-
1
-
-
84866447510
-
The enemy within
-
23-24 June
-
Bowden, M. 2010. The enemy within. The Atlantic, 23-24 June
-
(2010)
The Atlantic
-
-
Bowden, M.1
-
2
-
-
84864138643
-
Information model standard for integrating facilities with smart grid
-
Bushby, S. T. 2011. Information model standard for integrating facilities with smart grid. ASHRAE Journal, 53(11): B18-B22.
-
(2011)
ASHRAE Journal
, vol.53
, Issue.11
-
-
Bushby, S.T.1
-
3
-
-
84866447511
-
Multi-building internet demand-response control system
-
California: Lawrence Berkeley National Laboratory
-
Chen, A. 2004. "Multi-building internet demand-response control system". In Environmental Energy Technologies Division News, 5 (1), California: Lawrence Berkeley National Laboratory.
-
(2004)
Environmental Energy Technologies Division News
, vol.5
, Issue.1
-
-
Chen, A.1
-
4
-
-
84866464923
-
Using model based intrusion detection for SCADA networks
-
Cheung, S. 2006. Using model based intrusion detection for SCADA networks. Science & Technology, 329(7461): 1-12.
-
(2006)
Science & Technology
, vol.329
, Issue.7461
, pp. 1-12
-
-
Cheung, S.1
-
7
-
-
84857211660
-
-
DHS, Washington, DC: Department of Homeland Security
-
DHS. 2009. Strategy for securing control systems, Washington, DC: Department of Homeland Security.
-
(2009)
Strategy for securing control systems
-
-
-
9
-
-
84866453231
-
-
[Accessed 19 March 2012]
-
Fisk, D.J., 2011. Bug in the BMS? http://www3.imperial.ac.uk/lorsystemscentre/workingpapers [Accessed 19 March 2012].
-
(2011)
Bug in the BMS?
-
-
Fisk, D.J.1
-
10
-
-
68549109513
-
The Scada Challenge
-
IEEE
-
Gold, S., 2009. The Scada Challenge. Network Security, (8), 18-20. IEEE.
-
(2009)
Network Security
, Issue.8
, pp. 18-20
-
-
Gold, S.1
-
11
-
-
0347146126
-
-
Technical report, National Institute of Standards and Technology, NISTIR 7009, July
-
Holmberg, D., 2003. BACnet Wide Area Network Security Threat Assessment. Technical report, National Institute of Standards and Technology, NISTIR 7009, July.
-
(2003)
BACnet Wide Area Network Security Threat Assessment
-
-
Holmberg, D.1
-
13
-
-
64749091493
-
-
ISID, Burnaby: AITG British Columbia Institute of Technology
-
ISID. 2006. Industrial security incident database, Burnaby: AITG British Columbia Institute of Technology.
-
(2006)
Industrial security incident database
-
-
-
14
-
-
84877999984
-
Milk or wine: does software security improve with age?
-
31 July-4 August 2006, Vancouver, BC
-
Ozment, A. and Schecter, S.E., 2006. Milk or wine: does software security improve with age? In: Proceedings of the Fifteenth USENIX Security Symposium, 31 July-4 August 2006, Vancouver, BC, 93-104.
-
(2006)
Proceedings of the Fifteenth USENIX Security Symposium
, pp. 93-104
-
-
Ozment, A.1
Schecter, S.E.2
-
15
-
-
47849131182
-
Common approach to functional safety and system security in building automation and control systems
-
Factory Autom. (ETFA'07), Patras, Greece
-
Novak, T., Treytl, A., and Palensky, P., 2007. Common approach to functional safety and system security in building automation and control systems. In: Proceedings of 12th IEEE International Conference on Emerging Technology. Factory Autom. (ETFA'07), Patras, Greece, 1141-1148.
-
(2007)
Proceedings of 12th IEEE International Conference on Emerging Technology
, pp. 1141-1148
-
-
Novak, T.1
Treytl, A.2
Palensky, P.3
-
16
-
-
34548017452
-
Cyber security risk assessment for SCADA and DCS networks
-
Ralstona, P. A.S., Grahamb, J. H. and Hiebb, J. L. 2007. Cyber security risk assessment for SCADA and DCS networks. ISA Transactions, 46: 583-594.
-
(2007)
ISA Transactions
, vol.46
, pp. 583-594
-
-
Ralstona, P.A.S.1
Grahamb, J.H.2
Hiebb, J.L.3
-
17
-
-
85016006634
-
Cyber-terrorism: the shape of future conflict?
-
Rathmell, A. 1997. Cyber-terrorism: the shape of future conflict?. RUSI Journal, 142(5): 40-45.
-
(1997)
RUSI Journal
, vol.142
, Issue.5
, pp. 40-45
-
-
Rathmell, A.1
-
18
-
-
84866441510
-
-
Anti-virus software market grows. Computer Weekly, 13 July
-
Savvas, A. 2007. Anti-virus software market grows. Computer Weekly, 13 July
-
(2007)
-
-
Savvas, A.1
-
19
-
-
84866466856
-
-
Siemens, 2011. [Accessed 1 December 2011]
-
Siemens, 2011. http://support.automation.siemens.com [Accessed 1 December 2011].
-
-
-
-
21
-
-
84976781807
-
Reflections on trusting trust
-
Thompson, K. 1984. Reflections on trusting trust. Communications of the ACM, 27(8): 7614
-
(1984)
Communications of the ACM
, vol.27
, Issue.8
, pp. 7614
-
-
Thompson, K.1
-
22
-
-
84866447515
-
-
Cyber Incidents Involving Control Systems. Technical Report. Idao National Laboratory, US DOE, INL/EXT-05-00671, October
-
Turk, R. 2005. Cyber Incidents Involving Control Systems. Technical Report. Idao National Laboratory, US DOE, INL/EXT-05-00671, October
-
(2005)
-
-
Turk, R.1
-
23
-
-
79958267644
-
Is this the start of cyber warfare?
-
Weinberg, S. 2011. Is this the start of cyber warfare?. Nature, 474: 142-145.
-
(2011)
Nature
, vol.474
, pp. 142-145
-
-
Weinberg, S.1
-
24
-
-
84944220475
-
Adaptive, model-based monitoring for cyber attack detention
-
In: Debar H., Mé L., Felix Wu S., editors Toulouse, France Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
Valdes, A. and Skinner, K. 2000. "Adaptive, model-based monitoring for cyber attack detention". In Recent Advances in Intrusion Detection (RAID 2000) Edited by: Debar, H., Mé, L. and Felix Wu, S. Toulouse, France Lecture Notes in Computer Science, Vol. 1907, Springer-Verlag, Berlin, 80-92
-
(2000)
Recent Advances in Intrusion Detection (RAID 2000)
, vol.1907
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
|