-
1
-
-
77249153184
-
The smarter grid
-
January/February 2010
-
Fred Cohen, "The Smarter Grid," IEEE Security & Privacy, January/February 2010, p. 60-63, 2010.
-
(2010)
IEEE Security & Privacy
, pp. 60-63
-
-
Cohen, F.1
-
2
-
-
77249084649
-
No grid left behind
-
January/February 2010
-
Mark Fabro, Tim Roxey and Michael Assante, "No Grid Left Behind", IEEE Security & Privacy, January/February 2010, p. 72-76, 2010.
-
(2010)
IEEE Security & Privacy
, pp. 72-76
-
-
Fabro, M.1
Roxey, T.2
Assante, M.3
-
3
-
-
84860779263
-
The power grid meets the Internet
-
NTNU, Trondheim
-
Poul Heegaard, "The power grid meets the Internet", Presentation at the Smart Grid Workshop, NTNU, Trondheim, 2011.
-
(2011)
The Smart Grid Workshop
-
-
Heegaard, P.1
-
4
-
-
84869503739
-
Safety vs. Security?
-
New Orleans ISBN 0-7918-0245-0
-
Maria Line, Odd Nordland, Lillian Røstad and Inger Anne Tøndel, "Safety vs. Security?," in Proceedings from Probabilistic Safety Assessment and Management (PSAM), New Orleans, 2006. ISBN 0-7918-0245-0.
-
(2006)
Proceedings from Probabilistic Safety Assessment and Management (PSAM)
-
-
Line, M.1
Nordland, O.2
Røstad, L.3
Tøndel, I.A.4
-
5
-
-
84860779262
-
-
ISO/IEC 27001: 2005 Information security management systems-Requirements ISO/IEC 2005
-
ISO/IEC 27001:2005 Information security management systems-Requirements, ISO/IEC 2005.
-
-
-
-
6
-
-
77952113745
-
An integrated security system of protecting smart grid against cyber attacks
-
Gaithersburg, Maryland, January
-
D. Wei, Y. Lu, M. Jafari, P. Skare and K. Rohde, "An Integrated Security System of Protecting Smart Grid against Cyber Attacks," Proc. Innovative Smart Grid Technologies (ISGT), Gaithersburg, Maryland, January 2010.
-
(2010)
Proc. Innovative Smart Grid Technologies (ISGT)
-
-
Wei, D.1
Lu, Y.2
Jafari, M.3
Skare, P.4
Rohde, K.5
-
7
-
-
84877617495
-
-
Computerworld
-
Computerworld, "Stuxnet renews power grid security concerns", Jul 26, 2010: http://www.computerworld.com/s/article/9179689/Stuxnet-renews-pow er-grid-security-concerns?taxonomyId=17&pageNumber=1
-
(2010)
Stuxnet Renews Power Grid Security Concerns
-
-
-
8
-
-
84860779261
-
Stuxnet marks the emergence of realworld SCADA security challenges
-
July 27
-
Andy Bochman, Jack Danahy, "Stuxnet marks the emergence of realworld SCADA security challenges", The Smart Grid Security Blog, July 27, 2010: http://smartgridsecurity.blogspot.com/2010/07/with-stuxnetutilities-confront- new.html
-
(2010)
The Smart Grid Security Blog
-
-
Bochman, A.1
Danahy, J.2
-
11
-
-
80455177510
-
-
Institute for Science and International Security December 22
-
David Albright, Paul Brannan, and Christina Walrond, "Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant?," Institute for Science and International Security, December 22, 2010, http://isisonline. org/uploads/isis-reports/documents/stuxnet-FEP-22Dec2010.pdf
-
(2010)
Did stuxnet take out 1,000 Centrifuges at the Natanz Enrichment Plant?
