-
1
-
-
50849085617
-
-
USA Patriot Act 2001, http://www.epic.org/privacy/terrorism/hr3162.pdf
-
(2001)
-
-
Patriot Act, U.S.A.1
-
2
-
-
50849126351
-
-
Gamez,D., Nadjm-Tehrani, S., Bigham, J., Balducelli, C., Burbeck, K., Chyssler, T., Chapter 19 Safeguarding Critical Infrastructures, Edited by Professor Hassan B. Diab & Professor Albert Y. Zomaya ,Dependable Computing Systems: Paradigms, Performance Issues, and Applications, Wiley STM, 2000.
-
Gamez,D., Nadjm-Tehrani, S., Bigham, J., Balducelli, C., Burbeck, K., Chyssler, T., "Chapter 19 Safeguarding Critical Infrastructures", Edited by Professor Hassan B. Diab & Professor Albert Y. Zomaya ,"Dependable Computing Systems: Paradigms, Performance Issues, and Applications", Wiley STM, 2000.
-
-
-
-
4
-
-
50849095957
-
-
The National Strategy to Secure Cyberspace, Washington D.C, February, 2003
-
"The National Strategy to Secure Cyberspace", Washington D.C., February, 2003, http://www.dhs.gov/interweb/assetlibrary/ National_Cyberspace_Strategy.pdf
-
-
-
-
5
-
-
12344300052
-
-
Washington D.C, January, 2002
-
"Homeland Security Act of 2002", Washington D.C., January, 2002, http://www.dhs.gov/interweb/assetlibrary/hr_5005_enr.pdf
-
Homeland Security Act of 2002
-
-
-
6
-
-
42549090817
-
-
IT-Grundschutz Manual 2004, http://www.bsi.bund.de/english/gshb/index. htm]
-
(2004)
Manual
-
-
IT-Grundschutz1
-
7
-
-
50849089802
-
-
http://www.bsi.bund.de/cc/index.htm
-
-
-
-
8
-
-
1542697911
-
IT Security for Industrial Control Systems
-
February
-
Falco, J., Stouffer, K., Wavering, A., Proctor, F., "IT Security for Industrial Control Systems", NISTIR 6859, February 2002
-
(2002)
NISTIR
, vol.6859
-
-
Falco, J.1
Stouffer, K.2
Wavering, A.3
Proctor, F.4
-
9
-
-
33847253058
-
Standardizing Industrial IT Security - A first Look at the IEC Approach
-
Sept
-
Naedele, M., "Standardizing Industrial IT Security - A first Look at the IEC Approach", Emerging Technologies and Factory Automation, 2005, ETFA 2005. 10th IEEE Conference on, Vol. 2, 19-22 ,Sept. 2005, pp. 857 - 863
-
(2005)
Emerging Technologies and Factory Automation, 2005, ETFA 2005. 10th IEEE Conference on
, vol.2
-
-
Naedele, M.1
-
10
-
-
33847264121
-
The Myths and Facts behind Cyber Security Risks for Industrial Control Systems
-
VDE, Berlin, October
-
Byres, E. and Lowe, J., "The Myths and Facts behind Cyber Security Risks for Industrial Control Systems", VDE 2004 Congress, VDE, Berlin, October, 2004
-
(2004)
VDE 2004 Congress
-
-
Byres, E.1
Lowe, J.2
-
11
-
-
21644440888
-
Security for Industrial Communications Systems
-
June
-
Dzung, D., Naedele, M., Von Hoff, T.P., Crevatin, M., "Security for Industrial Communications Systems", Proceedings of the IEEE, Vol.93, No. 6, June 2005.
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.6
-
-
Dzung, D.1
Naedele, M.2
Von Hoff, T.P.3
Crevatin, M.4
-
12
-
-
42549090335
-
Industrial Information System Security - Part I, Part2, and Part 3
-
ABB Review
-
Naedele, M., Dzung, D., "Industrial Information System Security - Part I, Part2, and Part 3", ABB Review 2005.
-
(2005)
-
-
Naedele, M.1
Dzung, D.2
-
13
-
-
42549166280
-
The role of Intrusion Detection Systems
-
September/October
-
McHugh, J., Christie, A., Allen, J., "The role of Intrusion Detection Systems", IEEE Software, September/October/2000.
