메뉴 건너뛰기




Volumn 2, Issue 4, 2009, Pages 139-145

An experimental investigation of malware attacks on SCADA systems

Author keywords

Attacks; Critical Infrastructures; Malware; SCADA Systems

Indexed keywords

ARCHITECTURAL WEAKNESS; COMMUNICATION PROTOCOLS; COMPUTER MALWARE; CRITICAL INFRASTRUCTURE; CRITICAL INFRASTRUCTURES; DAMAGING EFFECTS; EXPERIMENTAL INVESTIGATIONS; INDUSTRIAL PROCESSS; INFORMATION AND COMMUNICATIONS TECHNOLOGY; MALWARE ATTACKS; MALWARES; SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS;

EID: 71649109185     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2009.10.001     Document Type: Article
Times cited : (90)

References (35)
  • 3
    • 55549137744 scopus 로고    scopus 로고
    • Security assessment of a turbo-gas power plant
    • Papa M., and Shenoi S. (Eds), Springer, Boston, Massachusetts
    • Masera M., Nai Fovino I., and Leszczyna R. Security assessment of a turbo-gas power plant. In: Papa M., and Shenoi S. (Eds). Critical Infrastructure Protection II (2008), Springer, Boston, Massachusetts 31-40
    • (2008) Critical Infrastructure Protection II , pp. 31-40
    • Masera, M.1    Nai Fovino, I.2    Leszczyna, R.3
  • 5
    • 34548049800 scopus 로고    scopus 로고
    • Industrial cybersecurity for a power system and SCADA networks-Be secure
    • Creery A., and Byres E. Industrial cybersecurity for a power system and SCADA networks-Be secure. IEEE Industry Applications 13 4 (2007) 49-55
    • (2007) IEEE Industry Applications , vol.13 , Issue.4 , pp. 49-55
    • Creery, A.1    Byres, E.2
  • 6
    • 36249028736 scopus 로고    scopus 로고
    • Security strategies for SCADA networks
    • Goetz E., and Shenoi S. (Eds), Springer, Boston, Massachusetts
    • Chandia R., Gonzalez J., Kilpatrick T., Papa M., and Shenoi S. Security strategies for SCADA networks. In: Goetz E., and Shenoi S. (Eds). Critical Infrastructure Protection (2007), Springer, Boston, Massachusetts 117-131
    • (2007) Critical Infrastructure Protection , pp. 117-131
    • Chandia, R.1    Gonzalez, J.2    Kilpatrick, T.3    Papa, M.4    Shenoi, S.5
  • 10
    • 0030240880 scopus 로고    scopus 로고
    • Are good virus simulators still a bad idea?
    • Gordon S. Are good virus simulators still a bad idea?. Network Security 9 (1996) 7-13
    • (1996) Network Security , Issue.9 , pp. 7-13
    • Gordon, S.1
  • 11
    • 71649094167 scopus 로고
    • British Computer Virus Research Centre, Brighton, United Kingdom
    • Hirst J. Virus Simulation Suite (1990), British Computer Virus Research Centre, Brighton, United Kingdom
    • (1990) Virus Simulation Suite
    • Hirst, J.1
  • 13
    • 71649106068 scopus 로고    scopus 로고
    • Rosenthal Engineering, Rosenthal Virus Simulator, San Luis Obispo, California, 1997
    • Rosenthal Engineering, Rosenthal Virus Simulator, San Luis Obispo, California, 1997
  • 25
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using CWSandbox
    • Willems C., Holz T., and Freiling F. Toward automated dynamic malware analysis using CWSandbox. IEEE Security and Privacy 5 2 (2007) 32-39
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 32-39
    • Willems, C.1    Holz, T.2    Freiling, F.3
  • 26
    • 71649103338 scopus 로고    scopus 로고
    • Norway
    • Norman, Norman SandBox, Lysaker, Norway www.norman.com/technology/norman_sandbox
    • Lysaker
  • 34
    • 71649088128 scopus 로고    scopus 로고
    • Telecom Italia, Java Agent Development (JADE) Framework, Rome, Italy jade.tilab.com
    • Telecom Italia, Java Agent Development (JADE) Framework, Rome, Italy jade.tilab.com
  • 35
    • 71649112806 scopus 로고    scopus 로고
    • Foundation for Intelligent Physical Agents, FIPA Specifications fipa.org/specifications/index.html
    • Foundation for Intelligent Physical Agents, FIPA Specifications fipa.org/specifications/index.html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.