메뉴 건너뛰기




Volumn , Issue , 2010, Pages 679-686

An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants

Author keywords

Experimental platforms; ICT security; Scada systems

Indexed keywords

ARCHITECTURAL WEAKNESS; ATTACK SCENARIOS; COMPLEX SYSTEMS; EXPERIMENTAL PLATFORM; ICT SECURITY; NETWORKING TECHNOLOGY; SECURITY THREATS;

EID: 77955698013     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HSI.2010.5514494     Document Type: Conference Paper
Times cited : (73)

References (10)
  • 1
    • 34548049800 scopus 로고    scopus 로고
    • Industrial Cyber-security for power system and SCADA networks
    • July-Aug. 2007
    • Creery A, Byres E (2007) Industrial Cyber-security for power system and SCADA networks. IEEE Industry Application vol.13, no.4, pp.49-55, July-Aug. 2007
    • (2007) IEEE Industry Application , vol.13 , Issue.4 , pp. 49-55
    • Creery, A.1    Byres, E.2
  • 4
    • 42549107267 scopus 로고    scopus 로고
    • Data object based security for DNP3 over TCP/IP for increased utility commercial aspects security
    • Tampa, FL, USA, June 24-28. IEEE, Los Alamitos
    • Mander T, Nabhani F, Wang L, Cheung R (2007) Data Object Based Security for DNP3 Over TCP/IP for Increased Utility Commercial Aspects Security. In: Proceedings of the Power Engineering Society General Meeting, Tampa, FL, USA, June 24-28, pp. 1-8. IEEE, Los Alamitos (2007)
    • (2007) Proceedings of the Power Engineering Society General Meeting , vol.2007 , pp. 1-8
    • Mander, T.1    Nabhani, F.2    Wang, L.3    Cheung, R.4
  • 5
    • 1642559612 scopus 로고    scopus 로고
    • EPOCHS: Integrated COTS software for agent-based electric power and communication simulation
    • S. Chick, P. J. Sánchez, D. Ferrin, and D. J. Morrice, eds
    • Hopkinson K, Wang X, Giovanini R, Thorp J, Birman K, Coury D (2003) EPOCHS: Integrated COTS Software for Agent-Based Electric Power and Communication Simulation. In: Proceedings of the 2003 Winter Simulation Conference S. Chick, P. J. Sánchez, D. Ferrin, and D. J. Morrice, eds.
    • (2003) Proceedings of the 2003 Winter Simulation Conference
    • Hopkinson, K.1    Wang, X.2    Giovanini, R.3    Thorp, J.4    Birman, K.5    Coury, D.6
  • 7
    • 70349335710 scopus 로고    scopus 로고
    • Scada Malware, a proof of concept
    • Proceedings of the 3rd International Workshop on Critical Information Infrastructures Security, October 13-15 2008, Frascati, Rome, Italy
    • Nai Fovino I, Carcano A, Masera M and Trombetta A (2008) Scada Malware, a proof of concept. In: Proceedings of the 3rd International Workshop on Critical Information Infrastructures Security, October 13-15 2008, Frascati, Rome, Italy. LNCS 5508, pages 211-222
    • (2008) LNCS , vol.5508 , pp. 211-222
    • Nai Fovino, I.1    Carcano, A.2    Masera, M.3    Trombetta, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.