메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Designing modular and redundant cyber architectures for process control: Lessons learned

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CONTROL SYSTEMS; ELECTRIC POWER TRANSMISSION NETWORKS; NETWORK ARCHITECTURE;

EID: 63349106417     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2009.150     Document Type: Conference Paper
Times cited : (4)

References (11)
  • 1
    • 51449101349 scopus 로고    scopus 로고
    • Getting a grip on the grid
    • Madani, V., Novosel, D.: Getting a grip on the grid. Spectrum, IEEE 42 (2005) 42-47.
    • (2005) Spectrum , vol.IEEE 42 , pp. 42-47
    • Madani, V.1    Novosel, D.2
  • 3
    • 63349086005 scopus 로고    scopus 로고
    • Wilson, C: Terrorist capabilities for cyber-attack. In: Dunn and V. Mauer, editors, Int. CIIP Handbook II, CSS, ETH Zurich (2006) 69-88.
    • Wilson, C: Terrorist capabilities for cyber-attack. In: Dunn and V. Mauer, editors, Int. CIIP Handbook volume II, CSS, ETH Zurich (2006) 69-88.
  • 4
    • 84881247246 scopus 로고    scopus 로고
    • Intrusion-Tolerant Architectures: Concepts and Design
    • R. Lemos, C. Gacek, & A. Romanovsky, editors, Architecting Dependable Systems, of
    • Verissimo, P., Neves, N. F., Correia, M.: Intrusion-Tolerant Architectures: Concepts and Design. In: R. Lemos, C. Gacek, & A. Romanovsky, editors, Architecting Dependable Systems, vol. 2677 of Lecture Notes in Computer Science, pp.3-36, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2677 , pp. 3-36
    • Verissimo, P.1    Neves, N.F.2    Correia, M.3
  • 6
    • 63349094550 scopus 로고    scopus 로고
    • Intrusion-Tolerant Protection for Critical Infrastructures
    • Technical Report DI/FCUL TR-07-8
    • Bessani, A. N., Sousa, P., Correia, M., Neves, N. F., Verissimo, P.: Intrusion-Tolerant Protection for Critical Infrastructures. Technical Report DI/FCUL TR-07-8, 2007.
    • (2007)
    • Bessani, A.N.1    Sousa, P.2    Correia, M.3    Neves, N.F.4    Verissimo, P.5
  • 8
    • 38949093199 scopus 로고    scopus 로고
    • Travelling through wormholes: A new look at distributed systems models
    • Verissimo, P.: Travelling through wormholes: a new look at distributed systems models. SIGACT News 37 (2006) 66-81.
    • (2006) SIGACT News
    • Verissimo, P.1
  • 9
    • 51849107351 scopus 로고    scopus 로고
    • Analysis of a Redundant Architecture for Critical Infrastructure Protection
    • R. Lemos, F. Di Giandomenico, C. Gacek, H. Muccini & M. Vieira, editors, Architecting Dependable Systems, of
    • Daidone, A., Chiaradonna, S., Bondavalli, A., Verissimo, P.: Analysis of a Redundant Architecture for Critical Infrastructure Protection. In: R. Lemos, F. Di Giandomenico, C. Gacek, H. Muccini & M. Vieira, editors, Architecting Dependable Systems, vol. 5135 of Lecture Notes in Computer Science, pp.78-100, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5135 , pp. 78-100
    • Daidone, A.1    Chiaradonna, S.2    Bondavalli, A.3    Verissimo, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.