메뉴 건너뛰기




Volumn , Issue , 2012, Pages 331-332

Wireless vulnerability of SCADA systems

Author keywords

penetration testing; risk; SCADA; security; vulnerability assessment; wireless networks

Indexed keywords

CRITICAL EQUIPMENT; CYBERSPACES; PENETRATION TESTING; PROOF OF CONCEPT; SCADA; SECURITY; VULNERABILITY ASSESSMENTS; WIRELESS SECURITY;

EID: 84862696142     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2184512.2184590     Document Type: Conference Paper
Times cited : (8)

References (9)
  • 2
    • 84862664320 scopus 로고    scopus 로고
    • Website Retrieved October 30, 2011, from
    • Aircrack-ng Website (2011). Simple WEP Cracking with a Flowchart. Retrieved October 30, 2011, from http://www.aircrack-ng.org/.
    • (2011) Simple WEP Cracking with A Flowchart
  • 4
    • 84862651266 scopus 로고    scopus 로고
    • Retrieved January 15, 2012 from
    • ColaSoft (2012). "Colasoft Packet Builder." Retrieved January 15, 2012 from http://www.colasoft.com/packet-builder.
    • (2012) Colasoft Packet Builder
  • 6
    • 84862701566 scopus 로고    scopus 로고
    • Karma Project Retrieved October 22, 2011, from
    • Karma Project (2011). Linux Rogue Access Point HOWTO. Retrieved October 22, 2011, from http://wirelessdefence.org/Contents/RogueAPHowtoBASICLinux.htm.
    • (2011) Linux Rogue Access Point HOWTO
  • 7
    • 52049085664 scopus 로고    scopus 로고
    • Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
    • March 31-April 2, 2008
    • Martinovic, I. et al (2008) Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless. Proceedings of WiSec'08, pages 36-45, March 31-April 2, 2008.
    • (2008) Proceedings of WiSec'08 , pp. 36-45
    • Martinovic, I.1
  • 8
    • 85046311847 scopus 로고    scopus 로고
    • Retrieved January 10, 2012, from
    • Sanders, Chris (2010), "Understanding Man-in-the-Middle Attack," Retrieved January 10, 2012, from http://www.windowsecurity.com/ articles/Understanding-Man-in-the-Middle-Attacks-ARP-Part1.html
    • (2010) Understanding Man-in-the-Middle Attack
    • Sanders, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.