-
1
-
-
84872811661
-
Cryptographic Protection of SCADA Communications
-
April 14, www.gtiservices.org/security/ AGA12Draft5r3.pdf American Gas Association AGA-12-1
-
American Gas Association AGA-12-1 (2005) Cryptographic Protection of SCADA Communications, Part 1: Background, Policies and Test Plan, AGA Report No. 12 (Part 1), Draft 5, April 14, www.gtiservices.org/security/ AGA12Draft5r3.pdf
-
(2005)
Part 1: Background, Policies and Test Plan, AGA Report No. 12 (Part 1), Draft
, vol.5
-
-
-
2
-
-
36249015425
-
Cryptographic Protection of SCADA Communications; Part 2: Retrofit Link Encryption for Asynchronous Serial Communications
-
American Gas Association AGA-12-2 , No. 12, Part 2, Draft, May 12
-
American Gas Association AGA-12-2 (2005) Cryptographic Protection of SCADA Communications; Part 2: Retrofit Link Encryption for Asynchronous Serial Communications, AGA Report No. 12, Part 2, Draft, May 12, www.gtiservices.org/security/aga-12p2-draft-0512.pdf
-
(2005)
AGA Report
-
-
-
3
-
-
85086419180
-
-
American National Standards Institute/Instrumentation Systems and Automation Society (ANSI/IS A-TR99.00.01) (2004) Security Technologies for Manufacturing and Control Systems, October.
-
American National Standards Institute/Instrumentation Systems and Automation Society (ANSI/IS A-TR99.00.01) (2004) Security Technologies for Manufacturing and Control Systems, October.
-
-
-
-
4
-
-
85086420363
-
-
American National Standards Institute/Instrumentation Systems and Automation Society (ANSI/ISA-TR99.00.02) (2004) Integrating Electronic Security into the Manufacturing and Control Systems Environment, October.
-
American National Standards Institute/Instrumentation Systems and Automation Society (ANSI/ISA-TR99.00.02) (2004) Integrating Electronic Security into the Manufacturing and Control Systems Environment, October.
-
-
-
-
5
-
-
85086419702
-
-
American Petroleum Institute API 1164, September 1, American Petroleum Institute, Washington DC
-
American Petroleum Institute (API 1164) (2004) SCADA Security, September 1, American Petroleum Institute, Washington DC.
-
(2004)
SCADA Security
-
-
-
6
-
-
84864173616
-
A Reference Model for Control and Automation Systems in Electric Power
-
Technical Report SAND2005-1000C, Sandia National Laboratories, Albuquerque, New Mexico
-
Berg, M. and Stamp, J. (2005) A Reference Model for Control and Automation Systems in Electric Power, Technical Report SAND2005-1000C, Sandia National Laboratories, Albuquerque, New Mexico.
-
(2005)
-
-
Berg, M.1
Stamp, J.2
-
7
-
-
0004305643
-
SCADA: Supervisory Control and Data Acquisition
-
3rd ed, Systems and Automation Society, Research Triangle Park, North Carolina
-
Boyer, S. (2004) SCADA: Supervisory Control and Data Acquisition, 3rd ed., Instrumentation, Systems and Automation Society, Research Triangle Park, North Carolina.
-
(2004)
Instrumentation
-
-
Boyer, S.1
-
8
-
-
34047192955
-
-
British Columbia Institute of Technology , National Infrastructure Security Coordination Centre, London, UK
-
British Columbia Institute of Technology (2005) Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks, National Infrastructure Security Coordination Centre, London, UK.
-
(2005)
Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks
-
-
-
10
-
-
85086419604
-
Worlds in collision: Ethernet on the plant floor
-
Chicago, Illinois
-
Byres, E., Carter, J., Elramly, A. and Hoffman, D. (2002) 'Worlds in collision: Ethernet on the plant floor', Proceedings of the ISA Emerging Technologies Conference, Chicago, Illinois.
-
(2002)
Proceedings of the ISA Emerging Technologies Conference
-
-
Byres, E.1
Carter, J.2
Elramly, A.3
Hoffman, D.4
-
11
-
-
34047240072
-
The use of attack trees in assessing vulnerabilities in SCADA systems
-
Lisbon, Portugal
-
Byres, E., Franz, M. and Miller, D. (2004) 'The use of attack trees in assessing vulnerabilities in SCADA systems', Proceedings of the International Infrastructure Survivability Workshop, Lisbon, Portugal.
