-
1
-
-
77957983535
-
Research trends on secure SCADA network technology and methods
-
Alsiherov F., Kim T. Research trends on secure SCADA network technology and methods. WSEAS Transactions on Systems and Control 2010, 8(5):635-645.
-
(2010)
WSEAS Transactions on Systems and Control
, vol.8
, Issue.5
, pp. 635-645
-
-
Alsiherov, F.1
Kim, T.2
-
2
-
-
84858289473
-
-
International Electrotechnical Commission, Communication Network and System Security-Profiles including TCP/IP, Technical Specification IEC TS 62351-3, Geneva, Switzerland
-
International Electrotechnical Commission, Communication Network and System Security-Profiles including TCP/IP, Technical Specification IEC TS 62351-3, Geneva, Switzerland, 2007.
-
(2007)
-
-
-
3
-
-
84858281057
-
-
International Electrotechnical Commission, Security for IEC 60870-5 and Derivatives, Technical Specification IEC TS 62351-5, Geneva, Switzerland
-
International Electrotechnical Commission, Security for IEC 60870-5 and Derivatives, Technical Specification IEC TS 62351-5, Geneva, Switzerland, 2009.
-
(2009)
-
-
-
4
-
-
84858289472
-
-
International Electrotechnical Commission, Security for IEC 61850, Technical Specification IEC TS 62351-6, Geneva, Switzerland
-
International Electrotechnical Commission, Security for IEC 61850, Technical Specification IEC TS 62351-6, Geneva, Switzerland, 2007.
-
(2007)
-
-
-
5
-
-
41549144752
-
Security architecture for control networks using IPSec and KINK
-
in: Proceedings of the Symposium on Applications and the Internet
-
N. Okabe, S. Sakane, K. Miyazawa, K. Kamada, A. Inoue, M. Ishiyama, Security architecture for control networks using IPSec and KINK, in: Proceedings of the Symposium on Applications and the Internet, pp. 414-420, 2005.
-
(2005)
, pp. 414-420
-
-
Okabe, N.1
Sakane, S.2
Miyazawa, K.3
Kamada, K.4
Inoue, A.5
Ishiyama, M.6
-
6
-
-
67651162241
-
Improving the cyber security of SCADA communication networks
-
Patel S., Bhatt G., Graham J. Improving the cyber security of SCADA communication networks. Communications of the ACM 2009, 52(7):139-142.
-
(2009)
Communications of the ACM
, vol.52
, Issue.7
, pp. 139-142
-
-
Patel, S.1
Bhatt, G.2
Graham, J.3
-
8
-
-
84858281058
-
-
International Electrotechnical Commission, IEC 61850 Standard, Technical Specification IEC TS 61850, Geneva, Switzerland
-
International Electrotechnical Commission, IEC 61850 Standard, Technical Specification IEC TS 61850, Geneva, Switzerland, 2003.
-
(2003)
-
-
-
9
-
-
84858289477
-
-
Modbus-IDA, Modbus Application Protocol Specification V.1.1b, Hopkinton, Massachusetts
-
Modbus-IDA, Modbus Application Protocol Specification V.1.1b, Hopkinton, Massachusetts, 2006. http://www.modbus.org/docs/Modbus_Application_Protocol_V1_1b.pdf.
-
(2006)
-
-
-
10
-
-
84858279772
-
-
Common VPN security flaws, White Paper, NTA Monitor, Rochester, United Kingdom
-
R. Hills, Common VPN security flaws, White Paper, NTA Monitor, Rochester, United Kingdom, 2005. http://www.nta-monitor.com/posts/2005/01/VPN-Flaws-Whitepaper.pdf.
-
(2005)
-
-
Hills, R.1
-
11
-
-
84858289476
-
-
Stuxnet worm causes industry concern for security firms, Mass High Tech, Boston, Massachusetts, October 19
-
R. Brown, Stuxnet worm causes industry concern for security firms, Mass High Tech, Boston, Massachusetts, October 19, 2010. http://www.masshightech.com/stories/2010/10/18/daily19-Stuxnet-worm-causes-industry-concern-for-security-firms.html.
-
(2010)
-
-
Brown, R.1
-
12
-
-
84944319215
-
Stochastic activity networks: formal definitions and concepts
-
Springer Verlag, Berlin-Heidelberg, Germany, E. Brinksma, H. Hermanns, J. Katoen (Eds.)
-
Sanders W., Meyer J. Stochastic activity networks: formal definitions and concepts. Lectures on Formal Methods and Performance Analysis (LNCS 2090) 2001, 315-343. Springer Verlag, Berlin-Heidelberg, Germany. E. Brinksma, H. Hermanns, J. Katoen (Eds.).
-
(2001)
Lectures on Formal Methods and Performance Analysis (LNCS 2090)
, pp. 315-343
-
-
Sanders, W.1
Meyer, J.2
-
13
-
-
84944323296
-
Introduction to stochastic Petri nets
-
Springer-Verlag, Berlin-Heidelberg, Germany, E. Brinksma, H. Hermanns, J. Katoen (Eds.)
-
Balbo G. Introduction to stochastic Petri nets. Lectures on Formal Methods and Performance Analysis (LNCS 2090) 2001, 84-155. Springer-Verlag, Berlin-Heidelberg, Germany. E. Brinksma, H. Hermanns, J. Katoen (Eds.).
-
(2001)
Lectures on Formal Methods and Performance Analysis (LNCS 2090)
, pp. 84-155
-
-
Balbo, G.1
-
14
-
-
33744759260
-
A cryptographic tour of the IPSec standards
-
K. Paterson, A cryptographic tour of the IPSec standards, Information Security Technical Report, vol. 11, (2), pp. 72-81, 2006.
