-
1
-
-
33947501709
-
Novelty detection and management to safeguard information-intensive critical infrastructures
-
C. Balducelli, L. Lavalle, and G. Vicoli. Novelty detection and management to safeguard information-intensive critical infrastructures. Int. J. Emergency Management, 4(1):88-103, 2007.
-
(2007)
Int. J. Emergency Management
, vol.4
, Issue.1
, pp. 88-103
-
-
Balducelli, C.1
Lavalle, L.2
Vicoli, G.3
-
2
-
-
84859034021
-
Difficulties in modeling SCADA traffic: A comparative analysis
-
13th International Conference on Passive and Active Measurement, PAM 2012, Vienna, Austria, Berlin, March Springer Verlag
-
R. R. R. Barbosa, R. Sadre, and A. Pras. Difficulties in modeling SCADA traffic: A comparative analysis. In 13th International Conference on Passive and Active Measurement, PAM 2012, Vienna, Austria, volume 7192 of LNCS, pages 126-135, Berlin, March 2012. Springer Verlag.
-
(2012)
LNCS
, vol.7192
, pp. 126-135
-
-
Barbosa, R.R.R.1
Sadre, R.2
Pras, A.3
-
3
-
-
48249129248
-
Vulnerability analysis of SCADA protocol binaries through detection of memory access taintedness
-
LTC John Hill, editor, IEEE Press
-
C. Bellettini and J. Rrushi. Vulnerability analysis of SCADA protocol binaries through detection of memory access taintedness. In LTC John Hill, editor, Proc. 8th IEEE SMC Information Assurance Workshop, pages 341-348. IEEE Press, 2007.
-
(2007)
Proc. 8th IEEE SMC Information Assurance Workshop
, pp. 341-348
-
-
Bellettini, C.1
Rrushi, J.2
-
4
-
-
77953868170
-
Early application identification
-
New York, NY, USA, ACM
-
L. Bernaille, R. Teixeira, and K. Salamatian. Early application identification. In Proc. of the ACM CoNEXT conference, CoNEXT '06, pages 6:1-6:12, New York, NY, USA, 2006. ACM.
-
(2006)
Proc. of the ACM CoNEXT Conference, CoNEXT '06
-
-
Bernaille, L.1
Teixeira, R.2
Salamatian, K.3
-
5
-
-
33847767196
-
Safeguarding SCADA systems with anomaly detection
-
Proc. 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, Springer Verlag
-
J. Bigham, D. Gamez, and N. Lu. Safeguarding SCADA systems with anomaly detection. In Proc. 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, LNCS 2776, pages 171-182. Springer Verlag, 2003.
-
(2003)
LNCS
, vol.2776
, pp. 171-182
-
-
Bigham, J.1
Gamez, D.2
Lu, N.3
-
6
-
-
27944494969
-
Towards discovery of event correlation rules
-
L. Burns, J.L. Hellerstein, S. Ma, C.S. Perng, D.A. Rabenhorst, and D.J. Taylor. Towards discovery of event correlation rules. In Proc. IEEE/IFIP International Symposium on Integrated Network Management, pages 345-359, 2001.
-
(2001)
Proc. IEEE/IFIP International Symposium on Integrated Network Management
, pp. 345-359
-
-
Burns, L.1
Hellerstein, J.L.2
Ma, S.3
Perng, C.S.4
Rabenhorst, D.A.5
Taylor, D.J.6
-
7
-
-
85084140752
-
Research challenges for the security of control systems
-
Berkeley, CA, USA, USENIX Association
-
Alvaro A. Cárdenas, Saurabh Amin, and Shankar Sastry. Research challenges for the security of control systems. In Proc. of the 3rd conference on Hot topics in security, HOTSEC'08, pages 6:1-6:6, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proc. of the 3rd Conference on Hot Topics in Security, HOTSEC'08
-
-
Cárdenas, A.A.1
Amin, S.2
Sastry, S.3
-
8
-
-
70350634504
-
Using model-based intrusion detection for SCADA networks
-
Digital Bound Press
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Sinner, and A. Valdes. Using model-based intrusion detection for SCADA networks. In Proc. SCADA Security Scientific Symposium 2007. Digital Bound Press, 2007.
-
(2007)
Proc. SCADA Security Scientific Symposium 2007
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Sinner, K.5
Valdes, A.6
-
9
-
-
84866527200
-
-
February 20011
-
National Vulnerabiltity Database. National Vulnerabiltity Database CVE-2010-4709. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4709, February 20011.
-
National Vulnerabiltity Database CVE-2010-4709
-
-
-
12
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
New York, NY, USA, ACM
-
Y. Liu, P. Ning, and M. Reiter. False data injection attacks against state estimation in electric power grids. In Proc. 16th ACM conference on Computer and communications security, CCS '09, pages 21-32, New York, NY, USA, 2009. ACM.
-
(2009)
Proc. 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.3
-
15
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
December
-
V. Paxson. Bro: a system for detecting network intruders in real-time. Comput. Netw., 31:2435-2463, December 1999.
-
(1999)
Comput. Netw.
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
16
-
-
75249091463
-
Cybercrimes against critical infrastructures: A study of online criminal organization and techniques
-
Sep
-
A. Rege-Patwardhan. Cybercrimes against critical infrastructures: a study of online criminal organization and techniques. Criminal Justice Studies, 22(3):261-271, Sep 2009.
-
(2009)
Criminal Justice Studies
, vol.22
, Issue.3
, pp. 261-271
-
-
Rege-Patwardhan, A.1
-
18
-
-
70449653118
-
Communication pattern anomaly detection in process control systems
-
Alfonso Valdes and Steven Cheung. Communication pattern anomaly detection in process control systems. In 2009 IEEE International Conference on Technologies for Homeland Security, Waltham, MA, May 11-12, 2009.
-
2009 IEEE International Conference on Technologies for Homeland Security, Waltham, MA, May 11-12, 2009
-
-
Valdes, A.1
Cheung, S.2
|