-
1
-
-
21244452845
-
Overcoming communications challenges in software for monitoring and controlling power systems
-
K. Birman, J. Chen, E. Hopkinson, R. Thomas, J. Thorp, R. van Rennesse and W. Vogels, Overcoming communications challenges in software for monitoring and controlling power systems, Proceedings of the IEEE, vol. 93(5), pp. 1028-1041, 2005.
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.5
, pp. 1028-1041
-
-
Birman, K.1
Chen, J.2
Hopkinson, E.3
Thomas, R.4
Thorp, J.5
van Rennesse, R.6
Vogels, W.7
-
2
-
-
13644252493
-
SCADA vs. the hackers
-
A. Brown, SCADA vs. the hackers, Mechanical Engineering, vol. 124(12), pp. 37-40, 2002.
-
(2002)
Mechanical Engineering
, vol.124
, Issue.12
, pp. 37-40
-
-
Brown, A.1
-
4
-
-
22344444992
-
The myths and facts behind cyber security risks for industrial control systems
-
E. Byres and J. Lowe, The myths and facts behind cyber security risks for industrial control systems, Proceedings of the VDE Congress, pp. 213-218, 2004.
-
(2004)
Proceedings of the VDE Congress
, pp. 213-218
-
-
Byres, E.1
Lowe, J.2
-
5
-
-
33847175470
-
-
SAND2002-0729, Sandia National Laboratories, Albuquerque, New Mexico
-
R. Carlson, Sandia SCADA Program: High-Security SCADA LDRD Final Report, Technical Report SAND2002-0729, Sandia National Laboratories, Albuquerque, New Mexico, 2002.
-
(2002)
Sandia SCADA Program: High-Security SCADA LDRD Final Report, Technical Report
-
-
Carlson, R.1
-
6
-
-
36248993462
-
Roadmap to Secure Control Systems in the Energy Sector
-
Technical Report, Energetics Inc, Columbia, Maryland
-
J. Eisenhauer, P. Donnelly, M. Ellis and M. O'Brien, Roadmap to Secure Control Systems in the Energy Sector, Technical Report, Energetics Inc., Columbia, Maryland, 2006.
-
(2006)
-
-
Eisenhauer, J.1
Donnelly, P.2
Ellis, M.3
O'Brien, M.4
-
8
-
-
55549100131
-
Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems
-
CON-06-11665, Idaho National Laboratory, Idaho Falls, Idaho
-
R. Fink, D. Spencer and R. Wells, Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems, Technical Report INL/ CON-06-11665, Idaho National Laboratory, Idaho Falls, Idaho, 2006.
-
(2006)
Technical Report INL
-
-
Fink, R.1
Spencer, D.2
Wells, R.3
-
9
-
-
0003615205
-
-
SAND98-8667, Sandia National Laboratories, Livermore, California
-
J. Howard and T. Longstaff, A Common Language for Computer Security Incidents, Technical Report SAND98-8667, Sandia National Laboratories, Livermore, California, 1998.
-
(1998)
A Common Language for Computer Security Incidents, Technical Report
-
-
Howard, J.1
Longstaff, T.2
-
10
-
-
55549091597
-
Data storm blamed for nuclear plant shutdown
-
May 18
-
R. Lemos, "Data storm" blamed for nuclear plant shutdown, SecurityFocus, May 18, 2007.
-
(2007)
SecurityFocus
-
-
Lemos, R.1
-
12
-
-
35148844598
-
Validating and restoring defense in depth using attack graphs
-
R. Lippmann, K. Ingols, C. Scott, K. Piwowarski, K. Kratkiewicz, M. Artz and R. Cunningham, Validating and restoring defense in depth using attack graphs, Proceedings of the Military Communications Conference pp. 1-10, 2006.
-
(2006)
Proceedings of the Military Communications Conference
, pp. 1-10
-
-
Lippmann, R.1
Ingols, K.2
Scott, C.3
Piwowarski, K.4
Kratkiewicz, K.5
Artz, M.6
Cunningham, R.7
-
13
-
-
55549091923
-
Admin faces prison for trying to axe California power grid
-
December 15
-
R. McMillan, Admin faces prison for trying to axe California power grid, PC World, December 15, 2007.
-
(2007)
PC World
-
-
McMillan, R.1
-
14
-
-
33749639831
-
Quantitative cyber risk reduction estimation methodology for a small SCADA control system
-
M. McQueen, W. Boyer, M. Flynn and G. Beitel, Quantitative cyber risk reduction estimation methodology for a small SCADA control system, Proceedings of the Thirty-Ninth Annual Hawaii International Conference on System Sciences, p. 226, 2006.
-
(2006)
Proceedings of the Thirty-Ninth Annual Hawaii International Conference on System Sciences
, pp. 226
-
-
McQueen, M.1
Boyer, W.2
Flynn, M.3
Beitel, G.4
-
15
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communication Review, vol. 34(2), pp. 39-53, 2004.
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
17
-
-
15944364849
-
Protecting the grid from cyber attack, Part I: Recognizing our vulnerabilities
-
P. Oman, E. Schweitzer and J. Roberts, Protecting the grid from cyber attack, Part I: Recognizing our vulnerabilities, Utility Automation & Engineering T&D, vol. 6(7), pp. 16-22, 2001.
