-
1
-
-
77953581925
-
Networked control system: Overview and research trends
-
Jul.
-
R. A. Gupta and M. Y. Chow, "Networked control system: Overview and research trends," IEEE Trans. Ind. Electron., vol. 57, no. 7, pp. 2527-2535, Jul. 2010.
-
(2010)
IEEE Trans. Ind. Electron.
, vol.57
, Issue.7
, pp. 2527-2535
-
-
Gupta, R.A.1
Chow, M.Y.2
-
2
-
-
37849038277
-
Effects of intentional threats to power substation control systems
-
G. Dondossola, M. Masera, I. Nai Fovino, and J. Szanto, "Effects of intentional threats to power substation control systems," Proc. IJCIS, vol. 4, no. 1/2, pp. 129-143, 2008.
-
(2008)
Proc. IJCIS
, vol.4
, Issue.1-2
, pp. 129-143
-
-
Dondossola, G.1
Masera, M.2
Nai Fovino, I.3
Szanto, J.4
-
3
-
-
77954317023
-
ICT security assessment of a power plant, a case study
-
Arlington, VA, Mar.
-
I. Nai Fovino, M. Masera, and R. Leszczyna, "ICT security assessment of a power plant, a case study," in Proc. 2nd Int. Conf. Critical Infrastructure Protect., Arlington, VA, Mar. 2008.
-
(2008)
Proc. 2nd Int. Conf. Critical Infrastructure Protect.
-
-
Nai Fovino, I.1
Masera, M.2
Leszczyna, R.3
-
4
-
-
77954323115
-
Scada Malware, a proof of concept
-
Rome, Italy, Oct.
-
A. Carcano, I. Nai Fovino, M. Masera, and A. Trombetta, "Scada Malware, a proof of concept," in Proc. 3rd Int. Workshop Critical Inform. Infrastructures Security, Rome, Italy, Oct. 2008.
-
(2008)
Proc. 3rd Int. Workshop Critical Inform. Infrastructures Security
-
-
Carcano, A.1
Nai Fovino, I.2
Masera, M.3
Trombetta, A.4
-
5
-
-
77958017287
-
Safety-and security-critical services in building automation and control systems
-
Nov.
-
T. Novak and A. Gerstinger, "Safety-and security-critical services in building automation and control systems," IEEE Trans. Ind. Electron., vol. 57, no. 11, pp. 3614-3621, Nov. 2010.
-
(2010)
IEEE Trans. Ind. Electron.
, vol.57
, Issue.11
, pp. 3614-3621
-
-
Novak, T.1
Gerstinger, A.2
-
6
-
-
77956599919
-
Security in building automation systems
-
Nov.
-
W. Granzer, F. Praus, and W. Kastner, "Security in building automation systems," IEEE Trans. Ind. Electron., vol. 57, no. 11, pp. 3622-3630, Nov. 2010.
-
(2010)
IEEE Trans. Ind. Electron.
, vol.57
, Issue.11
, pp. 3622-3630
-
-
Granzer, W.1
Praus, F.2
Kastner, W.3
-
7
-
-
34548049800
-
Industrial cybersecurity for power system and SCADA networks
-
Jul./Aug.
-
A. A. Creery and E. J. Byres, "Industrial cybersecurity for power system and SCADA networks," IEEE Ind. Appl. Mag., vol. 13, no. 4, pp. 49-55, Jul./Aug. 2007.
-
(2007)
IEEE Ind. Appl. Mag.
, vol.13
, Issue.4
, pp. 49-55
-
-
Creery, A.A.1
Byres, E.J.2
-
8
-
-
84871728510
-
Security strategies for Scada networks
-
Hanover, NH, Mar. 19-21
-
R. Chandia, J. Gonzalez, T. Kilpatrick, M. Papa, and S. Shenoi, "Security strategies for Scada networks," in Proc. 1st Int. Conf. Crit. Infrastructure Protection, Hanover, NH, Mar. 19-21, 2007.
-
(2007)
Proc. 1st Int. Conf. Crit. Infrastructure Protection
-
-
Chandia, R.1
Gonzalez, J.2
Kilpatrick, T.3
Papa, M.4
Shenoi, S.5
-
9
-
-
84860428254
-
Developing a multi-layer strategy for securing control systems of oil refineries
-
Jul.
-
M. K. Mahmood and F. M. Al-Naima, "Developing a multi-layer strategy for securing control systems of oil refineries," Wireless Sens. Netw., vol. 2, pp. 520-527, Jul. 2010.
