-
1
-
-
78650062267
-
-
November last accessed 01-20-11. [Online]
-
N. Falliere, L. O. Murchu, and E. Chien, "W32. Stuxnet Dossier," Symantec Security, November 2010, last accessed 01-20-11. [Online]. Available: http://www.symantec.com/content/en/us/enterprise/media/ security-response/whitepapers/w32-stuxnet-dossier.pdf
-
(2010)
W32. Stuxnet Dossier
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
2
-
-
12144273705
-
-
Power System Outage Task Force U.S. and Canada last accessed 01-31-11. [Online]
-
"Final Report on the August 14th Blackout in the United States and Canada," Power System Outage Task Force U.S. and Canada, 2004, last accessed 01-31-11. [Online]. Available: https://reports.energy.gov/ BlackoutFinal-Web.pdf
-
(2004)
Final Report on the August 14th Blackout in the United States and Canada
-
-
-
3
-
-
70350155232
-
Security as a systems property
-
S. M. Bellovin and D. G. Conway, "Security as a Systems Property," IEEE Security and Privacy, vol. 7, no. 5, p. 88, 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.5
, pp. 88
-
-
Bellovin, S.M.1
Conway, D.G.2
-
4
-
-
0037251378
-
Language-based information-flow security
-
Jan
-
A. Sabelfeld and A. Myers, "Language-Based Information-Flow Security," IEEE Journal on Selected Areas in Communications, vol. 21, no. 1, pp. 5-19, Jan 2003.
-
(2003)
IEEE Journal on Selected Areas in Communications
, vol.21
, Issue.1
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.2
-
7
-
-
0038118932
-
A model of information
-
Baltimore, MD, September
-
D. Sutherland, "A Model of Information," in Proceeding of the 9th National Computer Security Conference, Baltimore, MD, September 1986, pp. 175-183.
-
(1986)
Proceeding of the 9th National Computer Security Conference
, pp. 175-183
-
-
Sutherland, D.1
-
8
-
-
84881225236
-
Enforceable security policies
-
F. B. Schneider, "Enforceable Security Policies," ACM Transactions on Information and System Security TISSEC, vol. 3, no. 1, pp. 30-50, 2000.
-
(2000)
ACM Transactions on Information and System Security TISSEC
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
9
-
-
0002426876
-
A general theory of composition for a class of "possibilistic" properties
-
J. McLean, "A General Theory of Composition for a Class of "Possibilistic" Properties," IEEE Transactions on Software Engineering, vol. 22, no. 1, pp. 53-67, 1996. (Pubitemid 126771658)
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 53-67
-
-
McLean, J.1
-
10
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
DOI 10.1007/s10207-004-0046-8
-
J. Ligatti, L. Bauer, and D. Walker, "Edit Automata: Enforcement Mechanisms for Run-time Security Policies," International Journal of Information Security, vol. 4, no. 1-2, pp. 2-16, Feb 2005. (Pubitemid 40347198)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
12
-
-
33750931965
-
Run-time detection of covert channels
-
DOI 10.1109/ARES.2006.114, 1625360, Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
-
N. Nagatou and T. Watanabe, "Run-Time Detection of Covert Channels," in ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security, 2006, pp. 577-584. (Pubitemid 44732694)
-
(2006)
Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
, vol.2006
, pp. 577-584
-
-
Nagatou, N.1
Watanabe, T.2
-
13
-
-
33751073715
-
A logic for information flow analysis with an application to forward slicing of simple imperative programs
-
DOI 10.1016/j.scico.2006.03.002, PII S0167642306001559
-
T. Amtoft and A. Banerjee, "A Logic for Information Flow Analysis with an Application to Forward Slicing of Simple Imperative Programs," Science of Computer Programming, vol. 64, no. 1, pp. 3-28, 2007, special issue on the 11th Static Analysis Symposium - SAS 2004. (Pubitemid 44765091)
-
(2007)
Science of Computer Programming
, vol.64
, Issue.1 SPEC. ISS.
