-
3
-
-
84860732486
-
-
U.S. Nuclear Regulatory Commission. (2003) [Online]
-
U.S. Nuclear Regulatory Commission. (2003) NRC Information Notice 2003-14. [Online] Available: http://www.nrc.gov/reading-rm/doccollections/gen- comm/infonotices/2003/in200 314.pdf
-
NRC Information Notice 2003-14
-
-
-
5
-
-
84860721550
-
-
Antiy CERT Sep Antiy Corp., Harbin, China. [Online]
-
Antiy CERT. (2010, Sep.). Report on the Worm Stuxnet's Attack. Antiy Corp., Harbin, China. [Online] Available: http://www.antiy.net/en/analysts/ Report-On-the-Attacking-of-Worm-Struxnet-by-antiy
-
(2010)
Report on the Worm Stuxnet's Attack
-
-
-
6
-
-
79954605963
-
-
The Smart Grid Interoperability Panel-Cyber Security Working Group. (2010, Oct.) NIST, Gaithersburg, MD. [Online]
-
The Smart Grid Interoperability Panel-Cyber Security Working Group. (2010, Oct.). Guidelines for Smart Grid Cyber Security. NIST, Gaithersburg, MD. [Online] Available: http://csrc.nist.gov/publications/PubsNISTIRs.html
-
Guidelines for Smart Grid Cyber Security
-
-
-
7
-
-
77958167622
-
-
Beijing: Higher Education Press and New York: Springer Berlin Heidelberg
-
Jie Wang, Computer Network Security. Beijing: Higher Education Press and New York: Springer Berlin Heidelberg, 2009, p. 3-24.
-
(2009)
Computer Network Security
, pp. 3-24
-
-
Wang, J.1
-
8
-
-
21644440888
-
Security for industrial communication systems
-
Jun.
-
D. Dzung, M. Naedele, T. P. Von Hoff, and M. Crevatin, "Security for Industrial Communication Systems," Proceedings of the IEEE, vol. 93, pp. 1152-1177, Jun. 2005.
-
(2005)
Proceedings of the IEEE
, vol.93
, pp. 1152-1177
-
-
Dzung, D.1
Naedele, M.2
Von Hoff, T.P.3
Crevatin, M.4
-
9
-
-
34247563970
-
Aiding side-channel attacks on cryptographic software with satisfiability-based analysis
-
Apr.
-
N. R. Potlapally, A. Raghunathan, S. Ravi, Niraj K. Jha, and Ruby B. Lee, "Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis," IEEE Trans. Very Large Scale Integration (VLSI) Systems, vol. 15, pp. 465-470, Apr. 2007.
-
(2007)
IEEE Trans. Very Large Scale Integration (VLSI) Systems
, vol.15
, pp. 465-470
-
-
Potlapally, N.R.1
Raghunathan, A.2
Ravi, S.3
Jha, N.K.4
Lee, R.B.5
-
10
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
May
-
T. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks," IEEE Trans. Computer, vol. 51, pp. 541-552, May 2002.
-
(2002)
IEEE Trans. Computer
, vol.51
, pp. 541-552
-
-
Messerges, T.1
Dabbish, E.A.2
Sloan, R.H.3
-
12
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in Proc. Crypto, 1996, pp. 104-113.
-
(1996)
Proc. Crypto
, pp. 104-113
-
-
Kocher, P.1
-
14
-
-
67349092535
-
Vulnerability assessment of cybersecurity for SCADA Systems
-
Nov.
-
Chee-Wooi, T., L. Chen-Ching, and G. Manimaran, "Vulnerability Assessment of Cybersecurity for SCADA Systems." IEEE Trans. Power Systems, vol. 23, pp.1836-1846, Nov. 2008.
-
(2008)
IEEE Trans. Power Systems
, vol.23
, pp. 1836-1846
-
-
Chee-Wooi, T.1
Chen-Ching, L.2
Manimaran, G.3
-
15
-
-
71849094936
-
PENET: A practical method and tool for integrated modeling of security attacks and countermeasures
-
May
-
Srdjan Pudar, G. Manimaran and Chen-Ching Liu, "PENET: A practical method and tool for integrated modeling of security attacks and countermeasures," Computers & Security, vol. 28, pp. 754-771, May 2009.
