-
1
-
-
37849038277
-
Effects of intentional threats to power substation control systems
-
Dondossola G., Szanto J., Masera M., and Nai Fovino I. Effects of intentional threats to power substation control systems. International Journal of Critical Infrastructures 4 1/2 (2008) 129-143
-
(2008)
International Journal of Critical Infrastructures
, vol.4
, Issue.1-2
, pp. 129-143
-
-
Dondossola, G.1
Szanto, J.2
Masera, M.3
Nai Fovino, I.4
-
3
-
-
55549137744
-
Security assessment of a turbo-gas power plant
-
Papa M., and Shenoi S. (Eds), Springer, Boston, Massachusetts
-
Masera M., Nai Fovino I., and Leszczyna R. Security assessment of a turbo-gas power plant. In: Papa M., and Shenoi S. (Eds). Critical Infrastructure Protection II (2008), Springer, Boston, Massachusetts 31-40
-
(2008)
Critical Infrastructure Protection II
, pp. 31-40
-
-
Masera, M.1
Nai Fovino, I.2
Leszczyna, R.3
-
5
-
-
34548049800
-
Industrial cybersecurity for a power system and SCADA networks-Be secure
-
Creery A., and Byres E. Industrial cybersecurity for a power system and SCADA networks-Be secure. IEEE Industry Applications 13 4 (2007) 49-55
-
(2007)
IEEE Industry Applications
, vol.13
, Issue.4
, pp. 49-55
-
-
Creery, A.1
Byres, E.2
-
6
-
-
36249028736
-
Security strategies for SCADA networks
-
Goetz E., and Shenoi S. (Eds), Springer, Boston, Massachusetts
-
Chandia R., Gonzalez J., Kilpatrick T., Papa M., and Shenoi S. Security strategies for SCADA networks. In: Goetz E., and Shenoi S. (Eds). Critical Infrastructure Protection (2007), Springer, Boston, Massachusetts 117-131
-
(2007)
Critical Infrastructure Protection
, pp. 117-131
-
-
Chandia, R.1
Gonzalez, J.2
Kilpatrick, T.3
Papa, M.4
Shenoi, S.5
-
7
-
-
70349341780
-
Distributed Network Protocol Version 3 security framework
-
M. Majdalawieh, F. Parisi-Presicce, D. Wijesekera, DNPSec, Distributed Network Protocol Version 3 security framework, in: Twenty-First Annual Computer Security Applications Conference, Technology Blitz Session, 2005
-
(2005)
Twenty-First Annual Computer Security Applications Conference, Technology Blitz Session
-
-
Majdalawieh, M.1
Parisi-Presicce, F.2
Wijesekera, D.3
DNPSec4
-
8
-
-
34548845042
-
A security mechanism for automation control in PLC-based networks
-
J. Heo, C. Hong, S. Ju, Y. Lim, B. Lee, D. Hyun, A security mechanism for automation control in PLC-based networks, in: Proceedings of the IEEE International Symposium on Power Line Communications and its Applications, 2007, pp. 466-470
-
(2007)
Proceedings of the IEEE International Symposium on Power Line Communications and its Applications
, pp. 466-470
-
-
Heo, J.1
Hong, C.2
Ju, S.3
Lim, Y.4
Lee, B.5
Hyun, D.6
-
9
-
-
42549107267
-
Data object based security for DNP3 over TCP/IP for increased utility of commercial aspects of security
-
T. Mander, F. Nabhani, L. Wang, R. Cheung, Data object based security for DNP3 over TCP/IP for increased utility of commercial aspects of security, in: Proceedings of the IEEE Power Engineering Society General Meeting, 2007, pp. 1-8
-
(2007)
Proceedings of the IEEE Power Engineering Society General Meeting
, pp. 1-8
-
-
Mander, T.1
Nabhani, F.2
Wang, L.3
Cheung, R.4
-
10
-
-
0030240880
-
Are good virus simulators still a bad idea?
