-
1
-
-
49949083521
-
-
DNP Users Group, Mar. 2005, Online, Available
-
C. Ken, "A DNP3 protocol primer," DNP Users Group, Mar. 2005. [Online]. Available: http://www.dnp.org/About/DNP3%20Primer%20Rev%20A.pdf
-
A DNP3 protocol primer
-
-
Ken, C.1
-
3
-
-
33750405289
-
Security issues in SCADA networks
-
M. I. Vinay, A. L. Sean, and D. W. Ronald, "Security issues in SCADA networks," Comput. Security, vol. 25, pp. 498-506, 2006.
-
(2006)
Comput. Security
, vol.25
, pp. 498-506
-
-
Vinay, M.I.1
Sean, A.L.2
Ronald, D.W.3
-
5
-
-
67650658956
-
-
Integrating electronic security into the manufacturing and control systems environment, Instrum. Syst. Autom. Soc., Research Triangle Park, NC, ANSI/ISA-TR99.00.02-2004, 2007.
-
"Integrating electronic security into the manufacturing and control systems environment," Instrum. Syst. Autom. Soc., Research Triangle Park, NC, ANSI/ISA-TR99.00.02-2004, 2007.
-
-
-
-
6
-
-
78649562070
-
-
Nat. Inst. Standards Technol, Gaithersburg, MD, Online, Available
-
"System protection profile - industrial control systems v1.0," Nat. Inst. Standards Technol., Gaithersburg, MD, 2004. [Online]. Available: http://www.isd.mel.nist.gov/projects/processcontrol/SPP-ICSv1.0.pdf
-
(2004)
System protection profile - industrial control systems v1.0
-
-
-
7
-
-
35048887882
-
-
Nat. Inst. Standards Technol, Gaithersburg, MD, Tech rep. special publ, Sep
-
K. Stouffer, J. Falco, and K. Kent, "Guide to supervisory control and data acquisition (SCADA) and industrial control systems security," Nat. Inst. Standards Technol., Gaithersburg, MD, Tech rep. special publ. 800-82, Sep. 2006.
-
(2006)
Guide to supervisory control and data acquisition (SCADA) and industrial control systems security
, pp. 800-882
-
-
Stouffer, K.1
Falco, J.2
Kent, K.3
-
8
-
-
45749134261
-
-
Washington, DC: American Petroleum Inst
-
API 1164: Pipeline SCADA Security. Washington, DC: American Petroleum Inst., 2004.
-
(2004)
API 1164: Pipeline SCADA Security
-
-
-
9
-
-
67650690751
-
-
Cryptographic protection of SCADA communications Part 1: Background, policies and test plan. Amer. Gas Assoc., 2005. [Online]. Available: http://www.gtiservice.org/security/
-
"Cryptographic protection of SCADA communications Part 1: Background, policies and test plan. Amer. Gas Assoc., 2005. [Online]. Available: http://www.gtiservice.org/security/
-
-
-
-
10
-
-
67650699406
-
-
Cryptographic protection of SCADA communications; Part 2: Retrofit link encryption for asynchronous serial communications, American Gas Assoc., 2005., AGA Rep. (Part 2), Draft.
-
"Cryptographic protection of SCADA communications; Part 2: Retrofit link encryption for asynchronous serial communications," American Gas Assoc., 2005., AGA Rep. (Part 2), Draft.
-
-
-
-
12
-
-
67650685124
-
-
D. Robert, B. Colin, D. Ed, and M. G. N. Juan, SKMA a key management architecture for SCADA systems, in Proc. 4th Australasian Information Security Workshop, 2006, 54, pp. 138-192.
-
D. Robert, B. Colin, D. Ed, and M. G. N. Juan, "SKMA a key management architecture for SCADA systems," in Proc. 4th Australasian Information Security Workshop, 2006, vol. 54, pp. 138-192.
-
-
-
-
14
-
-
0242414397
-
Key management approaches to offer data confidentiality for secure multicast
-
Sep./Oct
-
K.-C. Chan and S.-H. G. Chan, "Key management approaches to offer data confidentiality for secure multicast," IEEE Netw., vol. 17, no. 5, pp. 30-39, Sep./Oct. 2003.
-
(2003)
IEEE Netw
, vol.17
, Issue.5
, pp. 30-39
-
-
Chan, K.-C.1
Chan, S.-H.G.2
-
15
-
-
0032178082
-
Secure group communications using key graphs
-
C. K.Wong, H. Gouda, and S. S. Lam, "Secure group communications using key graphs," in Proc. ACMSIGCOMM Conf. Applications, Technologies, Architectures, and Protocols for Computer Communication, 1998, pp. 68-79.
-
(1998)
Proc. ACMSIGCOMM Conf. Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 68-79
-
-
Wong, C.K.1
Gouda, H.2
Lam, S.S.3
-
16
-
-
67650693903
-
Logical key hierachy protocol
-
Task Force, Online, Available
-
H. Harney and E. Harder, "Logical key hierachy protocol," Internet Eng. Task Force, 1999. [Online]. Available: http://tools.ietf.org/html/draft-harney-sparta-lkhp-sec-00
-
(1999)
Internet Eng
-
-
Harney, H.1
Harder, E.2
-
17
-
-
0000636954
-
The Versakey framework: Versatile group key management
-
Sep
-
M. Waldvogel, "The Versakey framework: Versatile group key management," IEEE J. Sel. Areas Commun., vol. 17, no. 9, pp. 1614-1631, Sep. 1999.
-
(1999)
IEEE J. Sel. Areas Commun
, vol.17
, Issue.9
, pp. 1614-1631
-
-
Waldvogel, M.1
-
18
-
-
0141538021
-
Efficient and secure keys management for wireless mobile communications
-
R. D. Pietro, L. V. Mancini, and S. Jajodia, "Efficient and secure keys management for wireless mobile communications," in Proc. 2nd ACM Int. Workshop Principles of Mobile Computing, 2002, pp. 66-73.
-
(2002)
Proc. 2nd ACM Int. Workshop Principles of Mobile Computing
, pp. 66-73
-
-
Pietro, R.D.1
Mancini, L.V.2
Jajodia, S.3
-
19
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
S. Mittra, "Iolus: A framework for scalable secure multicasting," Proc. ACM SIGCOMM, pp. 277-88, 1997.
-
(1997)
Proc. ACM SIGCOMM
, pp. 277-288
-
-
Mittra, S.1
-
20
-
-
0005352931
-
-
IETF Internet Draft, Online, Available
-
T. Hardjono, B. Cain, and B. Doraswamy, "A framework for group key management for multicast security," 2000, IETF Internet Draft. [Online]. Available: http://tools.ietf.org/html/ draft-ietf-ipsec-gkm-framework-03.txt
-
(2000)
A framework for group key management for multicast security
-
-
Hardjono, T.1
Cain, B.2
Doraswamy, B.3
-
21
-
-
0034838199
-
ELK, a new protocol for efficient large group key distribution
-
A. Perrig, D. Song, and J. D. Tygar, "ELK, a new protocol for efficient large group key distribution," in Proc. IEEE Symp. Security and Privacy, 2001, pp. 247-262.
-
(2001)
Proc. IEEE Symp. Security and Privacy
, pp. 247-262
-
-
Perrig, A.1
Song, D.2
Tygar, J.D.3
|