-
(2009)
Computers & Security
, vol.28
, pp. 754-771
-
-
Pudar, S.1
Manimaran, G.2
Liu, C.-C.3
-
16
-
-
77953695984
-
Cybersecurity for critical infrastructures: Attack and defense modeling
-
Jul.
-
T. Chee-Wooi, G. Manimaran, and L. Chen-Ching, "Cybersecurity for Critical Infrastructures: Attack and Defense Modeling," IEEE Trans. Systems, Man and Cybernetics, Part A: Systems and Humans, vol. 40, pp. 853-865, Jul. 2010.
-
(2010)
IEEE Trans. Systems, Man and Cybernetics, Part A: Systems and Humans
, vol.40
, pp. 853-865
-
-
Chee-Wooi, T.1
Manimaran, G.2
Chen-Ching, L.3
-
17
-
-
82155164993
-
Towards a framework for cyber attack impact analysis of the electric smart grid
-
D. Kundur, X. Feng, S. Liu, T. Zourntos, and K. L. Butler-Purry, "Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid," in Proc. 2010 First IEEE International Conf. on Smart Grid Communication, pp. 244-249.
-
Proc. 2010 First IEEE International Conf. on Smart Grid Communication
, pp. 244-249
-
-
Kundur, D.1
Feng, X.2
Liu, S.3
Zourntos, T.4
Butler-Purry, K.L.5
-
18
-
-
79954619874
-
Towards modelling the impact of cyber attacks on a smart grid
-
Apr.
-
D. Kundur, X. F., S. Mashayekh, S. Liu, T. Zourntos, K.L. Butler-Purry, "Towards modelling the impact of cyber attacks on a smart grid," International Journal of Security and Networks, vol. 6, pp. 2-13, Apr. 2011.
-
(2011)
International Journal of Security and Networks
, vol.6
, pp. 2-13
-
-
Kundur X F, D.1
Mashayekh, S.2
Liu, S.3
Zourntos, T.4
Butler-Purry, K.L.5
-
19
-
-
52349089504
-
Towards a common model for studying critical infrastructure interdependencies
-
B. Rozel, M. Viziteu, R. Caire, N. Hadjsaid, and J. P. Rognon, "Towards a common model for studying critical infrastructure interdependencies," in Proc. 2008 IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, pp. 1-6.
-
Proc. 2008 IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century
, pp. 1-6
-
-
Rozel, B.1
Viziteu, M.2
Caire, R.3
Hadjsaid, N.4
Rognon, J.P.5
-
21
-
-
77952113745
-
An integrated security system of protecting Smart Grid against cyber attacks
-
W. Dong, L. Yan, M. Jafari, P. Skare, and K. Rohde, "An integrated security system of protecting Smart Grid against cyber attacks," in Proc. 2010 Innovative Smart Grid Technologies (ISGT), pp. 1-7.
-
Proc. 2010 Innovative Smart Grid Technologies (ISGT)
, pp. 1-7
-
-
Dong, W.1
Yan, L.2
Jafari, M.3
Skare, P.4
Rohde, K.5
-
22
-
-
70449794133
-
ICT resilience of power control systems: Experimental results from the CRUTIAL testbeds
-
G. Dondossola, G. Garrone, J. Szanto, G. Deconinck, T. Loix, and H. Beitollahi, "ICT resilience of power control systems: experimental results from the CRUTIAL testbeds," in Proc. 2009 IEEE/IFIP International Conf. on Dependable Systems & Networks, pp. 554-559.
-
Proc. 2009 IEEE/IFIP International Conf. on Dependable Systems & Networks
, pp. 554-559
-
-
Dondossola, G.1
Garrone, G.2
Szanto, J.3
Deconinck, G.4
Loix, T.5
Beitollahi, H.6
-
23
-
-
79957979992
-
A testbed for analyzing security of SCADA control systems (TASSCS)
-
M. Mallouhi, Y. Al-Nashif, D. Cox, T. Chadaga, and S. Hariri, "A testbed for analyzing security of SCADA control systems (TASSCS)," in Proc. 2011 IEEE/PES Innovative Smart Grid Technologies (ISGT), pp. 1-7.
