메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1180-1187

A non-intrusive approach to enhance legacy embedded control systems with cyber protection features

Author keywords

Behavior observation; Feedback loop; Legacy control systems

Indexed keywords

BEHAVIOR OBSERVATION; CURRENT SYSTEMS; CYBER ATTACKS; DISTRIBUTED AND EMBEDDED CONTROL SYSTEMS; EMBEDDED CONTROL SYSTEMS; EVOLVABILITY; EXISTING SYSTEMS; FEEDBACK LOOP; GENERAL-PURPOSE SYSTEMS; INTERNATIONAL CONFERENCES; LEGACY CONTROL SYSTEMS; MANAGEMENT SCHEME; NON-INTRUSIVE; OBSERVABLE SYSTEMS; POWER GRIDS; PROTECTION PROCESS; SUB-TASKS; WATER TREATMENT SYSTEMS;

EID: 49049111141     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.24     Document Type: Conference Paper
Times cited : (2)

References (22)
  • 1
    • 7244223259 scopus 로고    scopus 로고
    • D. Garlan, S.-W. Cheng, A.-C. Huang, B. Schmerl, and P. Steenkiste, Rainbow: Architecture-based self-adaptation with reusable infrastruc ture IEEE Computer, 37, Issue 10, pp. 46-54, October 2004.
    • D. Garlan, S.-W. Cheng, A.-C. Huang, B. Schmerl, and P. Steenkiste, "Rainbow: Architecture-based self-adaptation with reusable infrastruc ture" IEEE Computer, vol. Volume 37, Issue 10, pp. 46-54, October 2004.
  • 5
    • 38049094272 scopus 로고    scopus 로고
    • A framework for dynamic software architecture-based self-healing
    • Y. Qun, Y. Xian-Chun, and X. Man-Wu, "A framework for dynamic software architecture-based self-healing" SIGSOFT Softw. Eng. Notes, vol. 30, no. 4, pp. 1-4, 2005.
    • (2005) SIGSOFT Softw. Eng. Notes , vol.30 , Issue.4 , pp. 1-4
    • Qun, Y.1    Xian-Chun, Y.2    Man-Wu, X.3
  • 7
    • 50249088639 scopus 로고    scopus 로고
    • Friedman-Hill
    • S. N. L. Ernest Friedman-Hill, "Jess" http://herzberg.ca. sandia.gov/jess/.
    • Jess
    • Ernest, S.N.L.1
  • 8
    • 36249008579 scopus 로고    scopus 로고
    • Critical Infrastructure Protection Challenges and Efforts to Secure Control Systems
    • United States General Accounting Office, March
    • United States General Accounting Office. Critical Infrastructure Protection Challenges and Efforts to Secure Control Systems. Report to Congressional Requesters. March 2004.
    • (2004) Report to Congressional Requesters
  • 9
    • 49049116201 scopus 로고    scopus 로고
    • Understanding SCADA Security Vulnerabilities. Technical Report. Riptech, Inc. 2001.
    • Understanding SCADA Security Vulnerabilities. Technical Report. Riptech, Inc. 2001.
  • 10
    • 49049116792 scopus 로고    scopus 로고
    • J. Pollet. Developing a Solid SCADA Security Strategy. SICON. Houston. TX. 2002.
    • J. Pollet. Developing a Solid SCADA Security Strategy. SICON. Houston. TX. 2002.
  • 11
    • 49049118119 scopus 로고    scopus 로고
    • F. Haji. L. Lindsay. S. Song. Practical Security Strategy for SCADA Automation Systems and Networks. CCECE/CCGEI, Saskatoon. May 2005.
    • F. Haji. L. Lindsay. S. Song. Practical Security Strategy for SCADA Automation Systems and Networks. CCECE/CCGEI, Saskatoon. May 2005.
  • 12
    • 33745471659 scopus 로고    scopus 로고
    • C. L. Bowen. T. K. Buennemeyer. R. W. Thomas. Next Generation SCADA Security: Best Practices and Client Puzzles. In Proceedings of the IEEE Workshop on Information Assurance and Security. West Point, NY. 2005.
