.2
Huff, J.3
-
31
-
-
33244468138
-
A Supervised Clustering and Classification Algorithm for Mining Data with Mixed Variables
-
March
-
Xiangyang Li, and Nong Ye, "A Supervised Clustering and Classification Algorithm for Mining Data with Mixed Variables", IEEE Trans. On Systems. Man, and Cybernetics, Part a: Systems and Humans, Vol. 36, No. 2, March 2006.
-
(2006)
IEEE Trans. On Systems. Man, and Cybernetics, Part a: Systems and Humans
, vol.36
, Issue.2
-
-
Li, X.1
Ye, N.2
-
32
-
-
0035193911
-
Monitoring Controller's DNA Sequence for System Security
-
Instrumentation Systems and Automation Society, Houston, September
-
Yu, B., Byres, E., and Howey, C., "Monitoring Controller's "DNA Sequence for System Security", ISA Emerging Technologies Conference, Instrumentation Systems and Automation Society, Houston, September 2001.
-
(2001)
ISA Emerging Technologies Conference
-
-
Yu, B.1
Byres, E.2
Howey, C.3
-
33
-
-
35048861836
-
Electric Power System Anomaly Detection Using Neural Networks
-
Springer-Verlag, Heidelberg, Oct
-
Martinelli, M., Tronci, E., Dipoppa, E., and Balducelli, C., "Electric Power System Anomaly Detection Using Neural Networks", Lecture Notes in Computer Science, Vol.3213/2004, pp 1242-1248, Springer-Verlag, Heidelberg, Oct. 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3213
, pp. 1242-1248
-
-
Martinelli, M.1
Tronci, E.2
Dipoppa, E.3
Balducelli, C.4
-
34
-
-
33750949942
-
Identifying Intrusions in Computer Networks with Principal Component Analysis
-
IEEE press society, pp, April. 20-22nd, Vienna, Austria
-
Wang, W. and Battiti, R., "Identifying Intrusions in Computer Networks with Principal Component Analysis", Proceedings of the First International Conference on Availability, Reliability and Security (ARES 2006), IEEE press society, pp. 270-277, April. 20-22nd, Vienna, Austria.
-
(2006)
Proceedings of the First International Conference on Availability, Reliability and Security (ARES
, pp. 270-277
-
-
Wang, W.1
Battiti, R.2
-
35
-
-
21044433766
-
Training Genetic Programming on Half a Million Patterns: An Example from Anomaly Detection
-
June
-
Song, D., Heywood, M.I., and Zincir-Heywood, A., "Training Genetic Programming on Half a Million Patterns: An Example from Anomaly Detection", IEEE Trans. On Evolutionary Computation, Vol. 9, No. 3, June 2005.
-
(2005)
IEEE Trans. On Evolutionary Computation
, vol.9
, Issue.3
-
-
Song, D.1
Heywood, M.I.2
Zincir-Heywood, A.3
-
36
-
-
33847767196
-
Safeguarding SCADA Systems with Anomaly Detection
-
V.Gorodetsky et al.Eds, MMM-ACNS 2003, Springer-Verlag Berlin Heidelberg
-
Bigham, J., Gamez, D., and Ning Lu, "Safeguarding SCADA Systems with Anomaly Detection", V.Gorodetsky et al.(Eds.):MMM-ACNS 2003, LNCS 2776, pp. 171-182, Springer-Verlag Berlin Heidelberg, 2003.
-
(2003)
LNCS
, vol.2776
, pp. 171-182
-
-
Bigham, J.1
Gamez, D.2
Lu, N.3
-
38
-
-
0036082436
-
Applications of Rough Sets in Power System Control Center Data Mining
-
Lambert-Torres. G., "Applications of Rough Sets in Power System Control Center Data Mining", IEEE Power Engineering Society Winter Meeting 2002, Vol. 1, pp. 627-631.
-
(2002)
IEEE Power Engineering Society Winter Meeting
, vol.1
, pp. 627-631
-
-
Lambert-Torres, G.1
-
39
-
-
42549116401
-
-
Lambert-Torres. G. et al, Power System Security Analysis Based on Rough Classification, Rough-Fuzzy Hybridization: New Trend in Decision Making, S.K. Pal & A. Skowron, Springer-Verlag Co., pp. 263-274, 1999.
-
Lambert-Torres. G. et al, "Power System Security Analysis Based on Rough Classification", Rough-Fuzzy Hybridization: New Trend in Decision Making, S.K. Pal & A. Skowron, Springer-Verlag Co., pp. 263-274, 1999.
-
-
-
|