-
3
-
-
79953895474
-
Lessons from stuxnet
-
T. Chen and S. Abu-Nimeh, "Lessons from stuxnet," Computer, vol. 44, no. 4, pp. 91-93, 2011.
-
(2011)
Computer
, vol.44
, Issue.4
, pp. 91-93
-
-
Chen, T.1
Abu-Nimeh, S.2
-
4
-
-
84856546754
-
-
[Online]
-
"Stuxnet." [Online]. Available: https://secure.wikimedia.org/ wikipedia/ en/wiki/Stuxnet#cite note-5
-
Stuxnet
-
-
-
5
-
-
84856558583
-
Architecting the next generation of service-based SCADA/DCS system of systems
-
Melbourne, Australia., 7-10 Nov 2011. [Online]
-
S. Karnouskos and A. W. Colombo, "Architecting the next generation of service-based SCADA/DCS system of systems," in 37th Annual Conference of the IEEE Industrial Electronics Society (IECON 2011), Melbourne, Australia., 7-10 Nov 2011. [Online]. Available: http://sites.google.com/site/karnouskos/ files/2011IECONngSCADA.pdf
-
37th Annual Conference of the IEEE Industrial Electronics Society (IECON 2011)
-
-
Karnouskos, S.1
Colombo, A.W.2
-
6
-
-
78650062267
-
-
Symantec, Tech. Rep., Feb. [Online]
-
N. Falliere, L. O. Murchu, and E. Chien, "W32.stuxnet dossier," Symantec, Tech. Rep., Feb. 2011. [Online]. Available: http://www.symantec.com/ content/en/us/enterprise/media/security response/whitepapers/w32 stuxnet dossier.pdf
-
(2011)
W32.stuxnet Dossier
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
7
-
-
79960349207
-
-
eset, Tech. Rep., [Online]
-
A. Matrosov, E. Rodionov, D. Harley, and J. Malcho, "Stuxnet under the microscope," eset, Tech. Rep., 2010. [Online]. Available: http://www.eset.com/resources/white-papers/StuxnetUndertheMicroscope.pdf
-
(2010)
Stuxnet under the Microscope
-
-
Matrosov, A.1
Rodionov, E.2
Harley, D.3
Malcho, J.4
-
8
-
-
84856513428
-
Exploiting siemens simatic S7 PLCs
-
Las Vegas, NV, USA, 3-4 Aug [Online]
-
D. Beresford, "Exploiting Siemens Simatic S7 PLCs," in Black Hat USA+2011, Las Vegas, NV, USA, 3-4 Aug. 2011. [Online]. Available: https://media.blackhat.com/bh-us-11/Beresford/BHUS11BeresfordS7PLCsWP.pdf
-
(2011)
Black Hat USA+2011
-
-
Beresford, D.1
-
9
-
-
79951858522
-
Compromise through usb-based hardware Trojan horse device
-
May. [Online]
-
J. Clark, S. Leblanc, and S. Knight, "Compromise through usb-based hardware trojan horse device," Future Gener. Comput. Syst., vol. 27, pp. 555-563, May 2011. [Online]. Available: http://dx.doi.org/10.1016/j.future.2010. 04.008
-
(2011)
Future Gener. Comput. Syst.
, vol.27
, pp. 555-563
-
-
Clark, J.1
Leblanc, S.2
Knight, S.3
-
10
-
-
84856549738
-
USB - Undermining security barriers
-
Las Vegas, NV, USA, 3-4 Aug [Online]
-
A. Davis, "USB - undermining security barriers," in Black Hat USA+2011, Las Vegas, NV, USA, 3-4 Aug. 2011. [Online]. Available: https://media.blackhat.com/bh-us-11/Davis/BHUS11-DavisUSBWP.pdf
-
(2011)
Black Hat USA+2011
-
-
Davis, A.1
-
11
-
-
78651389795
-
Can you still trust your network card?