, pp. 3-28
-
-
Amtoft, T.1
Banerjee, A.2
-
14
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
DOI 10.1145/1111596.1111601
-
K. W. Hamlen, G. Morrisett, and F. B. Schneider, "Computability Classes for Enforcement Mechanisms," ACM Trans. Program. Lang. Syst., vol. 28, no. 1, pp. 175-205, 2006. (Pubitemid 43943421)
-
(2006)
ACM Transactions on Programming Languages and Systems
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
15
-
-
34547286095
-
-
Cornell University, Ithaca, NY, USA, Tech. Rep.
-
B. Alpern and F. B. Schneider, "Defining Liveness," Cornell University, Ithaca, NY, USA, Tech. Rep., 1984.
-
(1984)
Defining Liveness
-
-
Alpern, B.1
Schneider, F.B.2
-
16
-
-
78650084679
-
Distributed power balancing for the FREEDM system
-
October 2010
-
R. Akella, F. Meng, D. Ditch, B. McMillin, and M. Crow, "Distributed Power Balancing for the FREEDM System," in First IEEE International Conference on Smart Grid Communications (SmartGrid-Comm), 2010, October 2010, pp. 7-12.
-
(2010)
First IEEE International Conference on Smart Grid Communications (SmartGrid-comm)
, pp. 7-12
-
-
Akella, R.1
Meng, F.2
Ditch, D.3
McMillin, B.4
Crow, M.5
-
17
-
-
34248532287
-
Power transmission control using distributed max-flow
-
DOI 10.1109/COMPSAC.2005.121, 1510028, Proceedings of the 29th Annual International Computer Software and Applications Conference - Workshops and Fast Abstracts, COMPSAC 2005
-
A. Armbruster, M. Gosnell, B. McMillin, and M. L. Crow, "Power Transmission Control Using Distributed Max-Flow," in 29th Annual International Computer Software and Applications Conference (COMPSAC), 2005, vol. 2. Edinburgh, Scotland: IEEE Computer Society, July 2005, pp. 256-263. (Pubitemid 46744886)
-
(2005)
Proceedings - International Computer Software and Applications Conference
, vol.1
, pp. 256-263
-
-
Armbruster, A.1
Gosnell, M.2
McMillin, B.3
Crow, M.L.4
-
18
-
-
80054997981
-
-
October last accessed 01-20-11. [Online]
-
B. Schneier, "Stuxnet," Schneider on Security, October 2010, last accessed 01-20-11. [Online]. Available: http://www.schneier.com/blog/ archives/2010/10/stuxnet.html
-
(2010)
Stuxnet
-
-
Schneier, B.1
-
19
-
-
78649821672
-
Enforcing information flow security properties in cyber-physical systems: A generalized framework based on compensation
-
July 2010
-
T. T. Gamage, B. M. McMillin, and T. P. Roth, "Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation," in IEEE 34th Annual Computer Software and Applications Conference Workshops (COMPSACW), 2010, July 2010, pp. 158-163.
-
(2010)
IEEE 34th Annual Computer Software and Applications Conference Workshops (COMPSACW)
, pp. 158-163
-
-
Gamage, T.T.1
McMillin, B.M.2
Roth, T.P.3
-
21
-
-
50249128786
-
Use of max-flow on FACTS devices
-
October
-
A. Lininger, B. McMillin, M. Crow, and B. Chowdhury, "Use of Max-Flow on FACTS Devices," in 39th North American Power Symposium, (NAPS) 2007, October 2007, pp. 288-294.
-
(2007)
39th North American Power Symposium, (NAPS) 2007
, pp. 288-294
-
-
Lininger, A.1
McMillin, B.2
Crow, M.3
Chowdhury, B.4
-
22
-
-
37349019078
-
Evolutionary optimization of flexible AC transmission system device placement for increasing power grid reliability
-
Salt Lake City, Utah, July 2005
-
J. Chaloupek, D. R. Tauritz, B. M. McMillin, and M. L. Crow, "Evolutionary Optimization of Flexible AC Transmission System Device Placement for Increasing Power Grid Reliability," in Proceedings of the 6th International Workshop on Frontiers in Evolutionary Algorithms (FEA), 2005, Salt Lake City, Utah, July 2005, pp. 516-519.
-
(2005)
Proceedings of the 6th International Workshop on Frontiers in Evolutionary Algorithms (FEA)
, pp. 516-519
-
-
Chaloupek, J.1
Tauritz, D.R.2
McMillin, B.M.3
Crow, M.L.4
|