메뉴 건너뛰기




Volumn 4, Issue 3, 2012, Pages 169-181

Cyber security, building automation, and the intelligent building

Author keywords

building automation system; cyber security; cyber terrorism; integrated building management system; intelligent building; reliability

Indexed keywords

BLACK START; BUILDING AUTOMATION; BUILDING AUTOMATION SYSTEMS; BUILDING MANAGEMENT SYSTEM; CYBER SECURITY; CYBER TERRORISM; INTEGRATED BUILDING MANAGEMENT SYSTEM; MALICIOUS SOFTWARE; MONITORING AND CONTROL; NETWORKED COMPUTERS; PROCESS CONTROLLERS; SECURITY PROTOCOLS; SENSE OF SECURITY; SOFTWARE PLATFORMS;

EID: 84866437613     PISSN: 17508975     EISSN: 17566932     Source Type: Journal    
DOI: 10.1080/17508975.2012.695277     Document Type: Article
Times cited : (19)

References (24)
  • 1
    • 84866447510 scopus 로고    scopus 로고
    • The enemy within
    • 23-24 June
    • Bowden, M. 2010. The enemy within. The Atlantic, 23-24 June
    • (2010) The Atlantic
    • Bowden, M.1
  • 2
    • 84864138643 scopus 로고    scopus 로고
    • Information model standard for integrating facilities with smart grid
    • Bushby, S. T. 2011. Information model standard for integrating facilities with smart grid. ASHRAE Journal, 53(11): B18-B22.
    • (2011) ASHRAE Journal , vol.53 , Issue.11
    • Bushby, S.T.1
  • 3
    • 84866447511 scopus 로고    scopus 로고
    • Multi-building internet demand-response control system
    • California: Lawrence Berkeley National Laboratory
    • Chen, A. 2004. "Multi-building internet demand-response control system". In Environmental Energy Technologies Division News, 5 (1), California: Lawrence Berkeley National Laboratory.
    • (2004) Environmental Energy Technologies Division News , vol.5 , Issue.1
    • Chen, A.1
  • 4
    • 84866464923 scopus 로고    scopus 로고
    • Using model based intrusion detection for SCADA networks
    • Cheung, S. 2006. Using model based intrusion detection for SCADA networks. Science & Technology, 329(7461): 1-12.
    • (2006) Science & Technology , vol.329 , Issue.7461 , pp. 1-12
    • Cheung, S.1
  • 7
    • 84857211660 scopus 로고    scopus 로고
    • DHS, Washington, DC: Department of Homeland Security
    • DHS. 2009. Strategy for securing control systems, Washington, DC: Department of Homeland Security.
    • (2009) Strategy for securing control systems
  • 9
    • 84866453231 scopus 로고    scopus 로고
    • [Accessed 19 March 2012]
    • Fisk, D.J., 2011. Bug in the BMS? http://www3.imperial.ac.uk/lorsystemscentre/workingpapers [Accessed 19 March 2012].
    • (2011) Bug in the BMS?
    • Fisk, D.J.1
  • 10
    • 68549109513 scopus 로고    scopus 로고
    • The Scada Challenge
    • IEEE
    • Gold, S., 2009. The Scada Challenge. Network Security, (8), 18-20. IEEE.
    • (2009) Network Security , Issue.8 , pp. 18-20
    • Gold, S.1
  • 11
    • 0347146126 scopus 로고    scopus 로고
    • Technical report, National Institute of Standards and Technology, NISTIR 7009, July
    • Holmberg, D., 2003. BACnet Wide Area Network Security Threat Assessment. Technical report, National Institute of Standards and Technology, NISTIR 7009, July.
    • (2003) BACnet Wide Area Network Security Threat Assessment
    • Holmberg, D.1
  • 13
    • 64749091493 scopus 로고    scopus 로고
    • ISID, Burnaby: AITG British Columbia Institute of Technology
    • ISID. 2006. Industrial security incident database, Burnaby: AITG British Columbia Institute of Technology.
    • (2006) Industrial security incident database
  • 14
    • 84877999984 scopus 로고    scopus 로고
    • Milk or wine: does software security improve with age?
