-
1
-
-
33750405289
-
Security issues in SCADA networks
-
V. M. Igure, S. A. Laugher, and R. D. Williams, "Security issues in SCADA networks," Computers & Security Vol. 25, pp. 498-506, 2006.
-
(2006)
Computers & Security
, vol.25
, pp. 498-506
-
-
Igure, V.M.1
Laugher, S.A.2
Williams, R.D.3
-
2
-
-
77955220977
-
A Treatise on electricity and magnetism
-
3rd ed. Oxford: Clar IEC technical committee 57, " IEC 62351-62361, May
-
J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol.2. Oxford: Clar IEC technical committee 57, "Part 1: Communication network and system security - Introduction to security issues," IEC 62351-62361, May 2007.
-
(2007)
Part 1: Communication Network and System Security - Introduction to Security Issues
, vol.2
-
-
Maxwell, J.C.1
-
3
-
-
77955226337
-
-
DNP User Group
-
DNP User Group, http://www.dnp.org.
-
-
-
-
7
-
-
77950187312
-
SKMA-A key management architecture for SCADA Systems
-
R. Dawson, C. Boyd, E. Dawson, and J.M.G. Nieto, "SKMA-A Key Management Architecture for SCADA Systems," Proceedings of the Australasian workshops on Grid computing and e-research, 2006.
-
(2006)
Proceedings of the Australasian Workshops on Grid Computing and E-research
-
-
Dawson, R.1
Boyd, C.2
Dawson, E.3
Nieto, J.M.G.4
-
8
-
-
17744384943
-
-
Technical Report, SANDIA
-
C. Beaver, D. Gallup, W. Neuman, and M. Torgerson, "Key management for SCADA," Technical Report, SANDIA, 2002.
-
(2002)
Key Management for SCADA
-
-
Beaver, C.1
Gallup, D.2
Neuman, W.3
Torgerson, M.4
-
9
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
September
-
B. Clifford Neuman and T. Tso, "Kerberos: An authentication service for computer networks", IEEE Communications Magazine, Vol.32, No.9, pp33-28, September 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-28
-
-
Clifford Neuman, B.1
Tso, T.2
-
13
-
-
70350634504
-
Using Model-based intrusion detection for SCADA networks
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, and K. Skinner, "Using Model-based Intrusion Detection for SCADA Networks," SCADA Security Scientific Symposium, 2007.
-
(2007)
SCADA Security Scientific Symposium
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
-
14
-
-
84874453480
-
Detecting attacks in power plant interfacing substations through probabilistic validation of attack-effect bindings
-
J.L. Rrushi and R. H. Campbell, "Detecting Attacks in Power Plant Interfacing Substations through Probabilistic Validation of Attack-Effect Bindings," SCADA Security Scientific Symposium, 2008.
-
(2008)
SCADA Security Scientific Symposium
-
-
Rrushi, J.L.1
Campbell, R.H.2
-
17
-
-
77955222095
-
Data and communications security
-
IEC technical committee 57, December, Part 5: Security for IEC 60870-5 and derivatives
-
IEC technical committee 57, "Data and Communications Security, Part 5: Security for IEC 60870-5 and derivatives," IEC 62351-62355 Second Committee Draft, December 2005.
-
(2005)
IEC 62351-62355 Second Committee Draft
-
-
-
21
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
February
-
H. Krawcryk, M. Bellare, and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication", RFC 2104, February 1997.
-
(1997)
RFC
, vol.2104
-
-
Krawcryk, H.1
Bellare, M.2
Canetti, R.3
-
22
-
-
73849146820
-
Security protocols against cyber attacks in the distribution automation system
-
I. H. Lim, S. Hong, M. S. Choi, S.J. Lee, T. W. Kim, S. W. Lee, and B. N. Ha, "Security Protocols Against Cyber Attacks in the Distribution Automation System," IEEE Tran. on Power Delivery, Vol.25, No 1, Jan. 2010.
-
(2010)
IEEE Tran. on Power Delivery
, vol.25
, Issue.1
-
-
Lim, I.H.1
Hong, S.2
Choi, M.S.3
Lee, S.J.4
Kim, T.W.5
Lee, S.W.6
Ha, B.N.7
-
23
-
-
0003195066
-
The MD5 Message-Digest algorithms
-
April
-
R. Rivest, "The MD5 Message-Digest Algorithms", RFC 1321, April 1992.
-
(1992)
RFC
, vol.1321
-
-
Rivest, R.1
-
24
-
-
0031199999
-
Eliminating receive livelock in an interrupted-driven kernel
-
J. C. Mogul and K. K. Ramakrishnanl "Eliminating receive livelock in an interrupted-driven kernel," ACM Trans. On Computer System, Vol.15, No 3, pp217-252, 1997.
-
(1997)
ACM Trans. on Computer System
, vol.15
, Issue.3
, pp. 217-252
-
-
Mogul, J.C.1
Ramakrishnanl, K.K.2
-
25
-
-
77955177566
-
Device polling support for freeBSD
-
L. Rizzo, "Device Polling support for FreeBSD," the EuroBSDCon 2001.
-
(2001)
The EuroBSDCon
-
-
Rizzo, L.1
-
28
-
-
38049136694
-
Packet capture in 10-gigabit ethernet environments using contemporary commodity hardware
-
F. Schneider, J. Wallerich, and A. Feldmann, "Packet Capture in 10-Gigabit Ethernet Environments Using Contemporary Commodity Hardware," LNCS 4427, pp207-217, 2007.
-
(2007)
LNCS
, vol.4427
, pp. 207-217
-
-
Schneider, F.1
Wallerich, J.2
Feldmann, A.3
-
30
-
-
28444470490
-
Performance, energy, and thermal considerations for SMT and CMP architectures
-
endon
-
Y. Li, D. Brooks, Z. Hu, K. Shadron, "Performance, Energy, and Thermal Considerations for SMT and CMP Architectures," 11th International Symposium on High-Performance Computer Architecture, 2005.endon, 1892, pp.68-73.
-
(2005)
11th International Symposium on High-Performance Computer Architecture
, vol.1892
, pp. 68-73
-
-
Li, Y.1
Brooks, D.2
Hu, Z.3
Shadron, K.4
|