-
-
Albright, D.1
Brannan, P.2
Walrond, C.3
-
12
-
-
79960038785
-
Stuxnet malware and natanz: Update of ISIS December 22, 2010 Report
-
February 15
-
David Albright, Paul Brannan, and Christina Walrond, "Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report," Institute for Science and International Security, February 15, 2011, http://isis-online.org/ uploads/isisreports/documents/stuxnet-update-15Feb2011.pdf
-
(2011)
Institute for Science and International Security
-
-
Albright, D.1
Brannan, P.2
Walrond, C.3
-
13
-
-
84860780198
-
-
The Telegraph Feb 16
-
The Telegraph, "Israeli security chief celebrates Stuxnet cyber attack", Feb 16, 2011: http://www.telegraph.co.uk/technology/news/8326274/ Israeli-securitychief-celebrates-Stuxnet-cyber-attack.html
-
(2011)
Israeli Security Chief Celebrates Stuxnet Cyber Attack
-
-
-
14
-
-
84860294926
-
-
New York Times Nov 18
-
New York Times, "Worm was perfect for sabotaging centrifuges", Nov 18, 2010: http://www.nytimes.com/2010/11/19/world/middleeast/19stuxnet.htm
-
(2010)
Worm Was Perfect for Sabotaging Centrifuges
-
-
-
16
-
-
80053011852
-
-
McAfee® Foundstone®Professional Services;McAfee Labs™ Feb. 10
-
McAfee® Foundstone® Professional Services and McAfee Labs™, "Global Energy Cyberattacks: "Night Dragon", Feb. 10, 2011. Available: http://www.mcafee.com/us/resources/white-papers/wpglobal-energy- cyberattacks-night-dragon.pdf
-
(2011)
Global Energy Cyberattacks: Night Dragon
-
-
-
17
-
-
84860780204
-
-
Computerworld CIA says hackers pulled plug on power grid":
-
Computerworld, "CIA says hackers pulled plug on power grid": http://www.computerworld.com/s/article/9057999/CIA-says-hackers-p ulled-plug-on-power-grid
-
-
-
-
18
-
-
33745446320
-
Slammer worm crashed Ohio nuke plant network
-
Aug 19
-
Kevin Poulsen, "Slammer worm crashed Ohio nuke plant network", SecurityFocus, Aug 19, 2003: http://www.securityfocus.com/news/6767
-
(2003)
SecurityFocus
-
-
Poulsen, K.1
-
19
-
-
84860780203
-
-
Foreign Policy Aug 25
-
Foreign Policy, "The New Threat to Oil Supplies: Hackers", Aug 25, 2009: http://www.foreignpolicy.com/articles/2009/08/25/the-new-threat-to-oi l-supplies-hackers
-
(2009)
The New Threat to Oil Supplies: Hackers"
-
-
-
20
-
-
77249138261
-
Smart-Grid security issues
-
January/February 2010
-
Himanshu Khurana, Mark Hadley, Ning Lu and Deborah A. Frincke, "Smart-Grid Security Issues," IEEE Security & Privacy, January/February 2010, p. 81-85, 2010.
-
(2010)
IEEE Security & Privacy
, pp. 81-85
-
-
Khurana, H.1
Hadley, M.2
Lu, N.3
Frincke, D.A.4
-
21
-
-
84860779264
-
-
OWASP-The Open Web Application Security Project
-
OWASP-The Open Web Application Security Project: www.owasp.org
-
-
-
-
23
-
-
84860721786
-
CWE/SANS: Top 25 Most Dangerous Software Errors 2011
-
CWE/SANS: Top 25 Most Dangerous Software Errors 2011, Sep 13, 2011: http://cwe.mitre.org/top25/
-
Sep
, vol.13
, pp. 2011
-
-
-
24
-
-
77956985496
-
Cyber Attacks Against Georgia: Legal Lessons Identified
-
E. Tikk, K. Kaska, K. Rünnimeri, M. Kert, A.M. Talihärm, L. Vihul, "Cyber Attacks Against Georgia: Legal Lessons Identified", Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia, 2008. http://www.carlisle.army.mil/DIME/documents/Georgia%201%200.pdf
-
(2008)
Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia
-
-
Tikk, E.1
Kaska, K.2
Rünnimeri, K.3
Kert, M.4
Talihärm, A.M.5
Vihul, L.6
-
26
-
-
84860721785
-
Hacktivists target Egypt and Yemen regimes
-
BBC News, "Hacktivists target Egypt and Yemen regimes", Feb 4, 2011: http://www.bbc.co.uk/news/technology-12364654
-
Feb
, vol.4
, pp. 2011
-
-
News, B.1
-
27
-
-
77249154055
-
Inferring personal information from demand-response systems
-
Mikhail A Lisovich, Deirdre K. Mulligan, Stephen B. Wicker, "Inferring Personal Information from Demand-Response Systems," IEEE Security & Privacy, January/February 2010, p. 11-20, 2010.
