-
1
-
-
79954423893
-
-
BBC News, Stuxnet worm hits Iran nuclear plant staff computers, September 26
-
BBC News, Stuxnet worm hits Iran nuclear plant staff computers, September 26, 2010. http://www.bbc.co.uk/news/world-middle-east-11414483.
-
(2010)
-
-
-
2
-
-
79251619734
-
Siemens: stuxnet worm hit industrial systems
-
McMillan Robert Siemens: stuxnet worm hit industrial systems. Computerworld 2010, http://www.computerworld.com/s/article/print/9185419/Siemens_Stuxnet_worm_hit_industrial_systems?taxonomyName=Network+Security%26taxonomyId=142.
-
(2010)
Computerworld
-
-
McMillan, R.1
-
3
-
-
79954420833
-
-
W32. Stuxnet Dossier, Version 1.3, November. URL: (accessed on: 14.01.10).
-
N. Falliere, L.O. Murchu, E. Chien, W32. Stuxnet Dossier, Version 1.3, November 2010. URL: (accessed on: 14.01.10). http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf.
-
(2010)
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
4
-
-
79954420516
-
-
Krutz, Securing SCADA systems, Wiley Publishing, Indianapolis, Indiana.
-
Ronald L. Krutz, Securing SCADA systems, 2006 Wiley Publishing, Indianapolis, Indiana.
-
(2006)
-
-
Ronald, L.1
-
5
-
-
79954414974
-
-
John Leyden, Polish teen derails tram after hacking train network, The Register, January 11
-
John Leyden, Polish teen derails tram after hacking train network, The Register, January 11, 2008. http://www.theregister.co.uk/2008/01/11/tram_hack/.
-
(2008)
-
-
-
6
-
-
79954416311
-
-
A Shortlist of Reported SCADA. Incidents at
-
A Shortlist of Reported SCADA. Incidents at: http://ciip.wordpress.com/2009/06/21/a-list-of-reported-scada-incidents/.
-
-
-
-
7
-
-
79954425885
-
-
CNN, Sources: staged cyber attack reveals vulnerability in power grid.
-
CNN, Sources: staged cyber attack reveals vulnerability in power grid. http://www.cnn.com/2007/US/09/26/power.at.risk/index.html.
-
-
-
-
8
-
-
79954420580
-
-
NIST SP 800-82, Guide to industrial control systems (ICS) security, Draft for Public Comment, September 29
-
NIST SP 800-82, Guide to industrial control systems (ICS) security, Draft for Public Comment, September 29, 2008. http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82-fpd.pdf.
-
(2008)
-
-
-
9
-
-
31944451961
-
Security of critical control systems sparks concern
-
Geer D. Security of critical control systems sparks concern. Computer 2006, 39(1):20-23.
-
(2006)
Computer
, vol.39
, Issue.1
, pp. 20-23
-
-
Geer, D.1
-
10
-
-
33751327214
-
Developing a solid SCADA security strategy
-
[Conference Paper] SIcon/02, Sensors for Industry Conference, Proceedings of the ISA/IEEE, IEEE Cat. No. 02EX626, Research Triangle Park, NC, USA
-
J. Pollet, Developing a solid SCADA security strategy, in: [Conference Paper] SIcon/02, Sensors for Industry Conference, Proceedings of the ISA/IEEE, IEEE Cat. No. 02EX626, Research Triangle Park, NC, USA, 2002, pp. 148-156.
-
(2002)
, pp. 148-156
-
-
Pollet, J.1
-
11
-
-
79954425502
-
-
North American Electric Reliability Corporation (NERC) control systems security working group, Top 10 vulnerabilities of control systems and their associated mitigations, 2007, US Department of Energy National SCADA Test Bed Program, March 22
-
North American Electric Reliability Corporation (NERC) control systems security working group, Top 10 vulnerabilities of control systems and their associated mitigations, 2007, US Department of Energy National SCADA Test Bed Program, March 22, 2007.
-
(2007)
-
-
-
12
-
-
79954419807
-
-
IEC Standards. Available at
-
IEC Standards. Available at: http://www.iec.ch/.
-
-
-
-
13
-
-
79954426473
-
-
http://www.iso.org/iso/support/faqs/faqs_widely_used_standards/widely_used_standards_other/information_security.htm.
-
-
-
-
14
-
-
79954423686
-
-
NIST 800-53, Recommended security controls for federal information systems.
-
NIST 800-53, Recommended security controls for federal information systems. http://csrc.nist.gov/publications/nistpubs/800-53-Rev2/sp800-53-rev2-final.pdf.
-
-
-
-
15
-
-
79954418915
-
-
American Petrolium Institute, Pipeline SCADA Security, 2nd ed., 06/01/09.
-
American Petrolium Institute, Pipeline SCADA Security, 2nd ed., 06/01/09.
-
-
-
-
16
-
-
79954424735
-
-
Security content automation protocol-open checklist interactive language.
-
Security content automation protocol-open checklist interactive language. http://scap.nist.gov/specifications/ocil/.
-
-
-
-
17
-
-
79954425957
-
-
The technical specification for the security content automation protocol (SCAP): SCAP version 1.1 (DRAFT).