    • C. L. Bowen. T. K. Buennemeyer. R. W. Thomas. Next Generation SCADA Security: Best Practices and Client Puzzles. In Proceedings of the IEEE Workshop on Information Assurance and Security. West Point, NY. 2005.
  • 14
    • 49049085335 scopus 로고    scopus 로고
    • InTech Inc. Intrusion Detection and Cybersecurity. Technical Report. May
    • InTech Inc. Intrusion Detection and Cybersecurity. Technical Report. May 2004.
    • (2004)
  • 15
    • 24244456763 scopus 로고
    • Ph.D. dissertation, Department of Computer Science, University of Virginia, Charlottesville, VA
    • Wika. K.J., Safety Kernel Enforcement of Software Safety Policies, Ph.D. dissertation, Department of Computer Science, University of Virginia, Charlottesville, VA, 1995.
    • (1995) Safety Kernel Enforcement of Software Safety Policies
    • Wika, K.J.1
  • 16
    • 38549119632 scopus 로고
    • Safety Design Requirements and Guidelines for Munition Related Safety Critical Computing Systems
    • NATO AC/310 Ad Hoc Working Group on Munition Related Safety Critical Computing Systems, Draft, March
    • NATO AC/310 Ad Hoc Working Group on Munition Related Safety Critical Computing Systems, "Safety Design Requirements and Guidelines for Munition Related Safety Critical Computing Systems," NATO Standardization Agreement (STANAG) 4404 (Draft), March 1990.
    • (1990) NATO Standardization Agreement (STANAG) , pp. 4404
  • 17
    • 18244376230 scopus 로고    scopus 로고
    • Software test techniques for system fault-tree analysis
    • Knight J. C. Nakano L. G. Software test techniques for system fault-tree analysis. In Proc. SAFECOMP 97, 1997, pp. 369-380
    • (1997) In Proc. SAFECOMP , vol.97 , pp. 369-380
    • Knight, J.C.1    Nakano, L.G.2
  • 19
    • 49049097770 scopus 로고    scopus 로고
    • Wayne Labs. Technology Brief (Issue 2, 2004). How secure is your control system? http://www.automationnotebook.com/2004_Issue_2/ technologybrief_September2004.html
    • Wayne Labs. Technology Brief (Issue 2, 2004). How secure is your control system? http://www.automationnotebook.com/2004_Issue_2/ technologybrief_September2004.html
  • 20
    • 49049118335 scopus 로고    scopus 로고
    • NUREG-0492, Fault Tree Handbook, U.S. Nuclear Regulatory Commission, January, 1981.
    • NUREG-0492, Fault Tree Handbook, U.S. Nuclear Regulatory Commission, January, 1981.
  • 21
    • 33845439531 scopus 로고    scopus 로고
    • Shangping Ren, Limin Shen, Jeffrey Tsai: Reconfigurable Coordination Model for Dynamic Autonomous Real-Time Systems. SUTC (1) 2006: 60-67
    • Shangping Ren, Limin Shen, Jeffrey Tsai: Reconfigurable Coordination Model for Dynamic Autonomous Real-Time Systems. SUTC (1) 2006: 60-67
  • 22
    • 33746268966 scopus 로고    scopus 로고
    • Shangping Ren, Yue Yu. Nianen Chen, Kevin Marth, Pierre-Etienne Poirot, Limin Shen: Actors, Roles and Coordinators - A Coordination Model for Open Distributed and Embedded Systems. COORDINATION 2006: 247-265
    • Shangping Ren, Yue Yu. Nianen Chen, Kevin Marth, Pierre-Etienne Poirot, Limin Shen: Actors, Roles and Coordinators - A Coordination Model for Open Distributed and Embedded Systems. COORDINATION 2006: 247-265


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.