    • 31 July-4 August 2006, Vancouver, BC
    • Ozment, A. and Schecter, S.E., 2006. Milk or wine: does software security improve with age? In: Proceedings of the Fifteenth USENIX Security Symposium, 31 July-4 August 2006, Vancouver, BC, 93-104.
    • (2006) Proceedings of the Fifteenth USENIX Security Symposium , pp. 93-104
    • Ozment, A.1    Schecter, S.E.2
  • 15
    • 47849131182 scopus 로고    scopus 로고
    • Common approach to functional safety and system security in building automation and control systems
    • Factory Autom. (ETFA'07), Patras, Greece
    • Novak, T., Treytl, A., and Palensky, P., 2007. Common approach to functional safety and system security in building automation and control systems. In: Proceedings of 12th IEEE International Conference on Emerging Technology. Factory Autom. (ETFA'07), Patras, Greece, 1141-1148.
    • (2007) Proceedings of 12th IEEE International Conference on Emerging Technology , pp. 1141-1148
    • Novak, T.1    Treytl, A.2    Palensky, P.3
  • 16
    • 34548017452 scopus 로고    scopus 로고
    • Cyber security risk assessment for SCADA and DCS networks
    • Ralstona, P. A.S., Grahamb, J. H. and Hiebb, J. L. 2007. Cyber security risk assessment for SCADA and DCS networks. ISA Transactions, 46: 583-594.
    • (2007) ISA Transactions , vol.46 , pp. 583-594
    • Ralstona, P.A.S.1    Grahamb, J.H.2    Hiebb, J.L.3
  • 17
    • 85016006634 scopus 로고    scopus 로고
    • Cyber-terrorism: the shape of future conflict?
    • Rathmell, A. 1997. Cyber-terrorism: the shape of future conflict?. RUSI Journal, 142(5): 40-45.
    • (1997) RUSI Journal , vol.142 , Issue.5 , pp. 40-45
    • Rathmell, A.1
  • 18
    • 84866441510 scopus 로고    scopus 로고
    • Anti-virus software market grows. Computer Weekly, 13 July
    • Savvas, A. 2007. Anti-virus software market grows. Computer Weekly, 13 July
    • (2007)
    • Savvas, A.1
  • 19
    • 84866466856 scopus 로고    scopus 로고
    • Siemens, 2011. [Accessed 1 December 2011]
    • Siemens, 2011. http://support.automation.siemens.com [Accessed 1 December 2011].
  • 21
    • 84976781807 scopus 로고
    • Reflections on trusting trust
    • Thompson, K. 1984. Reflections on trusting trust. Communications of the ACM, 27(8): 7614
    • (1984) Communications of the ACM , vol.27 , Issue.8 , pp. 7614
    • Thompson, K.1
  • 22
    • 84866447515 scopus 로고    scopus 로고
    • Cyber Incidents Involving Control Systems. Technical Report. Idao National Laboratory, US DOE, INL/EXT-05-00671, October
    • Turk, R. 2005. Cyber Incidents Involving Control Systems. Technical Report. Idao National Laboratory, US DOE, INL/EXT-05-00671, October
    • (2005)
    • Turk, R.1
  • 23
    • 79958267644 scopus 로고    scopus 로고
    • Is this the start of cyber warfare?
    • Weinberg, S. 2011. Is this the start of cyber warfare?. Nature, 474: 142-145.
    • (2011) Nature , vol.474 , pp. 142-145
    • Weinberg, S.1
  • 24
    • 84944220475 scopus 로고    scopus 로고
    • Adaptive, model-based monitoring for cyber attack detention
    • In: Debar H., Mé L., Felix Wu S., editors Toulouse, France Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • Valdes, A. and Skinner, K. 2000. "Adaptive, model-based monitoring for cyber attack detention". In Recent Advances in Intrusion Detection (RAID 2000) Edited by: Debar, H., Mé, L. and Felix Wu, S. Toulouse, France Lecture Notes in Computer Science, Vol. 1907, Springer-Verlag, Berlin, 80-92
    • (2000) Recent Advances in Intrusion Detection (RAID 2000) , vol.1907 , pp. 80-92
    • Valdes, A.1    Skinner, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.