-
The technical specification for the security content automation protocol (SCAP): SCAP version 1.1 (DRAFT). http://csrc.nist.gov/publications/drafts/800-126-r1/draft-sp800-126r1-jan2011.pdf.
-
-
-
-
18
-
-
49049111141
-
A non-intrusive approach to enhance legacy embedded control systems with cyber protection features
-
Third International Conference on Availability, Reliability and Security, 2008, ARES 08, 4-7 March
-
Shangping Ren, Kevin Kwiat, A non-intrusive approach to enhance legacy embedded control systems with cyber protection features, in: Third International Conference on Availability, Reliability and Security, 2008, ARES 08, 4-7 March 2008, pp. 1180-1187.
-
(2008)
, pp. 1180-1187
-
-
Ren, S.1
Kwiat, K.2
-
20
-
-
79954425315
-
-
http://www.modbus.org/.
-
-
-
-
21
-
-
36249007497
-
Intrusion detection and event monitoring in SCADA networks
-
Springer, New York, NY, Chapter 12 in, E. Goetz, S. Shenoi (Eds.)
-
Oman P., Phillips M. Intrusion detection and event monitoring in SCADA networks. Critical Infrastructure Protection 2007, 161-174. Springer, New York, NY, Chapter 12 in. E. Goetz, S. Shenoi (Eds.).
-
(2007)
Critical Infrastructure Protection
, pp. 161-174
-
-
Oman, P.1
Phillips, M.2
-
22
-
-
77954796687
-
A testbed for secure and robust SCADA systems
-
Giani Annarita, Karsai Gabor, Roosta Tanya, Shah Aakash, Sinopoli Bruno, Wiley Jon A testbed for secure and robust SCADA systems. ACM SIGBED Review 2008, 5(2).
-
(2008)
ACM SIGBED Review
, vol.5
, Issue.2
-
-
Giani, A.1
Karsai, G.2
Roosta, T.3
Shah, A.4
Sinopoli, B.5
Wiley, J.6
-
23
-
-
79954421136
-
Intrusion detection via instrumented software
-
1st CATARS Workshop at the 38th IEEE/ IFIP Intl. Conf. on Dependable Systems & Networks, Anchorage, Alaska
-
William Mahoney, William Sousan, Intrusion detection via instrumented software, in: 1st CATARS Workshop at the 38th IEEE/ IFIP Intl. Conf. on Dependable Systems & Networks, Anchorage, Alaska, 2008.
-
(2008)
-
-
William, M.1
William, S.2
-
24
-
-
65249176835
-
Design, realization and evaluation of a component-based, compositional network simulation environment
-
Tyan H.Y., Sobeih A., Hou J.C. Design, realization and evaluation of a component-based, compositional network simulation environment. Simulation 2009, 85(3):159-181. 10.1177/0037549708099998.
-
(2009)
Simulation
, vol.85
, Issue.3
, pp. 159-181
-
-
Tyan, H.Y.1
Sobeih, A.2
Hou, J.C.3
-
26
-
-
79954417676
-
-
ADACS-a language for monitoring regulatory compliance in control systems, in: Second Workshop on Compiler and Architectural Techniques for Application Reliability and Security, the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Estoril, Portugal.
-
Robin Gandhi, William Mahoney, Ken Dick, ADACS-a language for monitoring regulatory compliance in control systems, in: Second Workshop on Compiler and Architectural Techniques for Application Reliability and Security, the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Estoril, Portugal.
-
-
-
Robin, G.1
William, M.2
Ken, D.3
-
28
-
-
0018918712
-
Specifying software requirements for complex systems: new techniques and their application
-
Heninger K.L. Specifying software requirements for complex systems: new techniques and their application. IEEE Transactions on Software Engineering 1980, 6(1):2-13.
-
(1980)
IEEE Transactions on Software Engineering
, vol.6
, Issue.1
, pp. 2-13
-
-
Heninger, K.L.1
-
29
-
-
0032596611
-
A policy description language
-
Proc. 16th Conf. on AI, AAAI, CA, July
-
J. Lobo, R. Bhatia, S. Naqvi, A policy description language, in: Proc. 16th Conf. on AI, AAAI, CA, July 1999, pp. 291-298.
-
(1999)
, pp. 291-298
-
-
Lobo, J.1
Bhatia, R.2
Naqvi, S.3
-
30
-
-
79954417883
-
-
The JavaTM Virtual Machine Specification-Second Edition.
-
Tim Lindholm, Frank Yellin, The JavaTM Virtual Machine Specification-Second Edition. http://java.sun.com/docs/books/jvms/second_edition/html/VMSpecTOC.doc.html.
-
-
-
Tim, L.1
Frank, Y.2
-
32
-
-
79954422468
-
-
http://www.w3.org/TR/xpath20/.
-
-
-
-
34
-
-
79954425263
-
-
OWL 2 Web ontology language document overview, W3C Recommendation 27 October
-
OWL 2 Web ontology language document overview, W3C Recommendation 27 October 2009. http://www.w3.org/TR/owl2-overview/.
-
(2009)
-
-
-
35
-
-
79954416375
-
-
NERC standards CIP-002-2 through CIP-009-2.
-
NERC standards CIP-002-2 through CIP-009-2. http://www.nerc.com/filez/standards/Project_2008-06_Cyber_Security.html.
-
-
-
|