-
(2010)
IEEE Security & Privacy, January/February 2010
, pp. 11-20
-
-
Lisovich, M.A.1
Mulligan, D.K.2
Wicker, S.B.3
-
28
-
-
64749084618
-
A framework for incident response management in the petroleum industry," Intl
-
Feb. 2009
-
Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Inger Anne Tøndel, Odd Helge Longva, "A framework for incident response management in the petroleum industry," Intl. Journal of Critical Infrastructure Protection 2 (2009) pp. 26-37, Feb. 2009.
-
(2009)
Journal of Critical Infrastructure Protection
, vol.2
, pp. 26-37
-
-
Jaatun, M.G.1
Albrechtsen, E.2
Line, M.B.3
Tøndel, I.A.4
Longva, O.H.5
-
30
-
-
84860721790
-
Smart Grid: Ten Trends to Watch in 2011 and beyond
-
Bob Gohn and Clint Wheelock, "Smart Grid: Ten Trends to Watch in 2011 and Beyond", PikeResearch Research Report, 4Q 2010, http://www.pikeresearch.com/research/smart-grid-ten-trends-to-watchin-2011-and- beyond
-
(2010)
PikeResearch Research Report, 4Q
-
-
Gohn, B.1
Wheelock, C.2
-
31
-
-
84860780205
-
104-OLF recommended guidelines for information security baseline requirements for process control
-
104-OLF recommended guidelines for information security baseline requirements for process control, safety and support ICT systems, 2007. http://www.olf.no/no/Publikasjoner/Retningslinjer/ IntegrerteoperasjonerIntegrated-operations/104/
-
(2007)
Safety and Support ICT Systems
-
-
-
32
-
-
84860780202
-
-
SINTEF report (in Norwegian only), ISBN 978-82-14-04814-8
-
Maria B. Line, Dag Bertelsen, Håvard Fridheim, Per Hokstad, Gerd Kjølle, Jon Røstum, Ingrid B. Utne, Gunhild Åm Vatn, Jørn Vatn, "Metode og verktøy for en samlet risikovurdering av kritiske infrastrukturer", SINTEF report (in Norwegian only), ISBN 978-82-14-04814-8, 2009.
-
(2009)
Metode Og Verktøy for en Samlet Risikovurdering Av Kritiske Infrastrukturer
-
-
Line, M.B.1
Bertelsen, D.2
Fridheim, H.3
Hokstad, P.4
Kjølle, G.5
Røstum, J.6
Utne, I.B.7
Vatn, G.A.8
Vatn, J.9
-
33
-
-
84860721788
-
-
The Smart Grid Interoperability Panel-Cyber Security Working Group NISTIR 7628, August 2010
-
The Smart Grid Interoperability Panel-Cyber Security Working Group, "Guidelines for Smart Grid Cyber Security," NISTIR 7628, August 2010-Vol 3: http://csrc.nist.gov/publications/nistir/ir7628/nistir-7628-vol3.pdf
-
Guidelines for Smart Grid Cyber Security
, vol.3
-
-
-
34
-
-
78751501864
-
Secure remote access to autonomous safety systems: A good practice approach
-
Jaatun, M. G., Grøtan, T. O., Line, M. B.; Secure Remote Access to Autonomous Safety Systems: A Good Practice Approach, International Journal of Autonomous and Adaptive Communications Systems, Vol. 2, No. 3, 2009, ISSN 1754-8632, pp 297-312.
-
(2009)
International Journal of Autonomous and Adaptive Communications Systems
, vol.2
, Issue.3
, pp. 297-312
-
-
Jaatun, M.G.1
Grøtan, T.O.2
Line, M.B.3
|