-
4
-
-
67650673285
-
A review of WPAN security: attacks and prevention
-
Ilan, Taiwan
-
Kennedy, T., Hunt, R.: A review of WPAN security: attacks and prevention. The International Conference on Mobile Technology, Applications & Systems, Ilan, Taiwan (2008).
-
(2008)
The International Conference on Mobile Technology, Applications & Systems
-
-
Kennedy, T.1
Hunt, R.2
-
5
-
-
84864409114
-
-
KDD Cup 1999 Data
-
KDD Cup 1999 Data. http://kdd. ics. uci. edu/databases/kddcup99/kddcup99. html.
-
-
-
-
6
-
-
85019691440
-
Testing intrusion detection system: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
McHugh J.: Testing intrusion detection system: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262-294 (2000).
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
7
-
-
77954796687
-
A testbed for secure and robust SCADA systems
-
Giani, A., Karsai, G., Roosta, T., Shah, A., Sinopoli, B., Wiley, J.: A testbed for secure and robust SCADA systems. 14th IEEE Real-time and Embedded Technology and Applications Symposium (RTAS'08) WIP session (2008).
-
(2008)
14th IEEE Real-time and Embedded Technology and Applications Symposium (RTAS'08) WIP session
-
-
Giani, A.1
Karsai, G.2
Roosta, T.3
Shah, A.4
Sinopoli, B.5
Wiley, J.6
-
8
-
-
84860603953
-
-
Master's thesis, University of Illinois, Urbana-Champaign, IL
-
Bergman, D. C.: Power grid simulation, evaluation, and test framework. Master's thesis, University of Illinois, Urbana-Champaign, IL (2010).
-
(2010)
Power grid simulation, evaluation, and test framework
-
-
Bergman, D.C.1
-
9
-
-
77955698013
-
An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants
-
2010 3rd Conference on
-
Fovino, I., Masera, M., Guidi, L., Carpi, G.: An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants. Human System Interactions (HSI), 2010 3rd Conference on, pp. 679-686 (2010).
-
(2010)
Human System Interactions (HSI)
, pp. 679-686
-
-
Fovino, I.1
Masera, M.2
Guidi, L.3
Carpi, G.4
-
10
-
-
80052094240
-
A control system testbed to validate critical infrastructure protection concepts
-
doi: 10. 1016/j. ijcip. 2011. 06. 00
-
Morris, T., Srivastava, A., Reaves, B., Gao, W., Pavurapu, K., Reddi, R.: A control system testbed to validate critical infrastructure protection concepts. Int. J. Crit. Infrastruct. Prot. Elseiver. (2011). doi: 10. 1016/j. ijcip. 2011. 06. 00.
-
(2011)
Int. J. Crit. Infrastruct. Prot. Elseiver
-
-
Morris, T.1
Srivastava, A.2
Reaves, B.3
Gao, W.4
Pavurapu, K.5
Reddi, R.6
-
11
-
-
78650059386
-
Real time test bed development for power system operation, control and cyber security
-
Reddi R., Srivastava A.: Real time test bed development for power system operation, control and cyber security. N. Am. Power Symp. (NAPS) 2010, 1-6 (2010).
-
(2010)
N. Am. Power Symp. (NAPS)
, vol.2010
, pp. 1-6
-
-
Reddi, R.1
Srivastava, A.2
-
12
-
-
84864400347
-
-
Doctoral dissertation, University of California, Davis, Davis, CA
-
Brugger, S. T.: The Quantitative Comparison of Computer Networks. Doctoral dissertation, University of California, Davis, Davis, CA (2009).
-
(2009)
The Quantitative Comparison of Computer Networks
-
-
Brugger, S.T.1
-
13
-
-
70350634504
-
Using model-based intrusion detection for SCADA networks
-
Miami, FL, Digital Bond
-
Cheung, S., Dutertre, B., Fong, M., Lindqvist, U., Skinner, K., Valdes, A.: Using model-based intrusion detection for SCADA networks. Proceedings of the SCADA Security Scientific Symposium. Miami, FL, Digital Bond (2007).
-
(2007)
Proceedings of the SCADA Security Scientific Symposium
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
14
-
-
70449653118
-
Communication pattern anomaly detection in process control systems
-
Waltham, MA, USA
-
Valdes, A., Cheung, S.: Communication pattern anomaly detection in process control systems. 2009 IEEE Conference on Technologies for Homeland Security, Waltham, MA, USA, pp. 22-29 (2009).
-
(2009)
2009 IEEE Conference on Technologies for Homeland Security
, pp. 22-29
-
-
Valdes, A.1
Cheung, S.2
-
15
-
-
84891752381
-
A taxonomy of attacks on the DNP3 protocol
-
East S., Butts J., Papa M., Shenoi S.: A taxonomy of attacks on the DNP3 protocol. Crit. Infrastruct. Prot. III 311, 67 (2009).
-
(2009)
Crit. Infrastruct. Prot. III
, vol.311
, pp. 67
-
-
East, S.1
Butts, J.2
Papa, M.3
Shenoi, S.4
-
16
-
-
55549097482
-
Towards a taxonomy of attacks against energy control systems
-
In: Papa, M., Shenoi, S. (eds.), Springer, Boston, doi: 10. 1007/978-0-387-88523-0_6
-
Fleury, T., Khurana, H., Welch, V.: Towards a taxonomy of attacks against energy control systems. In: Papa, M., Shenoi, S. (eds.) Critical Infrastructure Protection II, IFIP International Federation for Information Processing. Springer, Boston, vol. 290, pp. 71-85 (2009). doi: 10. 1007/978-0-387-88523-0_6.
-
(2009)
Critical Infrastructure Protection II, IFIP International Federation for Information Processing
, vol.290
, pp. 71-85
-
-
Fleury, T.1
Khurana, H.2
Welch, V.3
-
17
-
-
68949145137
-
Attack taxonomies for the modbus protocols
-
Huitsing P., Chandia R., Papa M., Shenoi S.: Attack taxonomies for the modbus protocols. Int. J. Crit. Infrastruct. Prot. I, 37-44 (2008).
-
(2008)
Int. J. Crit. Infrastruct. Prot.
, vol.I
, pp. 37-44
-
-
Huitsing, P.1
Chandia, R.2
Papa, M.3
Shenoi, S.4
|