-
(2001)
Utility Automation & Engineering T&D
, vol.6
, Issue.7
, pp. 16-22
-
-
Oman, P.1
Schweitzer, E.2
Roberts, J.3
-
18
-
-
1642265495
-
Protecting the grid from cyber attack, Part II: Safeguarding IEDs, substations and SCADA systems
-
P. Oman, E. Schweitzer and J. Roberts, Protecting the grid from cyber attack, Part II: Safeguarding IEDs, substations and SCADA systems, Utility Automation & Engineering T&D, vol. 7(1), pp. 25-32, 2002.
-
(2002)
Utility Automation & Engineering T&D
, vol.7
, Issue.1
, pp. 25-32
-
-
Oman, P.1
Schweitzer, E.2
Roberts, J.3
-
19
-
-
55549122185
-
Sparks over power grid cybersecurity
-
April 10
-
K. Poulsen, Sparks over power grid cybersecurity, SecurityFocus, April 10, 2003.
-
(2003)
SecurityFocus
-
-
Poulsen, K.1
-
20
-
-
33745446320
-
Slammer worm crashed Ohio nuke plant network
-
August 19
-
K. Poulsen, Slammer worm crashed Ohio nuke plant network, SecurityFocus, August 19, 2003.
-
(2003)
SecurityFocus
-
-
Poulsen, K.1
-
21
-
-
33745160609
-
Software bug contributed to blackout
-
February 11
-
K. Poulsen, Software bug contributed to blackout, SecurityFocus, February 11, 2004.
-
(2004)
SecurityFocus
-
-
Poulsen, K.1
-
22
-
-
33644645083
-
Electric utility responses to grid security issues
-
R. Schainker, J. Douglas and T. Kropp, Electric utility responses to grid security issues, IEEE Power and Energy, vol. 4(2), pp. 30-37, 2006.
-
(2006)
IEEE Power and Energy
, vol.4
, Issue.2
, pp. 30-37
-
-
Schainker, R.1
Douglas, J.2
Kropp, T.3
-
23
-
-
0002670359
-
Attack trees
-
B. Schneier, Attack trees, Dr. Dobb's Journal, vol. 24(12), pp. 21-29, 1999.
-
(1999)
Dr. Dobb's Journal
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
24
-
-
2942608216
-
Managing secure survivable critical infrastructures to avoid vulnerabilities
-
F. Sheldon, T. Potok, A. Loebl, A. Krings and P. Oman, Managing secure survivable critical infrastructures to avoid vulnerabilities, Proceedings of the Eighth IEEE International Symposium on High Assurance Systems Engineering, pp. 293-296, 2004.
-
(2004)
Proceedings of the Eighth IEEE International Symposium on High Assurance Systems Engineering
, pp. 293-296
-
-
Sheldon, F.1
Potok, T.2
Loebl, A.3
Krings, A.4
Oman, P.5
-
25
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann and J. Wing, Automated generation and analysis of attack graphs, Proceedings of the IEEE Symposium on Security and Privacy, pp. 273-284, 2002.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
26
-
-
34047144699
-
Common Vulnerabilities in Critical Infrastructure Control Systems
-
Technical Report SAND2003-1772C, Sandia National Laboratories, Albuquerque, New Mexico
-
J. Stamp, J. Dillinger, W. Young and J. DePoy, Common Vulnerabilities in Critical Infrastructure Control Systems, Technical Report SAND2003-1772C, Sandia National Laboratories, Albuquerque, New Mexico, 2003.
-
(2003)
-
-
Stamp, J.1
Dillinger, J.2
Young, W.3
DePoy, J.4
-
27
-
-
55549114885
-
Guide to Industrial Control Systems Security
-
NIST Special Publication 800-82, National Institute of Standards and Technology, Gaithersburg, Maryland
-
K. Stouker, J. Falco and K. Scarfone, Guide to Industrial Control Systems Security, Second Public Draft, NIST Special Publication 800-82, National Institute of Standards and Technology, Gaithersburg, Maryland, 2007.
-
(2007)
Second Public Draft
-
-
Stouker, K.1
Falco, J.2
Scarfone, K.3
-
28
-
-
1642273057
-
-
C. Taylor, P. Oman and A. Krings, Assessing power substation network security and survivability: A work in progress report, Proceedings of the International Conference on Security and Management, pp. 281-287, 2003.
-
C. Taylor, P. Oman and A. Krings, Assessing power substation network security and survivability: A work in progress report, Proceedings of the International Conference on Security and Management, pp. 281-287, 2003.
-
-
-
-
30
-
-
79959622205
-
A system-fault-risk framework for cyber attack classilcation
-
N. Ye, C. Newman and T. Farley, A system-fault-risk framework for cyber attack classilcation, Information-Knowledge-Systems Management, vol. 5(2), pp. 135-151, 2005.
-
(2005)
Information-Knowledge-Systems Management
, vol.5
, Issue.2
, pp. 135-151
-
-
Ye, N.1
Newman, C.2
Farley, T.3
|