-
(2006)
Information Security Technical Report
, vol.11
, Issue.2
, pp. 72-81
-
-
Paterson, K.1
-
15
-
-
35048891868
-
Keying hash functions for message authentication
-
in: Proceedings of the Sixteenth International Cryptology Conference
-
M. Bellare, R. Canetti, H. Krawczyk, Keying hash functions for message authentication, in: Proceedings of the Sixteenth International Cryptology Conference, pp. 1-15, 1996.
-
(1996)
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
16
-
-
0003272021
-
The internet key exchange (IKE)
-
Harkins D., Carrel D. The internet key exchange (IKE). RFC 1998, 2409.
-
(1998)
RFC
, vol.2409
-
-
Harkins, D.1
Carrel, D.2
-
17
-
-
77958541036
-
Different flavors of man-in-the-middle attack: Consequences and feasible solutions
-
in: Proceedings of the Third IEEE International Conference on Computer Science and Information Technology
-
N. Nayak, S. Ghosh, Different flavors of man-in-the-middle attack: Consequences and feasible solutions, in: Proceedings of the Third IEEE International Conference on Computer Science and Information Technology, pp. 491-495, 2010.
-
(2010)
, pp. 491-495
-
-
Nayak, N.1
Ghosh, S.2
-
18
-
-
33646802751
-
Extended authentication within ISAKMP/Oakley (XAUTH)
-
Pereira R., Beaulieu S. Extended authentication within ISAKMP/Oakley (XAUTH). Internet Draft 1999.
-
(1999)
Internet Draft
-
-
Pereira, R.1
Beaulieu, S.2
-
19
-
-
0036821893
-
The Mobius framework and its implementation
-
Deavours D., Clark G., Courtney T., Daly D., Derisavi S., Doyle J., Sanders W., Webster P. The Mobius framework and its implementation. IEEE Transactions on Software Engineering 2002, 28(10):956-969.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.10
, pp. 956-969
-
-
Deavours, D.1
Clark, G.2
Courtney, T.3
Daly, D.4
Derisavi, S.5
Doyle, J.6
Sanders, W.7
Webster, P.8
-
20
-
-
78650366342
-
Getting the real-time precise roundtrip time for stepping stone detection
-
in: Proceedings of the Fourth International Conference on Network and System Security
-
P. Li, W. Zhou, Y. Wang, Getting the real-time precise roundtrip time for stepping stone detection, in: Proceedings of the Fourth International Conference on Network and System Security, pp. 377-382, 2010.
-
(2010)
, pp. 377-382
-
-
Li, P.1
Zhou, W.2
Wang, Y.3
-
21
-
-
84858289474
-
-
How to reduce malware-induced security breaches, March 31
-
S. Dispensa, How to reduce malware-induced security breaches, March 31, 2010.
-
(2010)
-
-
Dispensa, S.1
-
22
-
-
2642526260
-
Security analysis of SITAR intrusion tolerance system
-
in: Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems
-
D. Wang, B. Madan, K. Trivedi, Security analysis of SITAR intrusion tolerance system, in: Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, pp. 23-32, 2003.
-
(2003)
, pp. 23-32
-
-
Wang, D.1
Madan, B.2
Trivedi, K.3
-
24
-
-
33645156923
-
A survey on communication networks for electric system automation
-
Gungor V., Lambert F. A survey on communication networks for electric system automation. Computer Networks 2006, 50(7):877-897.
-
(2006)
Computer Networks
, vol.50
, Issue.7
, pp. 877-897
-
-
Gungor, V.1
Lambert, F.2
-
25
-
-
33646523412
-
Analysis of communication alternatives in a heterogeneous network for a supervision and control system
-
Sempere V., Albero T., Silvestre J. Analysis of communication alternatives in a heterogeneous network for a supervision and control system. Computer Communications 2006, 29(8):1133-1145.
-
(2006)
Computer Communications
, vol.29
, Issue.8
, pp. 1133-1145
-
-
Sempere, V.1
Albero, T.2
Silvestre, J.3
-
26
-
-
79952635830
-
Secure SCADA network technology and methods
-
in: Proceedings of the Twelfth WSEAS International Conference on Automatic Control, Modeling and Simulation
-
F. Alsiherov, T. Kim, Secure SCADA network technology and methods, in: Proceedings of the Twelfth WSEAS International Conference on Automatic Control, Modeling and Simulation, pp. 434-438, 2010.
-
(2010)
, pp. 434-438
-
-
Alsiherov, F.1
Kim, T.2
-
27
-
-
33744518446
-
Modeling and verification of IPSec and VPN security policies
-
in: Proceedings of the Thirteenth IEEE International Conference on Network Protocols
-
H. Hamed, E. Al-Shaer, W. Marrero, Modeling and verification of IPSec and VPN security policies, in: Proceedings of the Thirteenth IEEE International Conference on Network Protocols, pp. 259-278, 2005.
-
(2005)
, pp. 259-278
-
-
Hamed, H.1
Al-Shaer, E.2
Marrero, W.3
-
28
-
-
0029713954
-
Security and auditing of VPN
-
in: Proceedings of the Third International Workshop on Services in Distributed and Networked Environments
-
N. Baukari, A. Aljane, Security and auditing of VPN, in: Proceedings of the Third International Workshop on Services in Distributed and Networked Environments, pp. 132-138, 1996.
-
(1996)
, pp. 132-138
-
-
Baukari, N.1
Aljane, A.2
|