-
(2010)
Wireless Sens. Netw.
, vol.2
, pp. 520-527
-
-
Mahmood, M.K.1
Al-Naima, F.M.2
-
10
-
-
73849146820
-
Security protocols against cyber attacks in the distribution automation system
-
Jan.
-
I. H. Lim, S. Hong, M. S. Choi, S. J. Lee, T. W. Kim, S. W. Lee, and B. N. Ha, "Security protocols against cyber attacks in the distribution automation system," IEEE Trans. Power Del., vol. 25, no. 1, pp. 448-455, Jan. 2010.
-
(2010)
IEEE Trans. Power Del.
, vol.25
, Issue.1
, pp. 448-455
-
-
Lim, I.H.1
Hong, S.2
Choi, M.S.3
Lee, S.J.4
Kim, T.W.5
Lee, S.W.6
Ha, B.N.7
-
11
-
-
42549107267
-
Data object based security for DNP3 over TCP/IP for increased utility commercial aspects security
-
Tampa, FL, Jun. 24-28
-
T. Mander, F. Nabhani, L. Wang, and R. Cheung, "Data object based security for DNP3 over TCP/IP for increased utility commercial aspects security," in Proc. Power Eng. Soc. Gen. Meeting, Tampa, FL, Jun. 24-28, 2007, pp. 1-8.
-
(2007)
Proc. Power Eng. Soc. Gen. Meeting
, pp. 1-8
-
-
Mander, T.1
Nabhani, F.2
Wang, L.3
Cheung, R.4
-
12
-
-
85090433665
-
Snort-lightweight intrusion detection for networks
-
Seattle, WA
-
M. Roesch, "Snort-lightweight intrusion detection for networks," in Proc. 13th Syst. Admin. Conf. LISA, Seattle, WA, 1999, pp. 229-238.
-
(1999)
Proc. 13th Syst. Admin. Conf. LISA
, pp. 229-238
-
-
Roesch, M.1
-
13
-
-
84860441945
-
-
Last access 9/04/ [Online]. Available:
-
Last access 9/04/2009. [Online]. Available: http://www.digitalbond.com/ index.php/research/ids-signatures/modbus-tcp-ids-signatures
-
(2009)
-
-
-
14
-
-
77954340967
-
Secure selecticast for collaborative intrusion detection systems
-
P. Gross, J. Parekh, and G. Kaiser, "Secure selecticast for collaborative intrusion detection systems," in Proc. Int. Workshops DEBS, 2004, pp. 50-54.
-
(2004)
Proc. Int. Workshops DEBS
, pp. 50-54
-
-
Gross, P.1
Parekh, J.2
Kaiser, G.3
-
15
-
-
85137546697
-
Global intrusion detection in the DOMINO overlay system
-
V. Yegneswaran, P. Barford, and S. Jha, "Global intrusion detection in the DOMINO overlay system," in Proc. 11th ANDSSS Conf., 2004, pp. 120-137.
-
(2004)
Proc. 11th ANDSSS Conf.
, pp. 120-137
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
-
16
-
-
0036079912
-
Alert correlation in a cooperative intrusion detection framework
-
F. Cuppens and A. Miege, "Alert correlation in a cooperative intrusion detection framework," in Proc. Security Privacy, 2002, pp. 202-215.
-
(2002)
Proc. Security Privacy
, pp. 202-215
-
-
Cuppens, F.1
Miege, A.2
-
17
-
-
84902313318
-
A service oriented approach to the assessment of infrastructure security
-
Infrastructure Protection, Dartmouth College, Hanover, NH, Mar. 19-21
-
I. Nai Fovino and M. Masera, "A service oriented approach to the assessment of infrastructure security," in Proc. 1st Annu. IFIP Working Group 11.10 Int. Conf. Crit. Infrastructure Protection, Dartmouth College, Hanover, NH, Mar. 19-21, 2007, pp. 367-379.
-
(2007)
Proc. 1st Annu. IFIP Working Group 11.10 Int. Conf. Crit
, pp. 367-379
-
-
Nai Fovino, I.1
Masera, M.2
-
18
-
-
34548132064
-
Emergent disservices in interdependent systems and system-of-systems
-
Oct.
-
I. Nai Fovino and M. Masera, "Emergent disservices in interdependent systems and system-of-systems," in Proc. IEEE Conf. Syst., Man Cybern., Taipei, Taiwan, Oct. 2006, pp. 590-595.
