메뉴 건너뛰기




Volumn , Issue , 2012, Pages 133-138

Challenges and opportunities in securing industrial control systems

Author keywords

[No Author keywords available]

Indexed keywords

CYBER THREATS; DATA RESOURCES; INDUSTRIAL CONTROL SYSTEMS; INDUSTRIAL PROCESSS; RESEARCH EFFORTS; SPECIFIC NATURE;

EID: 84866543673     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CompEng.2012.6242970     Document Type: Conference Paper
Times cited : (22)

References (21)
  • 1
    • 33947501709 scopus 로고    scopus 로고
    • Novelty detection and management to safeguard information-intensive critical infrastructures
    • C. Balducelli, L. Lavalle, and G. Vicoli. Novelty detection and management to safeguard information-intensive critical infrastructures. Int. J. Emergency Management, 4(1):88-103, 2007.
    • (2007) Int. J. Emergency Management , vol.4 , Issue.1 , pp. 88-103
    • Balducelli, C.1    Lavalle, L.2    Vicoli, G.3
  • 2
    • 84859034021 scopus 로고    scopus 로고
    • Difficulties in modeling SCADA traffic: A comparative analysis
    • 13th International Conference on Passive and Active Measurement, PAM 2012, Vienna, Austria, Berlin, March Springer Verlag
    • R. R. R. Barbosa, R. Sadre, and A. Pras. Difficulties in modeling SCADA traffic: A comparative analysis. In 13th International Conference on Passive and Active Measurement, PAM 2012, Vienna, Austria, volume 7192 of LNCS, pages 126-135, Berlin, March 2012. Springer Verlag.
    • (2012) LNCS , vol.7192 , pp. 126-135
    • Barbosa, R.R.R.1    Sadre, R.2    Pras, A.3
  • 3
    • 48249129248 scopus 로고    scopus 로고
    • Vulnerability analysis of SCADA protocol binaries through detection of memory access taintedness
    • LTC John Hill, editor, IEEE Press
    • C. Bellettini and J. Rrushi. Vulnerability analysis of SCADA protocol binaries through detection of memory access taintedness. In LTC John Hill, editor, Proc. 8th IEEE SMC Information Assurance Workshop, pages 341-348. IEEE Press, 2007.
    • (2007) Proc. 8th IEEE SMC Information Assurance Workshop , pp. 341-348
    • Bellettini, C.1    Rrushi, J.2
  • 5
    • 33847767196 scopus 로고    scopus 로고
    • Safeguarding SCADA systems with anomaly detection
    • Proc. 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, Springer Verlag
    • J. Bigham, D. Gamez, and N. Lu. Safeguarding SCADA systems with anomaly detection. In Proc. 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, LNCS 2776, pages 171-182. Springer Verlag, 2003.
    • (2003) LNCS , vol.2776 , pp. 171-182
    • Bigham, J.1    Gamez, D.2    Lu, N.3
  • 9
    • 84866527200 scopus 로고    scopus 로고
    • February 20011
    • National Vulnerabiltity Database. National Vulnerabiltity Database CVE-2010-4709. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4709, February 20011.
    • National Vulnerabiltity Database CVE-2010-4709
  • 15
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • December
    • V. Paxson. Bro: a system for detecting network intruders in real-time. Comput. Netw., 31:2435-2463, December 1999.
    • (1999) Comput. Netw. , vol.31 , pp. 2435-2463
    • Paxson, V.1
  • 16
    • 75249091463 scopus 로고    scopus 로고
    • Cybercrimes against critical infrastructures: A study of online criminal organization and techniques
    • Sep
    • A. Rege-Patwardhan. Cybercrimes against critical infrastructures: a study of online criminal organization and techniques. Criminal Justice Studies, 22(3):261-271, Sep 2009.
    • (2009) Criminal Justice Studies , vol.22 , Issue.3 , pp. 261-271
    • Rege-Patwardhan, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.