-
Vancouver, Canada, 22-26 Mar. [Online]
-
L. Duflot, Y.-A. Perez, G. Valadon, and O. Levillain, "Can you still trust your network card?" CanSecWest 2010, Vancouver, Canada, 22-26 Mar. 2010. [Online]. Available: http://www.ssi.gouv.fr/IMG/pdf/ csw-trustnetworkcard. pdf
-
(2010)
CanSecWest 2010
-
-
Duflot, L.1
Perez, Y.-A.2
Valadon, G.3
Levillain, O.4
-
12
-
-
84910621255
-
Battery firmware hacking
-
Las Vegas, NV, USA, 3-4 Aug [Online]
-
C. Miller, "Battery firmware hacking," in Black Hat USA+2011, Las Vegas, NV, USA, 3-4 Aug. 2011. [Online]. Available: https://media.blackhat. com/bh-us-11/Miller/BHUS11MillerBatteryFirmwarePublicWP.pdf
-
(2011)
Black Hat USA+2011
-
-
Miller, C.1
-
13
-
-
72849124307
-
Hardware Trojan horse device based on unintended usb channels
-
ser. NSS '09. Washington, DC, USA, IEEE Computer Society, [Online]
-
J. Clark, S. Leblanc, and S. Knight, "Hardware trojan horse device based on unintended usb channels," in Proceedings of the 2009 Third International Conference on Network and System Security, ser. NSS '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 1-8. [Online]. Available: http://dx.doi.org/10.1109/NSS.2009.48
-
(2009)
Proceedings of the 2009 Third International Conference on Network and System Security
, pp. 1-8
-
-
Clark, J.1
Leblanc, S.2
Knight, S.3
-
14
-
-
85084095841
-
Designing and implementing malicious hardware
-
Berkeley, CA, USA: USENIX Association, [Online]
-
S. T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang, and Y. Zhou, "Designing and implementing malicious hardware," in Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. Berkeley, CA, USA: USENIX Association, 2008, pp. 5:1-5:8. [Online]. Available: http://dl.acm.org/citation.cfm?id=1387709.1387714
-
(2008)
Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 51-58
-
-
King, S.T.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang, W.5
Zhou, Y.6
-
15
-
-
33746508400
-
Network security vulnerabilities in scada and ems
-
M. Amanullah, A. Kalam, and A. Zayegh, "Network security vulnerabilities in scada and ems," in Transmission and Distribution Conference and Exhibition: Asia and Pacific, 2005 IEEE/PES. IEEE, 2005, pp. 1-6.
-
(2005)
Transmission and Distribution Conference and Exhibition: Asia and Pacific, 2005 IEEE/PES. IEEE
, pp. 1-6
-
-
Amanullah, M.1
Kalam, A.2
Zayegh, A.3
-
16
-
-
84891419063
-
-
Springer, [Online] 978-3-642-16945-8
-
P. J. Marrón, S. Karnouskos, D. Minder, and A. Ollero, Eds., The emerging domain of Cooperating Objects. Springer, 2011. [Online]. Available: http://www.springer.com/engineering/signals/book/ 978-3-642-16945-8
-
(2011)
The Emerging Domain of Cooperating Objects
-
-
Marrón, P.J.1
Karnouskos, S.2
Minder, D.3
Ollero, A.4
-
18
-
-
54849434215
-
SCADA system security: Complexity, history and new developments
-
Daejeon, Korea, 13-16 Jul
-
N. Cai, J. Wang, and X. Yu, "SCADA system security: Complexity, history and new developments," in 6th IEEE International Conference on Industrial Informatics (INDIN), Daejeon, Korea, 13-16 Jul. 2008, pp. 569-574.
-
(2008)
6th IEEE International Conference on Industrial Informatics (INDIN)
, pp. 569-574
-
-
Cai, N.1
Wang, J.2
Yu, X.3
-
19
-
-
79952527986
-
On scada control system command and response injection and intrusion detection
-
oct. 2010
-
W. Gao, T. Morris, B. Reaves, and D. Richey, "On scada control system command and response injection and intrusion detection," in eCrime Researchers Summit (eCrime), 2010, oct. 2010, pp. 1 -9.
