-
3
-
-
58849164843
-
Security for process control systems: An overview
-
Nov.
-
M. Brundle and M. Naedele, "Security for process control systems: An overview," IEEE Security Privacy, vol. 6, no. 6, pp. 24-29, Nov. 2008.
-
(2008)
IEEE Security Privacy
, vol.6
, Issue.6
, pp. 24-29
-
-
Brundle, M.1
Naedele, M.2
-
4
-
-
55549137744
-
Security assessment of a turbo-gas power plant
-
ser. IFIP Advances in Information and Commmunication Technology. New York: Springer, Jan.
-
M. Masera, I. Fovino, and R. Leszczyna, "Security assessment of a turbo-gas power plant," in Critical Infrastructure Protection II, ser. IFIP Advances in Information and Commmunication Technology. New York: Springer, Jan. 2008, vol. 290, pp. 31-40.
-
(2008)
Critical Infrastructure Protection II
, vol.290
, pp. 31-40
-
-
Masera, M.1
Fovino, I.2
Leszczyna, R.3
-
5
-
-
44649198665
-
SCADA - A critical situation
-
Jan.
-
K. Munro, "SCADA-a critical situation," Network Security, vol. 2008, no. 1, pp. 4-6, Jan. 2008.
-
(2008)
Network Security
, vol.2008
, Issue.1
, pp. 4-6
-
-
Munro, K.1
-
6
-
-
36249010910
-
Lessons learned from the maroochy water breach
-
ser. IFIP International Federation for Information Processing, E. Goetz and S. Shenoi, Eds. New York: Springer
-
J. Slay and M. Miller, "Lessons learned from the maroochy water breach," in Critical Infrastructure Protection, ser. IFIP International Federation for Information Processing, E. Goetz and S. Shenoi, Eds. New York: Springer, 2007, vol. 253, pp. 73-82.
-
(2007)
Critical Infrastructure Protection
, vol.253
, pp. 73-82
-
-
Slay, J.1
Miller, M.2
-
10
-
-
71649109185
-
An experimental investigation of malware attacks on SCADA systems
-
I. N. Fovino, A. Carcano, M. Masera, and A. Trombetta, "An experimental investigation of malware attacks on SCADA systems," Int. J. Crit. Infrastruct. Protection, vol. 2, no. 4, pp. 139-145, 2009.
-
(2009)
Int. J. Crit. Infrastruct. Protection
, vol.2
, Issue.4
, pp. 139-145
-
-
Fovino, I.N.1
Carcano, A.2
Masera, M.3
Trombetta, A.4
-
11
-
-
0031988633
-
Modeling and simulation using network software to evaluate scada system configuration
-
Nov.
-
R. Cheung, M. Demokan, and K. Chow, "Modeling and simulation using network software to evaluate scada system configuration," in Proc. 4th Int. Conf. Adv. Power Syst. Control, Oper., Manage. (APSCOM), Nov. 1997, vol. 2, pp. 609-613.
-
(1997)
Proc. 4th Int. Conf. Adv. Power Syst. Control, Oper., Manage. (APSCOM)
, vol.2
, pp. 609-613
-
-
Cheung, R.1
Demokan, M.2
Chow, K.3
-
12
-
-
36248987828
-
Creating a European SCADA security testbed
-
ser. IFIP International Federation for Information Processing, E. Goetz and S. Shenoi, Eds. New York: Springer
-
H. Christiansson and E. Luiijf, "Creating a European SCADA security testbed," in Critical Infrastructure Protection, ser. IFIP International Federation for Information Processing, E. Goetz and S. Shenoi, Eds. New York: Springer, 2007, vol. 253, pp. 237-247.
-
(2007)
Critical Infrastructure Protection
, vol.253
, pp. 237-247
-
-
Christiansson, H.1
Luiijf, E.2
-
13
-
-
48449088699
-
SCADA cyber security testbed development
-
Sep.