-
Proc. 2011 IEEE/PES Innovative Smart Grid Technologies (ISGT)
, pp. 1-7
-
-
Mallouhi, M.1
Al-Nashif, Y.2
Cox, D.3
Chadaga, T.4
Hariri, S.5
-
24
-
-
79961156021
-
Scalability of smart grid protocols: Protocols and their simulative evaluation for massively distributed DERs
-
J. Bergmann, C. Glomb, J. Gotz, J. Heuer, R. Kuntschke, and M. Winter, "Scalability of Smart Grid Protocols: Protocols and Their Simulative Evaluation for Massively Distributed DERs," in Proc. 2010 First IEEE International Conf. on Smart Grid Communication, pp. 131-136.
-
Proc. 2010 First IEEE International Conf. on Smart Grid Communication
, pp. 131-136
-
-
Bergmann, J.1
Glomb, C.2
Gotz, J.3
Heuer, J.4
Kuntschke, R.5
Winter, M.6
-
25
-
-
79961142873
-
Modeling smart grid applications with co-simulation
-
T. Godfrey, S. Mullen, D. W. Griffith, N. Golmie, R. C. Dugan, and C. Rodine, "Modeling Smart Grid Applications with Co-Simulation," in Proc. 2010 First IEEE International Conf. on Smart Grid Communication, pp. 291-296.
-
Proc. 2010 First IEEE International Conf. on Smart Grid Communication
, pp. 291-296
-
-
Godfrey, T.1
Mullen, S.2
Griffith, D.W.3
Golmie, N.4
Dugan, R.C.5
Rodine, C.6
-
26
-
-
33646340926
-
EPOCHS: A platform for agent-based electric power and communication simulation built from commercial off-the-shelf components
-
May.
-
K. Hopkinson, X. Wang, R. Giovanini, J. Thorp, K. Birman, and D. Coury, "EPOCHS: a platform for agent-based electric power and communication simulation built from commercial off-the-shelf components," IEEE Trans. Power Systems, vol. 21, pp. 548-558, May. 2006.
-
(2006)
IEEE Trans. Power Systems
, vol.21
, pp. 548-558
-
-
Hopkinson, K.1
Wang, X.2
Giovanini, R.3
Thorp, J.4
Birman, K.5
Coury, D.6
-
27
-
-
84860721553
-
-
NERC CIP Cyber Security Standards Feb.
-
NERC CIP Cyber Security Standards, NERC Reliability Standards: CIP, Feb. 2011.
-
(2011)
NERC Reliability Standards: CIP
-
-
-
28
-
-
84860721551
-
-
NIST. (2009, Aug.), NIST Special Publication, 800-53 Revision 3: Recommended Security Controls for Federal Information Systems and Organizations. NIST, Gaithersburg, MD. [Online]
-
NIST. (2009, Aug.). NIST Special Publication 800-53 Revision 3: Recommended Security Controls for Federal Information Systems and Organizations. NIST, Gaithersburg, MD. [Online] Available: http://csrc.nist.gov/publications/ nistpubs/800-53-Rev3/sp800-53-rev3-final.pdf
-
-
-
-
29
-
-
84860712170
-
-
NERC May NERC, Princeton, NJ. [Online]
-
NERC. (2011, May). 2012 NERC Business Plan and Budget-DRAFT 1. NERC, Princeton, NJ. [Online] Available: http://www.nerc.com/filez/business-plan-2012. html
-
(2011)
2012 NERC Business Plan and Budget-DRAFT 1
-
-
-
30
-
-
78650581942
-
Survey of smart grid standardization studies and recommendations
-
S. Rohjans, M. Uslar, R. Bleiker, J. Gonzalez, M. Specht, T. Suding, and T. Weidelt, "Survey of Smart Grid Standardization Studies and Recommendations," in Proc. 2010 First IEEE International Conf. on Smart Grid Communication, pp. 583-588.
-
Proc. 2010 First IEEE International Conf. on Smart Grid Communication
, pp. 583-588
-
-
Rohjans, S.1
Uslar, M.2
Bleiker, R.3
Gonzalez, J.4
Specht, M.5
Suding, T.6
Weidelt, T.7
-
31
-
-
34250201862
-
IEC TC57 Security standards for the power system's information infrastructure-beyond simple encryption
-
F. Cleveland, "IEC TC57 Security Standards for the Power System's Information Infrastructure-Beyond Simple Encryption," in Proc. 2005/2006 IEEE PES Transmission and Distribution Conf. and Exhibit., pp. 1079-1087.