-
(2010)
ECrime Researchers Summit (ECrime)
, pp. 1-9
-
-
Gao, W.1
Morris, T.2
Reaves, B.3
Richey, D.4
-
20
-
-
77956623705
-
Real world service interaction with enterprise systems in dynamic manufacturing environments
-
L. Benyoucef and B. Grabot, Eds. Springer, no. ISBN 978-1-84996-118-9, in press
-
S. Karnouskos, D. Savio, P. Spiess, D. Guinard, V. Trifa, and O. Baecker, "Real World Service Interaction with Enterprise Systems in Dynamic Manufacturing Environments," in Artificial Intelligence Techniques for Networked Manufacturing Enterprises Management, L. Benyoucef and B. Grabot, Eds. Springer, 2010, no. ISBN 978-1-84996-118-9, (in press).
-
(2010)
Artificial Intelligence Techniques for Networked Manufacturing Enterprises Management
-
-
Karnouskos, S.1
Savio, D.2
Spiess, P.3
Guinard, D.4
Trifa, V.5
Baecker, O.6
-
21
-
-
75949097173
-
Towards new web services based supervisory systems in complex industrial organizations: Basic principles and case study
-
April
-
D. Idoughi, M. Kerkar, and C. Kolski, "Towards new web services based supervisory systems in complex industrial organizations: Basic principles and case study," Comput. Ind., vol. 61, pp. 235-249, April 2010.
-
(2010)
Comput. Ind.
, vol.61
, pp. 235-249
-
-
Idoughi, D.1
Kerkar, M.2
Kolski, C.3
-
22
-
-
78651077255
-
Study on the future internet system through analysis of scada systems
-
J. Song, S. Jung, and S. Kim, "Study on the future internet system through analysis of scada systems," Communication and Networking, pp. 10-14, 2010.
-
(2010)
Communication and Networking
, pp. 10-14
-
-
Song, J.1
Jung, S.2
Kim, S.3
-
23
-
-
71849092528
-
Towards a future scada
-
Z. Vale, H. Morais, M. Silva, and C. Ramos, "Towards a future scada," in Power & Energy Society General Meeting, 2009. PES'09. IEEE. IEEE, 2009, pp. 1-7.
-
(2009)
Power & Energy Society General Meeting, 2009. PES'09. IEEE. IEEE
, pp. 1-7
-
-
Vale, Z.1
Morais, H.2
Silva, M.3
Ramos, C.4
-
27
-
-
80955155205
-
-
Aug. [Online]
-
D. Alperovitch, "Revealed: Operation Shady RAT," McAfee Labs, Tech. Rep., Aug. 2011. [Online]. Available: http://www.mcafee.com/us/resources/ white-papers/wp-operation-shady-rat.pdf
-
(2011)
Revealed: Operation Shady RAT
-
-
Alperovitch, D.1
-
28
-
-
79251616434
-
Stuxnet and the future of cyber war
-
J. Farwell and R. Rohozinski, "Stuxnet and the future of cyber war," Survival, vol. 53, no. 1, pp. 23-40, 2011.
-
(2011)
Survival
, vol.53
, Issue.1
, pp. 23-40
-
-
Farwell, J.1
Rohozinski, R.2
-
29
-
-
84946841683
-
-
U.S. Department of Commerce, Tech. Rep. NIST Special Publication 800-82, Jun. [Online]
-
K. Stouffer, J. Falco, and K. Scarfone, "Guide to industrial control systems (ics) security," National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Tech. Rep. NIST Special Publication 800-82, Jun. 2011. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800- 82/SP800-82-final.pdf
-
(2011)
Guide to Industrial Control Systems (Ics) Security
-
-
Stouffer, K.1
Falco, J.2
Scarfone, K.3
|