-
(2004)
Proceedings of the International Infrastructure Survivability Workshop
-
-
Byres, E.1
Franz, M.2
Miller, D.3
-
14
-
-
85086420146
-
-
Security Considerations in SCADA Communication Protocols, Technical Report TR-ISRL-04-01 Intelligent System Research Laboratory, Department of Computer Engineering and Computer Science, University of Louisville, Louisville, Kentucky
-
Graham, J. and Patel, S. (2004) Security Considerations in SCADA Communication Protocols, Technical Report TR-ISRL-04-01 Intelligent System Research Laboratory, Department of Computer Engineering and Computer Science, University of Louisville, Louisville, Kentucky.
-
(2004)
-
-
Graham, J.1
Patel, S.2
-
15
-
-
33750422800
-
Framework for SCADA Security Policy
-
Technical Report SAND2005-1002C, Sandia National Laboratories, Albuquerque, New Mexico
-
Kilman, D. and Stamp, J. (2005) Framework for SCADA Security Policy Technical Report SAND2005-1002C, Sandia National Laboratories, Albuquerque, New Mexico.
-
(2005)
-
-
Kilman, D.1
Stamp, J.2
-
16
-
-
10644222357
-
-
McGraw-Hill/Osborne, Emeryville, California
-
Mandia, K., Prosise, C. and Pepe, M. (2003) Incident Response and Computer Forensics, McGraw-Hill/Osborne, Emeryville, California.
-
(2003)
Incident Response and Computer Forensics
-
-
Mandia, K.1
Prosise, C.2
Pepe, M.3
-
19
-
-
85086419442
-
-
Modbus.org (2002) MODBUS Over Serial Line Specification and Implementation Guide v1.0, 12 February,www. mod-bus.org/specs.php
-
Modbus.org (2002) MODBUS Over Serial Line Specification and Implementation Guide v1.0, 12 February,www. mod-bus.org/specs.php
-
-
-
-
20
-
-
85086420244
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology SPP-ICS , Gaithersburg, Maryland
-
National Institute of Standards and Technology SPP-ICS (2004) National Institute of Standards and Technology, System Protection Profile - Industrial Control Systems v1.0, Gaithersburg, Maryland.
-
(2004)
System Protection Profile - Industrial Control Systems v1.0
-
-
-
21
-
-
24344492645
-
Fornet: A distributed forensics system
-
St. Petersburg, Russia
-
Shanmugasundaram, K., Memon, N., Savant, A. and Bronnimann, H. (2003) 'Fornet: A distributed forensics system', Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, St. Petersburg, Russia.
-
(2003)
Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security
-
-
Shanmugasundaram, K.1
Memon, N.2
Savant, A.3
Bronnimann, H.4
-
22
-
-
33845546517
-
Integrating digital forensics in network architectures
-
Pollitt, M. and Shenoi, S, Eds, Springer, New York, pp
-
Shanmugasundaram, K., Bronnimann, H. and Memon, N. (2005) 'Integrating digital forensics in network architectures', in Pollitt, M. and Shenoi, S. (Eds.): Advances in Digital Forensics, Springer, New York, pp. 127-140.
-
(2005)
Advances in Digital Forensics
, pp. 127-140
-
-
Shanmugasundaram, K.1
Bronnimann, H.2
Memon, N.3
-
23
-
-
85086419037
-
-
Smith, M. and Copps, M, 1993 DNP3 V3.00 Data Object Library Version 0.02, September, DNP Users Group
-
Smith, M. and Copps, M. (1993) DNP3 V3.00 Data Object Library Version 0.02, September, DNP Users Group.
-
-
-
-
25
-
-
34047144699
-
Common Vulnerabilities in Critical Infrastructure Control Systems
-
Technical Report SAND2003-1772C, Sandia National Laboratories, Albuquerque, New Mexico
-
Stamp, J., Dillinger, J., Young, W. and Depoy, J. (2003) Common Vulnerabilities in Critical Infrastructure Control Systems, Technical Report SAND2003-1772C, Sandia National Laboratories, Albuquerque, New Mexico.
-
(2003)
-
-
Stamp, J.1
Dillinger, J.2
Young, W.3
Depoy, J.4
-
26
-
-
0005973371
-
-
The White House , National Security Council, Executive Office of the President, Washington DC
-
The White House (1998) Presidential Decision Directive 63: Critical Infrastructure Protection, National Security Council, Executive Office of the President, Washington DC.
-
(1998)
Presidential Decision Directive 63: Critical Infrastructure Protection
-
-
|