-
(2000)
IEEE Software
-
-
McHugh, J.1
Christie, A.2
Allen, J.3
-
14
-
-
50849107517
-
-
Hale, J., Bose, A., Information Survivability in the Electric Utility Industry, ISW'98, http://www.cert.org/research/isw/isw98/ all_the_papers/no19.html
-
Hale, J., Bose, A., "Information Survivability in the Electric Utility Industry", ISW'98, http://www.cert.org/research/isw/isw98/ all_the_papers/no19.html
-
-
-
-
15
-
-
27944439331
-
-
Institute for Security Technology Studies at Dartmouth College, December
-
Goetz,E., "Cyber Security of the Electric Power Industry", Institute for Security Technology Studies at Dartmouth College", December,2002.
-
(2002)
Cyber Security of the Electric Power Industry
-
-
Goetz, E.1
-
16
-
-
1642265495
-
Protecting the Grid From Cyber Attack, Part II: Safeguarding IEDS, Substations and SCADA Systems, Utility
-
Oman, P., Schweitzer, E., and Roberts, J., "Protecting the Grid From Cyber Attack, Part II: Safeguarding IEDS, Substations and SCADA Systems", Utility Automation, 7(1), 2002, pp. 25-32.
-
(2002)
Automation
, vol.7
, Issue.1
, pp. 25-32
-
-
Oman, P.1
Schweitzer, E.2
Roberts, J.3
-
17
-
-
0023294428
-
An Intrusion-Detection Model
-
Feb
-
Denning, D., "An Intrusion-Detection Model", IEEE Transaction Software Engineering, vol. SE-13, No. 2, pp.222-232, Feb. 1987
-
(1987)
IEEE Transaction Software Engineering
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
18
-
-
0003516333
-
-
Chalmers University of Technology, Göteborg, Sweden, March
-
Axelsson, S., "Intrusion Detection Systems: A Survey and Taxonomy", Chalmers University of Technology, Göteborg, Sweden, March/2000.
-
(2000)
Intrusion Detection Systems: A Survey and Taxonomy
-
-
Axelsson, S.1
-
19
-
-
0012127229
-
Intrusion and Intrusion Detection
-
Aug, DOI 10.1007/s102070100001, URL
-
McHugh, J., "Intrusion and Intrusion Detection", International Journal of Information Security, Volume 1, Issue 1, Aug 2001, Pages 14 - 35, DOI 10.1007/s102070100001, URL http://dx.doi.org/10.1007/s102070100001
-
(2001)
International Journal of Information Security
, vol.1
, Issue.1
, pp. 14-35
-
-
McHugh, J.1
-
20
-
-
0038223829
-
-
NIST Special Publication on Intrusion Detection System
-
Bace,R., Mell, P. "Intrusion Detection Systems", NIST Special Publication on Intrusion Detection System,http://csrc.nist.gov/publication/ nistpubs/800-31/sp800-31.pdf
-
Intrusion Detection Systems
-
-
Bace, R.1
Mell, P.2
-
21
-
-
1642408137
-
Survey of Intrusion Detection Research
-
Technical Report 02-04, Chalmers University of Technology, Göteborg, Sweeden
-
Lundin,E., Jonson,E., "Survey of Intrusion Detection Research", Technical Report 02-04, Chalmers University of Technology, Göteborg, Sweeden, 2001.
-
(2001)
-
-
Lundin, E.1
Jonson, E.2
-
22
-
-
10444240629
-
Intrusion Detection: A Bibliograpy
-
Technical Report SSIR-2001-01, September, SUPELEC, France
-
Mé, L., Michel, C., "Intrusion Detection: a Bibliograpy", Technical Report SSIR-2001-01, September,2001, SUPELEC, France.
-
(2001)
-
-
Mé, L.1
Michel, C.2
-
23
-
-
0003451777
-
-
Final Technical Report, Computer Science Lab, SRI International, Menlo Park, California, Feb
-
Lunt, T., Tamaru,T., Gilham,F., Jagannathan,R., Neumann,P., Javitz,H., Valdes,A., Garvey,T., "A Real Time Intrusion Detection Expert System (IDES)", Final Technical Report, Computer Science Lab., SRI International, Menlo Park,, California, Feb., 1992.
