메뉴 건너뛰기




Volumn 5141 LNCS, Issue , 2008, Pages 246-260

Ideal based cyber security technical metrics for control systems

Author keywords

Control System Security; Cyber Security Metrics

Indexed keywords

ABSTRACT DIMENSIONS; CONTROL SYSTEM SECURITY; CRITICAL INFRASTRUCTURE; CYBER SECURITY; ELECTRONIC NETWORKS; MANAGEMENT DECISIONS; OBJECTIVE MEASUREMENT; OPERATIONAL CONTROL; SECURITY METRICS; TECHNICAL OBJECTS; TECHNICAL SECURITY;

EID: 77953715289     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-89173-4_21     Document Type: Conference Paper
Times cited : (37)

References (17)
  • 4
    • 77953698571 scopus 로고    scopus 로고
    • Idaho National Laboratory Report to the Department of Homeland Security, INL/EXT-06-12016, December 2006
    • Idaho National Laboratory Report to the Department of Homeland Security, INL/EXT-06-12016, Cyber Security Metrics (December 2006)
    • Cyber Security Metrics
  • 8
    • 3543072024 scopus 로고    scopus 로고
    • An Overview of Issues in Testing Intrusion Detection Systems
    • National Institute of Standards and Technology, Gaithersburg, Maryland June
    • Mell, P., Hu, V., Lippmann, R., Haines, J., Zissman, M.: An Overview of Issues in Testing Intrusion Detection Systems. In: Interagency Report (IR) 7007, National Institute of Standards and Technology, Gaithersburg, Maryland (June 2003)
    • (2003) Interagency Report (IR) 7007
    • Mell, P.1    Hu, V.2    Lippmann, R.3    Haines, J.4    Zissman, M.5
  • 14
    • 0003487308 scopus 로고    scopus 로고
    • Wiley, Chichester
    • Schneier, B.: Secrets & Lies, pp. 367-380. Wiley, Chichester (2000)
    • (2000) Secrets & Lies , pp. 367-380
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.