-
Gordon S. Are good virus simulators still a bad idea?. Network Security 9 (1996) 7-13
-
(1996)
Network Security
, Issue.9
, pp. 7-13
-
-
Gordon, S.1
-
11
-
-
71649094167
-
-
British Computer Virus Research Centre, Brighton, United Kingdom
-
Hirst J. Virus Simulation Suite (1990), British Computer Virus Research Centre, Brighton, United Kingdom
-
(1990)
Virus Simulation Suite
-
-
Hirst, J.1
-
12
-
-
71649094898
-
Virlab 2.1, Geltendorf, Germany
-
T. Faistenhammer, M. Klock, K. Klotz, T. Kruger, P. Reinisch, J. Wagner, Virlab 2.1, Geltendorf, Germany kklotz.de/html/virlab.html
-
-
-
Faistenhammer, T.1
Klock, M.2
Klotz, K.3
Kruger, T.4
Reinisch, P.5
Wagner, J.6
-
13
-
-
71649106068
-
-
Rosenthal Engineering, Rosenthal Virus Simulator, San Luis Obispo, California, 1997
-
Rosenthal Engineering, Rosenthal Virus Simulator, San Luis Obispo, California, 1997
-
-
-
-
15
-
-
26844467276
-
Comparative study between analytical models and packet-level worm simulations
-
M. Sharif, G. Riley, W. Lee, Comparative study between analytical models and packet-level worm simulations, in: Proceedings of the Nineteenth Workshop on Principles of Advanced and Distributed Simulation, 2005, pp. 88-98
-
(2005)
Proceedings of the Nineteenth Workshop on Principles of Advanced and Distributed Simulation
, pp. 88-98
-
-
Sharif, M.1
Riley, G.2
Lee, W.3
-
17
-
-
14944368398
-
Worm propagation modeling and analysis under dynamic quarantine defense
-
C. Zou, W. Gong, D. Towsley, Worm propagation modeling and analysis under dynamic quarantine defense, in: Proceedings of the ACM Workshop on Rapid Malcode, 2003, pp. 51-60
-
(2003)
Proceedings of the ACM Workshop on Rapid Malcode
, pp. 51-60
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
-
18
-
-
18844367440
-
Simulating realistic network worm traffic for worm warning system design and testing
-
M. Liljenstam, D. Nicol, V. Berk, R. Gray, Simulating realistic network worm traffic for worm warning system design and testing, in: Proceedings of the ACM Workshop on Rapid Malcode, 2003, pp. 24-33
-
(2003)
Proceedings of the ACM Workshop on Rapid Malcode
, pp. 24-33
-
-
Liljenstam, M.1
Nicol, D.2
Berk, V.3
Gray, R.4
-
19
-
-
84880028758
-
A mixed abstraction level simulation model of large-scale Internet worm infestations
-
M. Liljenstam, Y. Yuan, B. Premore, D. Nicol, A mixed abstraction level simulation model of large-scale Internet worm infestations, in: Proceedings of the Tenth IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems, 2002, p. 109
-
(2002)
Proceedings of the Tenth IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems
, pp. 109
-
-
Liljenstam, M.1
Yuan, Y.2
Premore, B.3
Nicol, D.4
-
20
-
-
18844395616
-
Experiences with worm propagation simulations
-
A. Wagner, T. Dubendorfer, B. Plattner, R. Hiestand, Experiences with worm propagation simulations, in: Proceedings of the ACM Workshop on Rapid Malcode, 2003, pp. 34-41
-
(2003)
Proceedings of the ACM Workshop on Rapid Malcode
, pp. 34-41
-
-
Wagner, A.1
Dubendorfer, T.2
Plattner, B.3
Hiestand, R.4
-
21
-
-
0042474173
-
Requirements for containing self-propagating code
-
Internet quarantine
-
D. Moore, C. Shannon, G. Voelker, S. Savage, Internet quarantine: Requirements for containing self-propagating code, in: Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, 2003, pp. 1901-1910
-
(2003)
Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.3
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
24
-
-
26844560830
-
Distributed worm simulation with a realistic Internet model
-
S. Wei, J. Mirkovic, M. Swany, Distributed worm simulation with a realistic Internet model, in: Proceedings of the Nineteenth Workshop on Principles of Advanced and Distributed Simulation, 2005, pp. 71-79
-
(2005)
Proceedings of the Nineteenth Workshop on Principles of Advanced and Distributed Simulation
, pp. 71-79
-
-
Wei, S.1
Mirkovic, J.2
Swany, M.3
-
25
-
-
34047110218
-
Toward automated dynamic malware analysis using CWSandbox
-
Willems C., Holz T., and Freiling F. Toward automated dynamic malware analysis using CWSandbox. IEEE Security and Privacy 5 2 (2007) 32-39
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
26
-
-
71649103338
-
-
Norway
-
Norman, Norman SandBox, Lysaker, Norway www.norman.com/technology/norman_sandbox
-
Lysaker
-
-
-
27
-
-
65149100972
-
TTAnalyze: A tool for analyzing malware
-
U. Bayer, C. Kruegel, E. Kirda, TTAnalyze: A tool for analyzing malware, in: Proceedings of the Fifteenth Conference of the European Institute for Antivirus Research, 2006, pp. 180-192
-
(2006)
Proceedings of the Fifteenth Conference of the European Institute for Antivirus Research
, pp. 180-192
-
-
Bayer, U.1
Kruegel, C.2
Kirda, E.3
-
29
-
-
84923309529
-
MAlSim: Mobile agent malware simulator
-
R. Leszczyna, I. Nai Fovino, M. Masera, MAlSim: Mobile agent malware simulator, in: Proceedings of the First International Conference on Simulation Tools and Techniques for Communications, Networks and Systems, 2008
-
(2008)
Proceedings of the First International Conference on Simulation Tools and Techniques for Communications, Networks and Systems
-
-
Leszczyna, R.1
Nai Fovino, I.2
Masera, M.3
-
33
-
-
0029392001
-
Itinerant agents for mobile computing
-
Chess D., Grosof B., Harrison C., Levine D., Parris C., and Tsudik G. Itinerant agents for mobile computing. IEEE Personal Communications 2 5 (1995) 34-49
-
(1995)
IEEE Personal Communications
, vol.2
, Issue.5
, pp. 34-49
-
-
Chess, D.1
Grosof, B.2
Harrison, C.3
Levine, D.4
Parris, C.5
Tsudik, G.6
-
34
-
-
71649088128
-
-
Telecom Italia, Java Agent Development (JADE) Framework, Rome, Italy jade.tilab.com
-
Telecom Italia, Java Agent Development (JADE) Framework, Rome, Italy jade.tilab.com
-
-
-
-
35
-
-
71649112806
-
-
Foundation for Intelligent Physical Agents, FIPA Specifications fipa.org/specifications/index.html
-
Foundation for Intelligent Physical Agents, FIPA Specifications fipa.org/specifications/index.html
-
-
-
|