-
1
-
-
0142238684
-
-
Prentice- Hall, Upper Saddle River, New Jersey
-
B. Bequette, Process Control: Modeling, Design and Simulation, Prentice- Hall, Upper Saddle River, New Jersey, 2002.
-
(2002)
Process Control: Modeling, Design and Simulation
-
-
Bequette, B.1
-
2
-
-
33847767196
-
Safeguarding SCADA systems with anomaly detection
-
J. Bigham, D. Gamez and N. Lu, Safeguarding SCADA systems with anomaly detection, Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, pp. 171-182, 2003.
-
(2003)
Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security
, pp. 171-182
-
-
Bigham, J.1
Gamez, D.2
Lu, N.3
-
3
-
-
22344444992
-
-
Department of Computer Science, University of Victoria, Victoria, Canada
-
E. Byres and D. Hoffman, The Myths and Facts behind Cyber Security Risks for Industrial Control Systems, Technical Report, Department of Computer Science, University of Victoria, Victoria, Canada, 2004.
-
(2004)
The Myths and Facts behind Cyber Security Risks for Industrial Control Systems, Technical Report
-
-
Byres, E.1
Hoffman, D.2
-
4
-
-
67650535901
-
Rethinking security properties, threat models and the design space in sensor networks: A case study in SCADA systems
-
A. Cardenas, T. Roosta and S. Sastry, Rethinking security properties, threat models and the design space in sensor networks: A case study in SCADA systems, Ad Hoc Networks, vol. 7(8), pp. 1434-1447, 2009.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1434-1447
-
-
Cardenas, A.1
Roosta, T.2
Sastry, S.3
-
5
-
-
70350634504
-
Using model-based intrusion detection for SCADA networks
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner and A. Valdes, Using model-based intrusion detection for SCADA networks, Proceedings of the SCADA Security Scientific Symposium, pp. 127-134, 2007.
-
(2007)
Proceedings of the SCADA Security Scientific Symposium
, pp. 127-134
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
6
-
-
50849130209
-
Attack and fault identification in electric power control systems: An approach to improve the security
-
M. Coutinho, G. Lambert-Torres, L. da Silva, J. da Silva, J. Neto, E. da Costa Bortoni and H. Lazarek, Attack and fault identification in electric power control systems: An approach to improve the security, Proceedings of the PowerTech Conference, pp. 103-107, 2007.
-
(2007)
Proceedings of the PowerTech Conference
, pp. 103-107
-
-
Coutinho, M.1
Lambert-Torres, G.2
Da Silva, L.3
Da Silva, J.4
Neto, J.5
Da Costa Bortoni, E.6
Lazarek, H.7
-
9
-
-
84857378372
-
Safeguarding critical infrastructures
-
H. Diab and A. Zomaya (Eds.), Wiley-Interscience, Hoboken, New Jersey
-
D. Gamez, S. Nadjm-Tehrani, J. Bigham, C. Balducelli, K. Burbeck and T. Chyssler, Safeguarding critical infrastructures, in Dependable Computing Systems: Paradigms, Performance Issues and Applications, H. Diab and A. Zomaya (Eds.), Wiley-Interscience, Hoboken, New Jersey, 2005.
-
(2005)
Dependable Computing Systems: Paradigms, Performance Issues and Applications
-
-
Gamez, D.1
Nadjm-Tehrani, S.2
Bigham, J.3
Balducelli, C.4
Burbeck, K.5
Chyssler, T.6
-
11
-
-
70149102885
-
Understanding the physical and economic consequences of attacks on control systems
-
Y. Huang, A. Cardenas, S. Amin, Z. Lin, H. Tsai and S. Sastry, Understanding the physical and economic consequences of attacks on control systems, International Journal of Critical Infrastructure Protection, vol. 2(3), pp. 73-83, 2009.
-
(2009)
International Journal of Critical Infrastructure Protection
, vol.2
, Issue.3
, pp. 73-83
-
-
Huang, Y.1
Cardenas, A.2
Amin, S.3
Lin, Z.4
Tsai, H.5
Sastry, S.6
-
17
-
-
0003398906
-
-
Cambridge University Press, Cambridge, United Kingdom
-
J. Pearl, Causality: Models, Reasoning and Inference, Cambridge University Press, Cambridge, United Kingdom, 2009.
-
(2009)
Causality: Models, Reasoning and Inference
-
-
Pearl, J.1
-
18
-
-
84891760516
-
Detecting anomalies in process control networks
-
C. Palmer and S. Shenoi (Eds.), Springer, Heidelberg, Germany
-
J. Rrushi and K. Kang, Detecting anomalies in process control networks, in Critical Infrastructure Protection III, C. Palmer and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 151-165, 2009.
-
(2009)
Critical Infrastructure Protection III
, pp. 151-165
-
-
Rrushi, J.1
Kang, K.2
-
19
-
-
0031253251
-
Automated control and monitoring of thermal processing using high temperature, short time pasteurization
-
J. Schlesser, D. Armstrong, A. Cinar, P. Ramanauskas and A. Negiz, Automated control and monitoring of thermal processing using high temperature, short time pasteurization, Journal of Dairy Science, vol. 80(10), pp. 2291-2296, 1997.
-
(1997)
Journal of Dairy Science
, vol.80
, Issue.10
, pp. 2291-2296
-
-
Schlesser, J.1
Armstrong, D.2
Cinar, A.3
Ramanauskas, P.4
Negiz, A.5
-
20
-
-
55549120913
-
Modeling and detecting anomalies in SCADA systems
-
M. Papa and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
N. Svendsen and S. Wolthusen, Modeling and detecting anomalies in SCADA systems, in Critical Infrastructure Protection II, M. Papa and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 101-113, 2008.
-
(2008)
Critical Infrastructure Protection II
, pp. 101-113
-
-
Svendsen, N.1
Wolthusen, S.2
-
22
-
-
49949106302
-
Spatiotemporal anomaly detection in gas monitoring sensor networks
-
X. Wang, J. Lizier, O. Obst, M. Prokopenko and P. Wang, Spatiotemporal anomaly detection in gas monitoring sensor networks, Proceedings of the Fifth European Conference on Wireless Sensor Networks, pp. 90-105, 2008.
-
(2008)
Proceedings of the Fifth European Conference on Wireless Sensor Networks
, pp. 90-105
-
-
Wang, X.1
Lizier, J.2
Obst, O.3
Prokopenko, M.4
Wang, P.5
|