-
(2006)
Proc. IEEE Conf. Syst., Man Cybern., Taipei, Taiwan
, pp. 590-595
-
-
Nai Fovino, I.1
Masera, M.2
-
20
-
-
33751006097
-
Modelling information assets for security risk assessment in industrial settings
-
Hambourg, Germany
-
I. Nai Fovino and M. Masera, "Modelling information assets for security risk assessment in industrial settings," in Proc. 15th EICAR Annu. Conf., Hambourg, Germany, 2006, pp. 137-149.
-
(2006)
Proc. 15th EICAR Annu. Conf.
, pp. 137-149
-
-
Nai Fovino, I.1
Masera, M.2
-
21
-
-
0031148143
-
Supervision, fault-detection and fault-diagnosis methods-An introduction
-
May
-
R. Isermann, "Supervision, fault-detection and fault-diagnosis methods-An introduction," Control Eng. Pract., vol. 5, no. 5, pp. 639-652, May 1997.
-
(1997)
Control Eng. Pract.
, vol.5
, Issue.5
, pp. 639-652
-
-
Isermann, R.1
-
22
-
-
0021468997
-
Process fault detection based on modelling and estimation methods-A survey
-
Jul.
-
R. Isermann, "Process fault detection based on modelling and estimation methods-A survey," Automatica, vol. 20, no. 4, pp. 387-404, Jul. 1984.
-
(1984)
Automatica
, vol.20
, Issue.4
, pp. 387-404
-
-
Isermann, R.1
-
23
-
-
0008881998
-
Advanced fault detection and isolation schemes using non linear and robust observers
-
Munich, Germany
-
P. M. Frank, "Advanced fault detection and isolation schemes using non linear and robust observers," in Proc. 10th IFAC Congr., Munich, Germany, 1987, vol. 3, pp. 63-68.
-
(1987)
Proc. 10th IFAC Congr.
, vol.3
, pp. 63-68
-
-
Frank, P.M.1
-
24
-
-
44349183254
-
A design method of communication disturbance observer for time-delay compensation, taking the dynamic property of network disturbance into account
-
May
-
K. Natori and K. Ohnishi, "A design method of communication disturbance observer for time-delay compensation, taking the dynamic property of network disturbance into account," IEEE Trans. Ind. Electron., vol. 55, no. 5, pp. 2152-2168, May 2008.
-
(2008)
IEEE Trans. Ind. Electron.
, vol.55
, Issue.5
, pp. 2152-2168
-
-
Natori, K.1
Ohnishi, K.2
-
25
-
-
79951589506
-
Control over imperfect networks: Model based predictive networked control systems
-
Mar.
-
A. Onat, T. Naskali, E. Parlakay, and O. Mutluer, "Control over imperfect networks: Model based predictive networked control systems," IEEE Trans. Ind. Electron., vol. 58, no. 3, pp. 905-913, Mar. 2011.
-
(2011)
IEEE Trans. Ind. Electron.
, vol.58
, Issue.3
, pp. 905-913
-
-
Onat, A.1
Naskali, T.2
Parlakay, E.3
Mutluer, O.4
-
26
-
-
20444481023
-
A SCADA system reliability evaluation considering performance requirement
-
Singapore
-
C.-L. Su and Y.-C. Chang, "A SCADA system reliability evaluation considering performance requirement," in Proc. Int. Conf. Power Syst. Technol., Singapore, 2004, pp. 574-579.
-
(2004)
Proc. Int. Conf. Power Syst. Technol.
, pp. 574-579
-
-
Su, C.-L.1
Chang, Y.-C.2
-
27
-
-
71049128991
-
A communicaton system architecture for regional control of power distribution networks
-
Y. Quiang, J. A. Barria, and C. A. H. Aramburo, "A communicaton system architecture for regional control of power distribution networks," in Proc. 7th IEEE Int. Conf. INDIN, 2009, pp. 372-377.
-
(2009)
Proc. 7th IEEE Int. Conf. INDIN
, pp. 372-377
-
-
Quiang, Y.1
Barria, J.A.2
Aramburo, C.A.H.3
-
28
-
-
0032690858
-
Wide area network performance study of a distribution management system
-
Apr. 11-16
-
C. L. Su, C. N. Lu, and M. C. Lin, "Wide area network performance study of a distribution management system," in Proc. Transm. Distrib. Conf., Apr. 11-16, 1999, vol. 1, pp. 136-141.
-
(1999)
Proc. Transm. Distrib. Conf.
, vol.1
, pp. 136-141
-
-
Su, C.L.1
Lu, C.N.2
Lin, M.C.3
|