-
1
-
-
0030714531
-
Network security considerations in TCP/IP-based manufacturing automation
-
PII S0019057897000062
-
M. S. DePriest, "Network security considerations in TCP/IP-based manufacturing automation," ISA Transactions, vol. 36, no. 1, pp. 37-48, 1997. (Pubitemid 127756622)
-
(1997)
ISA Transactions
, vol.36
, Issue.1
, pp. 37-48
-
-
Depriest, M.S.1
-
3
-
-
33750405289
-
Security issues in SCADA networks
-
DOI 10.1016/j.cose.2006.03.001, PII S0167404806000514
-
V. M. Igure, S. A. Laughter, and R. D. Williams, "Security issues in SCADA networks," Comput. Security, vol. 25, no. 7, pp. 498-506, 2006. (Pubitemid 44637241)
-
(2006)
Computers and Security
, vol.25
, Issue.7
, pp. 498-506
-
-
Igure, V.M.1
Laughter, S.A.2
Williams, R.D.3
-
4
-
-
58849164843
-
Security for process control systems: An overview
-
M. Brändle and M. Naedele, "Security for process control systems: An overview," IEEE Security and Privacy, vol. 6, no. 6, pp. 24-29, 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.6
, pp. 24-29
-
-
Brändle, M.1
Naedele, M.2
-
5
-
-
27644559364
-
Trends in process control systems security
-
DOI 10.1109/MSP.2005.136
-
A. Miller, "Trends in process control systems security," IEEE Security and Privacy, vol. 3, no. 5, pp. 57-60, 2005. (Pubitemid 41560446)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.5
, pp. 57-60
-
-
Miller, A.1
-
6
-
-
34548017452
-
Cyber security risk assessment for SCADA and DCS networks
-
DOI 10.1016/j.isatra.2007.04.003, PII S0019057807000754
-
P. Ralston, J. Graham, and J. Hieb, "Cyber security risk assessment for SCADA and DCS networks," ISA Transactions, vol. 46, no. 4, pp. 583-594, 2007. (Pubitemid 47284077)
-
(2007)
ISA Transactions
, vol.46
, Issue.4
, pp. 583-594
-
-
Ralston, P.A.S.1
Graham, J.H.2
Hieb, J.L.3
-
9
-
-
70449625225
-
Plaintext recovery attacks against SSH
-
M. R. Albrecht, K. G. Paterson, and G. J. Watson, "Plaintext recovery attacks against SSH," in Proc. IEEE Symp. Security and Privacy, 2009, pp. 16-26.
-
(2009)
Proc. IEEE Symp. Security and Privacy
, pp. 16-26
-
-
Albrecht, M.R.1
Paterson, K.G.2
Watson, G.J.3
-
10
-
-
35248848850
-
Attacking RSA-based sessions in SSL/TLS
-
V. Klíma, O. Pokorny, and T. Rosa, "Attacking RSA-based sessions in SSL/TLS," Cryptographic Hardware and Embedded Systems, pp. 426-440, 2003.
-
(2003)
Cryptographic Hardware and Embedded Systems
, pp. 426-440
-
-
Klíma, V.1
Pokorny, O.2
Rosa, T.3
-
12
-
-
67349092251
-
Detecting chains of vulnerabilities in industrial networks
-
May
-
M. Cheminod, I. Bertolotti, L. Durante, P. Maggi, D. Pozza, R. Sisto, and A.Valenzano, "Detecting chains of vulnerabilities in industrial networks," IEEE Trans. Ind. Informat., vol. 5, no. 2, pp. 181-193, May 2009.
-
(2009)
IEEE Trans. Ind. Informat.
, vol.5
, Issue.2
, pp. 181-193
-
-
Cheminod, M.1
Bertolotti, I.2
Durante, L.3
Maggi, P.4
Pozza, D.5
Sisto, R.6
Valenzano, A.7
-
13
-
-
0037056208
-
Achievement of secure Internet access to fieldbus systems
-
DOI 10.1016/S0141-9331(02)00044-3, PII S0141933102000443
-
T. Sauter and C. Schwaiger, "Achievement of secure Internet access to fieldbus systems," Microprocessors and Microsystems, vol. 26, no. 7, pp. 331-339, 2002. (Pubitemid 34862748)
-
(2002)
Microprocessors and Microsystems
, vol.26
, Issue.7
, pp. 331-339
-
-
Sauter, T.1
Schwaiger, C.2
-
14
-
-
36248966550
-
Security analysis of multilayer SCADA protocols
-
J. Edmonds, M. Papa, and S. Shenoi, "Security analysis of multilayer SCADA protocols," Critical Infrastructure Protection, pp. 205-221, 2007.