-
(1992)
A Real Time Intrusion Detection Expert System (IDES)
-
-
Lunt, T.1
Tamaru, T.2
Gilham, F.3
Jagannathan, R.4
Neumann, P.5
Javitz, H.6
Valdes, A.7
Garvey, T.8
-
24
-
-
50849125921
-
-
Porras,P.A., Neumann, P.G., EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances, Proc. National Information Systems Security Confrenece, Baltimore, MD, Oct. 1997.
-
Porras,P.A., Neumann, P.G., "EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances", Proc. National Information Systems Security Confrenece, Baltimore, MD, Oct. 1997.
-
-
-
-
25
-
-
0029716418
-
A Sense of Self for Unix Process
-
06-08 May, Oakland, CA, IEEE Computer Security Press, Los Alamitos, CA
-
Forrest, S., Hofmeyer, S.A., Somayaji, A., Longstaff, T.A., "A Sense of Self for Unix Process", Proc. 1996 IEEE Symp. on Security and Privacy, pp. 120-128, 06-08 May 1996, Oakland, CA, IEEE Computer Security Press, Los Alamitos, CA.
-
(1996)
Proc. 1996 IEEE Symp. on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyer, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
26
-
-
42549119227
-
Desenvolvimento de um Sistema Adaptativo de Detecção de Intrusos em Redes de Computadores
-
PhD Thesis, Instituto de Física de São Carlos, USP, São Carlos, SP
-
Cansian, A.M., "Desenvolvimento de um Sistema Adaptativo de Detecção de Intrusos em Redes de Computadores", PhD Thesis, Instituto de Física de São Carlos, USP, São Carlos, SP, 1997.
-
(1997)
-
-
Cansian, A.M.1
-
27
-
-
35048861836
-
Electric Power System Anomaly Detection Using Neural Networks
-
Springer-Verlag, Heidelberg, Oct
-
Martinelli,M., Tronci,E., Dipoppa,E.,Balducelli,C., "Electric Power System Anomaly Detection Using Neural Networks", Lecture Notes in Computer Science, Vol.3213/2004, pp 1242-1248, Springer-Verlag, Heidelberg, Oct. 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3213
, pp. 1242-1248
-
-
Martinelli, M.1
Tronci, E.2
Dipoppa, E.3
Balducelli, C.4
-
28
-
-
33847767196
-
Safeguarding SCADA Systems with Anomaly Detection
-
V.Gorodetsky et al.Eds, MMM-ACNS 2003, Springer-Verlag Berlin Heidelberg
-
Bigham, J., Gamez, D., Ning Lu, "Safeguarding SCADA Systems with Anomaly Detection", V.Gorodetsky et al.(Eds.):MMM-ACNS 2003, LNCS 2776, pp. 171-182, Springer-Verlag Berlin Heidelberg, 2003.
-
(2003)
LNCS
, vol.2776
, pp. 171-182
-
-
Bigham, J.1
Gamez, D.2
Lu, N.3
-
30
-
-
50849091119
-
-
Lambert-Torres, G. et al, Power System Security Analysis Based on Rough Classification, Rough-Fuzzy Hybridization: New Trend in Decision Making, S.K. Pal & A. Skowron, Springer-Verlag Co., pp. 263-274, 1999.
-
Lambert-Torres, G. et al, "Power System Security Analysis Based on Rough Classification", Rough-Fuzzy Hybridization: New Trend in Decision Making, S.K. Pal & A. Skowron, Springer-Verlag Co., pp. 263-274, 1999.
-
-
-
-
31
-
-
0036082436
-
Applications of Rough Sets in Power System Control Center Data Mining
-
Lambert-Torres, G., "Applications of Rough Sets in Power System Control Center Data Mining", IEEE Power Engineering Society Winter Meeting 2002, Vol. 1, pp. 627-631.
-
(2002)
IEEE Power Engineering Society Winter Meeting
, vol.1
, pp. 627-631
-
-
Lambert-Torres, G.1
-
32
-
-
50849128990
-
-
The reliability Test System Task Force of the Application of Probability Methods Sub-committee, The IEEE Reliability Test System - 1996, IEEE Trans. on Power System, 14, No. 3, August 1999.
-
"The reliability Test System Task Force of the Application of Probability Methods Sub-committee", The IEEE Reliability Test System - 1996, IEEE Trans. on Power System, Vol 14, No. 3, August 1999.
-
-
-
|