-
1
-
-
84865375551
-
-
Nat'l Inst. Standards and Tech., Aug.
-
"NISTIR 7628, Guidelines for Smart Grid Cyber Security," vols. 1-3, Nat'l Inst. Standards and Tech., Aug. 2010; http://csrc.nist.gov/ publications/PubsNISTIRs.html.
-
NISTIR 7628, Guidelines for Smart Grid Cyber Security
, vol.1-3
, pp. 2010
-
-
-
2
-
-
84865375550
-
The viking project-towards more secure scada systems
-
G. Björkman, "The VIKING Project -Towards More Secure SCADA Systems," Proc. HSCC 1st Workshop Secure Control Systems, 2010; www.truststc.org/conferences/10/CPSWeek/papers/scs1-paper-1.pdf.
-
(2010)
Proc. HSCC 1st Workshop Secure Control Systems
-
-
Björkman, G.1
-
3
-
-
0002670359
-
Attack trees: Modeling security threats
-
Dec.
-
B. Schneier, "Attack Trees: Modeling Security Threats," Dr. Dobb's J., Dec. 1999, www.schneier.com/paper-attacktreesddj-ft.html.
-
(1999)
Dr. Dobb's J.
-
-
Schneier, B.1
-
4
-
-
77955417822
-
A probabilistic relational model for security risk analysis
-
T. Sommestad, M. Ekstedt, and P. Johnson, "A Probabilistic Relational Model for Security Risk Analysis," Computers & Security, vol. 29, no. 6, 2010, pp. 659-679.
-
(2010)
Computers & Security
, vol.29
, Issue.6
, pp. 659-679
-
-
Sommestad, T.1
Ekstedt, M.2
Johnson, P.3
-
5
-
-
84857973207
-
Effort estimates for vulnerability discovery projects
-
IEEE CS
-
T. Sommestad, H. Holm, and M. Ekstedt, "Effort Estimates for Vulnerability Discovery Projects," Proc. 45th Hawaii Int'l Conf. System Sciences, IEEE CS, 2012, pp. 5564-5573.
-
(2012)
Proc. 45th Hawaii Int'l Conf. System Sciences
, pp. 5564-5573
-
-
Sommestad, T.1
Holm, H.2
Ekstedt, M.3
-
6
-
-
48249098845
-
Yasir: A low-latency, high-integrity security retrofit for legacy scada systems
-
Springer
-
P. Tsang and S. Smith, "YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy Scada Systems,'' Proc. IFIP/TC11 Int'l Information Security Conference, Springer, 2008, pp. 445-459.
-
(2008)
Proc. IFIP/TC11 Int'l Information Security Conference
, pp. 445-459
-
-
Tsang, P.1
Smith, S.2
-
9
-
-
84885756672
-
Stealth attacks and protection schemes for state estimators in power systems
-
IEEE
-
G. Dán and H. Sandberg, "Stealth Attacks and Protection Schemes for State Estimators in Power Systems," Proc. IEEE SmartGridComm, IEEE, 2010.
-
(2010)
Proc. IEEE SmartGridComm
-
-
Dán, G.1
Sandberg, H.2
-
10
-
-
84855825082
-
Network-layer protection schemes against stealth attacks on state estimators in power systems
-
IEEE
-
O. Vukovic et al., "Network-Layer Protection Schemes against Stealth Attacks on State Estimators in Power Systems," Proc. IEEE SmartGridComm, IEEE, 2011, pp. 184-189.
-
(2011)
Proc. IEEE SmartGridComm
, pp. 184-189
-
-
Vukovic, O.1
-
11
-
-
84865362297
-
Outage analysis: Italy
-
H. Mueller, "Outage Analysis: Italy," Network Manager News, vol. 2, no. 1, 2004, pp. 1-3.
-
(2004)
Network Manager News
, vol.2
, Issue.1
, pp. 1-3
-
-
Mueller, H.1
-
12
-
-
68049114593
-
Concurrent multipath transfer during path failure
-
P. Natarajan et al., "Concurrent Multipath Transfer during Path Failure," Computer Comm., vol. 32, no. 15, 2009, pp. 1577-1587.
-
(2009)
Computer Comm.
, vol.32
, Issue.15
, pp. 1577-1587
-
-
Natarajan, P.1
-
13
-
-
33947418087
-
A survey on mix networks and their secure applications
-
K. Sampigethaya and R. Poovendran, "A Survey on Mix Networks and Their Secure Applications," Proc. IEEE, vol. 94, no. 12, 2006, pp. 2142-2181.
-
(2006)
Proc. IEEE
, vol.94
, Issue.12
, pp. 2142-2181
-
-
Sampigethaya, K.1
Poovendran, R.2
-
14
-
-
80052185753
-
On the trade-off between relationship anonymity and communication overhead in anonymity networks
-
IEEE
-
O. Vukovic, G. Dán, and G. Karlsson, "On the Trade-off between Relationship Anonymity and Communication Overhead in Anonymity Networks," Proc. IEEE Int'l Conf. Communications (ICC 11), IEEE, 2011, pp. 1-6.
-
(2011)
Proc. IEEE Int'l Conf. Communications (ICC 11)
, pp. 1-6
-
-
Vukovic, O.1
Dán, G.2
Karlsson, G.3
|