메뉴 건너뛰기




Volumn 6, Issue 6, 2008, Pages 24-29

Security for process control systems: An overview

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; COMPUTER SYSTEMS; CONTROL SYSTEM ANALYSIS; CONTROL SYSTEMS; CONTROL THEORY; LEGACY SYSTEMS; MANAGEMENT INFORMATION SYSTEMS; QUALITY CONTROL; RETROFITTING;

EID: 58849164843     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2008.150     Document Type: Review
Times cited : (57)

References (9)
  • 1
    • 27644559364 scopus 로고    scopus 로고
    • Trends in Process Control Systems Security
    • A. Miller, "Trends in Process Control Systems Security," IEEE Security & Privacy, vol. 3, no. 5, 2005, pp. 57-60.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.5 , pp. 57-60
    • Miller, A.1
  • 2
    • 22344444992 scopus 로고    scopus 로고
    • The Myths and Facts Behind Cyber Security Risks for Industrial Control Systems
    • VDE Verlag
    • E. Byres and J. Lowe, "The Myths and Facts Behind Cyber Security Risks for Industrial Control Systems," Proc. VDE Convention, VDE Verlag, 2004, pp. 213-217.
    • (2004) Proc. VDE Convention , pp. 213-217
    • Byres, E.1    Lowe, J.2
  • 3
    • 33645776524 scopus 로고    scopus 로고
    • Utility IT Executives Expect Breach of Critical SCADA Systems
    • D. Walker, "Utility IT Executives Expect Breach of Critical SCADA Systems," Pipeline and Gas J., vol. 233, no. 2, 2006, pp. 24-27; http://findarticles.com/ p/articles/mi-m3251/is-2-233/ai-n24982950/pg-1?tag= artBody;coll.
    • (2006) Pipeline and Gas J , vol.233 , Issue.2 , pp. 24-27
    • Walker, D.1
  • 4
    • 39749184667 scopus 로고    scopus 로고
    • Addressing IT Security for Critical Control Systems
    • HICSS-40, IEEE CS Press
    • M. Naedele, "Addressing IT Security for Critical Control Systems," Proc. 40th Hawaii Int'l Conf. System Sciences (HICSS-40), IEEE CS Press, 2007, p. 115; http://www2.computer.org/portal/web/csdl/doi/ 10.1109/HICSS.2007.48.
    • (2007) Proc. 40th Hawaii Int'l Conf. System Sciences , pp. 115
    • Naedele, M.1
  • 5
    • 58849161135 scopus 로고    scopus 로고
    • J. Eisenhauer et al., Roadmap to Secure Control Systems in the Energy Sector, sponsored by US DoE and DHS, Jan. 2006; www.controlsystemsroadmap.net/.
    • J. Eisenhauer et al., "Roadmap to Secure Control Systems in the Energy Sector," sponsored by US DoE and DHS, Jan. 2006; www.controlsystemsroadmap.net/.
  • 8
    • 38949137343 scopus 로고    scopus 로고
    • Estimating a System's Mean Time to Compromise
    • J. Leversage and E. Byres, "Estimating a System's Mean Time to Compromise," IEEE Security & Privacy, vol. 6, no. 1, 2008, pp. 52-60.
    • (2008) IEEE Security & Privacy , vol.6 , Issue.1 , pp. 52-60
    • Leversage, J.1    Byres, E.2
  • 9
    • 0037330636 scopus 로고    scopus 로고
    • Understanding the Windows EAL4 Evaluation
    • J. S. Shapiro, "Understanding the Windows EAL4 Evaluation," Computer, vol. 36, no. 2, 2003, pp. 102-105.
    • (2003) Computer , vol.36 , Issue.2 , pp. 102-105
    • Shapiro, J.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.