-
C. Davis, J. Tate, H. Okhravi, C. Grier, T. Overbye, and D. Nicol, "SCADA cyber security testbed development," in Proc. 38th North Amer. Power Symp. (NAPS 2006), Sep. 2006, pp. 483-488.
-
(2006)
Proc. 38th North Amer. Power Symp. (NAPS 2006)
, pp. 483-488
-
-
Davis, C.1
Tate, J.2
Okhravi, H.3
Grier, C.4
Overbye, T.5
Nicol, D.6
-
14
-
-
82155171801
-
-
[Online]
-
National SCADA Test Bed Sep. 2010 [Online]. Available: http://www. sandia.gov/ccss/National-Testbed.htm
-
(2010)
National SCADA Test Bed Sep.
-
-
-
15
-
-
72849150312
-
Building a scada security testbed
-
Oct.
-
C. Queiroz, A. Mahmood, J. Hu, Z. Tari, and X. Yu, "Building a scada security testbed," in Proc. 3rd Int. Conf. Network System Security, Oct. 2009, pp. 357-364.
-
(2009)
Proc. 3rd Int. Conf. Network System Security
, pp. 357-364
-
-
Queiroz, C.1
Mahmood, A.2
Hu, J.3
Tari, Z.4
Yu, X.5
-
17
-
-
33750405289
-
Security issues in SCADA networks
-
DOI 10.1016/j.cose.2006.03.001, PII S0167404806000514
-
V. Igure, S. Laughter, and R. Williams, "Security issues in scada networks," Comput. Security, vol. 25, no. 7, pp. 498-506, 2006. (Pubitemid 44637241)
-
(2006)
Computers and Security
, vol.25
, Issue.7
, pp. 498-506
-
-
Igure, V.M.1
Laughter, S.A.2
Williams, R.D.3
-
18
-
-
58849119555
-
The crutial way of critical infrastructure protection
-
A. Bessani, P. Sousa, M. Correia, N. Neves, and P.Verissimo, "The crutial way of critical infrastructure protection," IEEE Security Privacy, vol. 6, no. 6, pp. 44-51, 2008.
-
(2008)
IEEE Security Privacy
, vol.6
, Issue.6
, pp. 44-51
-
-
Bessani, A.1
Sousa, P.2
Correia, M.3
Neves, N.4
Verissimo, P.5
-
19
-
-
82155171089
-
Pacific northwest national laboratory and U.S
-
department of energy, The role of authenticated communications for electric power distribution Nov.
-
"Pacific northwest national laboratory and U.S. department of energy, The role of authenticated communications for electric power distribution," in Proc. Natl. Workshop-Beyond SCADA: Networked Embedded Control for Cyber Physical Systems, Nov. 2006, p. 1.
-
(2006)
Proc. Natl. Workshop-Beyond SCADA: Networked Embedded Control for Cyber Physical Systems
, pp. 1
-
-
-
22
-
-
84923272193
-
An overview of the omnet++ simulation environment
-
Mar.
-
A. Varga and R. Hornig, "An overview of the omnet++ simulation environment," in Proc. 1st Int. Conf. Simul. Tools Tech. Commun., Netw., Syst. & Workshops, Mar. 2008, p. 10.
-
(2008)
Proc. 1st Int. Conf. Simul. Tools Tech. Commun., Netw., Syst. & Workshops
, pp. 10
-
-
Varga, A.1
Hornig, R.2
-
23
-
-
82155171088
-
Development of the powercyber SCADA security testbed
-
A. Hahn, B. Kregel, M. Govindarasu, J. Fitzpatrick, R. Adnan, S. Sridhar, and M. Higdon, "Development of the powercyber SCADA security testbed," in Proc. 6th Annu. Workshop Cyber Security Inf. Intell. Res., 2010, pp. 1-4.
-
(2010)
Proc. 6th Annu. Workshop Cyber Security Inf. Intell. Res.
, pp. 1-4
-
-
Hahn, A.1
Kregel, B.2
Govindarasu, M.3
Fitzpatrick, J.4
Adnan, R.5
Sridhar, S.6
Higdon, M.7
-
24
-
-
85084163310
-
The virtual power system testbed and inter-testbed integration
-
Aug.