-
Proc. 2005/2006 IEEE PES Transmission and Distribution Conf. and Exhibit
, pp. 1079-1087
-
-
Cleveland, F.1
-
35
-
-
50649107305
-
Idaho national laboratory supervisory control and data acquisition intrusion detection System (SCADA IDS)
-
J. Verba and M. Milvich, "Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)," in Proc. 2008 IEEE Conf. on Technologies for Homeland Security, pp. 469-473.
-
Proc. 2008 IEEE Conf. on Technologies for Homeland Security
, pp. 469-473
-
-
Verba, J.1
Milvich, M.2
-
36
-
-
77954330725
-
Modbus/DNP3 state-based intrusion detection system
-
I. N. Fovino, A. Carcano, T. De Lacheze Murel, A. Trombetta, and M. Masera, "Modbus/DNP3 State-Based Intrusion Detection System," in Proc. 2010 24th IEEE International Conf. on Advanced Information Networking and Applications (AINA), pp. 729-736.
-
Proc. 2010 24th IEEE International Conf. on Advanced Information Networking and Applications (AINA)
, pp. 729-736
-
-
Fovino, I.N.1
Carcano, A.2
Murel Lacheze T.De3
Trombetta, A.4
Masera, M.5
-
37
-
-
79955867639
-
A multidimensional critical state analysis for detecting intrusions in SCADA Systems
-
May.
-
A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. N. Fovino, and A. Trombetta, "A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems," IEEE Trans. Industrial Informatics, vol. 7, pp. 179-186, May. 2011.
-
(2011)
IEEE Trans. Industrial Informatics
, vol.7
, pp. 179-186
-
-
Carcano, A.1
Coletta, A.2
Guglielmi, M.3
Masera, M.4
Fovino, I.N.5
Trombetta, A.6
-
38
-
-
70350634504
-
Using model-based intrusion detection for SCADA networks
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A. Valdes, "Using model-based intrusion detection for SCADA networks," in Proc. 2007 the SCADA Security Scientific Symposium, pp. 127-134.
-
Proc. 2007 the SCADA Security Scientific Symposium
, pp. 127-134
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
39
-
-
77956987558
-
An intrusion detection system for iec61850 automated substations
-
Oct.
-
U. K. Premaratne, J. Samarabandu, T. S. Sidhu, R. Beresh, and T. Jian-Cheng, "An Intrusion Detection System for IEC61850 Automated Substations," IEEE Trans Power Delivery, vol. 25, pp. 2376-2383, Oct. 2010.
-
(2010)
IEEE Trans Power Delivery
, vol.25
, pp. 2376-2383
-
-
Premaratne, U.K.1
Samarabandu, J.2
Sidhu, T.S.3
Beresh, R.4
Jian-Cheng, T.5
-
41
-
-
71649111107
-
Anomaly detection in power system control center critical infrastructures using rough classification algorithm
-
M. P. Coutinho, G. Lambert-Torres, L. E. B. da Silva, H. G. Martins, H. Lazarek, and J. C. Neto, "Anomaly detection in power system control center critical infrastructures using rough classification algorithm," in Proc. 2009 3rd IEEE International Conf. on Digital Ecosystems and Technologies, pp. 733-738.
-
Proc. 2009 3rd IEEE International Conf. on Digital Ecosystems and Technologies
, pp. 733-738
-
-
Coutinho, M.P.1
Lambert-Torres, G.2
Da Silva, L.E.B.3
Martins, H.G.4
Lazarek, H.5
Neto, J.C.6
-
42
-
-
0142219252
-
An improved reference flow control model for policy-based intrusion detection
-
J. Zimmermann, L. Me, and C. Bidan, "An improved reference flow control model for policy-based intrusion detection," in Proc. Computer Security, ESORICS 2003, pp. 291-308.
-
(2003)
Proc. Computer Security, ESORICS
, pp. 291-308
-
-
Zimmermann, J.1
Me, L.2
Bidan, C.3
|