-
(2007)
Critical Infrastructure Protection
, pp. 205-221
-
-
Edmonds, J.1
Papa, M.2
Shenoi, S.3
-
15
-
-
36248990245
-
Formal modeling and analysis of the modbus protocol
-
B. Dutertre, "Formal modeling and analysis of the modbus protocol," Critical Infrastructure Protection, pp. 189-204, 2007.
-
(2007)
Critical Infrastructure Protection
, pp. 189-204
-
-
Dutertre, B.1
-
17
-
-
17644411480
-
Mobile values, new names and secure communication
-
M. Abadi and C. Fournet, "Mobile values, new names and secure communication," ACM Special Interest Group on Programming Languages, vol. 36, no. 3, pp. 104-115, 2001.
-
(2001)
ACM Special Interest Group on Programming Languages
, vol.36
, Issue.3
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
18
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. C.-C. Yao, "On the security of public key protocols," IEEE Trans. Inform. Theory, vol. 29, pp. 198-207, 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, pp. 198-207
-
-
Dolev, D.1
Yao, A.C.-C.2
-
19
-
-
3042538605
-
Multiset rewriting and the complexity of bounded security protocols
-
N. A. Durgin, P. Lincoln, and J. C. Mitchell, "Multiset rewriting and the complexity of bounded security protocols," J. Comput. Security, vol. 12, no. 2, pp. 247-311, 2004.
-
(2004)
J. Comput. Security
, vol.12
, Issue.2
, pp. 247-311
-
-
Durgin, N.A.1
Lincoln, P.2
Mitchell, J.C.3
-
20
-
-
33845212195
-
Verified reference implementations of WS-security protocols
-
Web Services and Formal Methods - Third International Workshop, WS-FM 2006, Proceedings
-
K. Bhargavan, C. Fournet, and A. D. Gordon, "Verified reference implementations of WS-security protocols," Web Services and Formal Methods, pp. 88-106, 2006. (Pubitemid 44849753)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4184
, pp. 88-106
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
21
-
-
35048861871
-
Just fast keying in the Pi calculus
-
M. Abadi, B. Blanchet, and C. Fournet, "Just fast keying in the Pi calculus," in Proc. Eur. Symp. Program., 2004, pp. 340-354.
-
(2004)
Proc. Eur. Symp. Program.
, pp. 340-354
-
-
Abadi, M.1
Blanchet, B.2
Fournet, C.3
-
22
-
-
17744372555
-
Security measures for industrial fieldbus systems - State of the art and solutions for IP-based approaches
-
2004 IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS 2004
-
A. Treytl, T. Sauter, and C. Schwaiger, "Security measures for industrial fieldbus systems-state of the art and solutions for IP-based approaches," in Int. Workshop on Factory Commun. Syst., 2004, pp. 201-209. (Pubitemid 40575220)
-
(2004)
IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS
, pp. 201-209
-
-
Treytl, A.1
Sauter, T.2
Schwaiger, C.3
-
24
-
-
0030708255
-
A hierarchy of authentication specifications
-
G. Lowe, "A hierarchy of authentication specifications," in Computer Security Foundations Workshop, 1997, pp. 31-43.
-
(1997)
Computer Security Foundations Workshop
, pp. 31-43
-
-
Lowe, G.1
-
25
-
-
24344493908
-
Computer-assisted verification of a protocol for certified email
-
DOI 10.1016/j.scico.2005.02.002, PII S0167642305000420, Static Analysis Symposium 2003
-
M. Abadi and B. Blanchet, "Computer-assisted verification of a protocol for certified email," Sci. Comput. Program., vol. 58, no. 1-2, pp. 3-27, 2005. (Pubitemid 41261375)
-
(2005)
Science of Computer Programming
, vol.58
, Issue.1-2
, pp. 3-27
-
-
Abadi, M.1
Blanchet, B.2
|