-
D. Bergman, D. Jin, D. Nicol, and T. Yardley, "The virtual power system testbed and inter-testbed integration," in Proc. 2nd Workshop Cyber Security Experimentation Test, Aug. 2009, p. 5.
-
(2009)
Proc. 2nd Workshop Cyber Security Experimentation Test
, pp. 5
-
-
Bergman, D.1
Jin, D.2
Nicol, D.3
Yardley, T.4
-
25
-
-
82155179758
-
-
May [Online]
-
NS3 Simulator May 2011 [Online]. Available: http://www.nsnam.org/
-
(2011)
NS3 Simulator
-
-
-
26
-
-
77958537302
-
-
Institute of Telematics, Universität Karlsruhe (TH), Tech. Rep. TM-2008-2 [Online]. Available:
-
C. P. Mayer and T. Gamer, "Integrating real world applications into OMNeT++," Institute of Telematics, Universität Karlsruhe (TH), Tech. Rep. TM-2008-2, 2008 [Online]. Available: http://doc.tm.uka.de/2008/TM-2008-2. pdf
-
(2008)
Integrating Real World Applications into OMNeT++
-
-
Mayer, C.P.1
Gamer, T.2
-
27
-
-
82155171800
-
-
[Online]. Available:
-
INET Framework Sep. 2010 [Online]. Available: http://inet.omnetpp. org
-
(2010)
INET Framework Sep.
-
-
-
28
-
-
82155179755
-
-
LIBMODBUS Library Aug. [Online]. Available:
-
LIBMODBUS Library Aug. 2010 [Online]. Available: http://www.libmodbus. org/
-
(2010)
-
-
-
29
-
-
82155193381
-
-
DNP3 Library May [Online]. Available:
-
DNP3 Library May 2011 [Online]. Available: http://code.google. com/p/dnp3/
-
(2011)
-
-
-
30
-
-
82155171090
-
Secure enterprise computing with the Solaris 8 operating environment
-
[Online]. Available:
-
"Secure enterprise computing with the Solaris 8 operating environment," Sun Microsystems, 2000 [Online]. Available: http://www.sun. com/software/whitepapers/wp-s8security/wp-s8security.pdf
-
(2000)
Sun Microsystems
-
-
-
31
-
-
82155179754
-
-
May [Online]
-
DNP3 Specification May 2011 [Online]. Available: http://www.dnp. org/Modules/Library/
-
(2011)
DNP3 Specification
-
-
-
32
-
-
84891752381
-
A taxonomy of attacks on the dnp3 protocol
-
ser. IFIP Advances in Information and Communication Technology, C. Palmer and S. Shenoi, Eds. New York: Springer
-
S. East, J. Butts, M. Papa, and S. Shenoi, "A taxonomy of attacks on the dnp3 protocol," in Critical Infrastructure Protection III, ser. IFIP Advances in Information and Communication Technology, C. Palmer and S. Shenoi, Eds. New York: Springer, 2009, vol. 311, pp. 67-81.
-
(2009)
Critical Infrastructure Protection III
, vol.311
, pp. 67-81
-
-
East, S.1
Butts, J.2
Papa, M.3
Shenoi, S.4
-
33
-
-
68949145137
-
Attack taxonomies for the modbus protocols
-
P. Huitsing, R. Chandia, M. Papa, and S. Shenoi, "Attack taxonomies for the modbus protocols," Int. J. Crit. Infrastruct. Protection, vol. 1, pp. 37-44, 2008.
-
(2008)
Int. J. Crit. Infrastruct. Protection
, vol.1
, pp. 37-44
-
-
Huitsing, P.1
Chandia, R.2
Papa, M.3
Shenoi, S.4
-
34
-
-
82155179753
-
-
Jun. [Online]
-
ZigBee Standard Jun. 2011 [Online]. Available: http://zigbee.org/ Standards/ZigBeeSmartEnergy/Overview.aspx
-
(2011)
ZigBee Standard
-
-
|