-
1
-
-
72849108705
-
Malicious control system cyber security attack case study-maroochy water services
-
M. Abrams and J. Weiss, "Malicious control system cyber security attack case study-maroochy water services," Australia, NIST, pp. 8-9, 2008.
-
(2008)
Australia, NIST
, pp. 8-9
-
-
Abrams, M.1
Weiss, J.2
-
3
-
-
80455177510
-
-
Tech. Rep
-
D. Albright, P. Brannan, C. Walrond, I. for Science, and I. Security, "Did stuxnet take out 1,000 centrifuges at the natanz enrichment plant?" Tech. Rep., 2010. [Online]. Available: http://isis-online.org/ uploads/isis-reports/documents/stuxnet FEP 22Dec2010.pdf
-
(2010)
Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant?
-
-
Albright, D.1
Brannan, P.2
Walrond, C.3
-
4
-
-
78650062267
-
-
White paper, Symantec Corp., Security Response
-
N. Falliere, L. Murchu, and E. Chien, "W32. stuxnet dossier," White paper, Symantec Corp., Security Response, 2011.
-
(2011)
W32. Stuxnet Dossier
-
-
Falliere, N.1
Murchu, L.2
Chien, E.3
-
5
-
-
85084140752
-
Research challenges for the security of control systems
-
USENIX Association
-
A. Cárdenas, S. Amin, and S. Sastry, "Research challenges for the security of control systems," in Proceedings of the 3rd conference on Hot topics in security. USENIX Association, 2008, p. 6.
-
(2008)
Proceedings of the 3rd Conference on Hot Topics in Security
, pp. 6
-
-
Cárdenas, A.1
Amin, S.2
Sastry, S.3
-
6
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, "Experimental security analysis of a modern automobile," in Proc. IEEE Symp. Security and Privacy (SP), 2010, pp. 447-462.
-
(2010)
Proc. IEEE Symp. Security and Privacy (SP)
, pp. 447-447
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
7
-
-
84155167232
-
Cyber-physical security of a smart grid infrastructure
-
Y. Mo, T. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, "Cyber-physical security of a smart grid infrastructure," Proceedings of the IEEE, no. 99, pp. 1-15, 2012.
-
(2012)
Proceedings of the IEEE
, Issue.99
, pp. 1-15
-
-
Mo, Y.1
Kim, T.2
Brancik, K.3
Dickinson, D.4
Lee, H.5
Perrig, A.6
Sinopoli, B.7
-
8
-
-
0022250464
-
Dependable computing and fault-tolerance
-
J. Laprie, "Dependable computing and fault-tolerance," Digest of Papers FTCS-15, pp. 2-11, 1985. [Online]. Available: http://www. macedo.ufba.br/conceptsANDTermonology.pdf
-
(1985)
Digest of Papers FTCS-15
, pp. 2-11
-
-
Laprie, J.1
-
9
-
-
12344308304
-
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing," vol. 1, no. 1, pp. 11-33, 2004.
-
(2004)
Basic Concepts and Taxonomy of Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
10
-
-
0029721645
-
Security properties and csp
-
S. Schneider, "Security properties and csp," in Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on. IEEE, 1996, pp. 174-187.
-
(1996)
Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium On. IEEE
, pp. 174-174
-
-
Schneider, S.1
-
11
-
-
12344275676
-
-
D. M. Nicol, W. H. Sanders, and K. S. Trivedi, "Model-based evaluation: from dependability to security," vol. 1, no. 1, pp. 48-65, 2004.
-
(2004)
Model-based Evaluation: From Dependability to Security
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.M.1
Sanders, W.H.2
Trivedi, K.S.3
-
13
-
-
0035696915
-
Identifying, understanding, and analyzing critical infrastructure interdependencies
-
S. M. Rinaldi, J. P. Peerenboom, and T. K. Kelly, "Identifying, understanding, and analyzing critical infrastructure interdependencies," IEEE Control Systems, vol. 21, no. 6, pp. 11-25, 2001.
-
(2001)
IEEE Control Systems
, vol.21
, Issue.6
, pp. 11-25
-
-
Rinaldi, S.M.1
Peerenboom, J.P.2
Kelly, T.K.3
-
14
-
-
12344298391
-
Modeling and simulating critical infrastructures and their interdependencies
-
S. M. Rinaldi, "Modeling and simulating critical infrastructures and their interdependencies," in Proc. 37th Annual Hawaii Int System Sciences Conf, 2004.
-
(2004)
Proc. 37th Annual Hawaii Int System Sciences Conf
-
-
Rinaldi, S.M.1
-
16
-
-
84868562178
-
Threat modeling: A process to ensure application security
-
S. Burns, "Threat modeling: A process to ensure application security," GIAC Security Essentials Cer-ti?cation (GSEC) Practical Assignment, 2005. [Online]. Available: http://www.sans.org/reading room/whitepapers/securecode/threat-modeling-process-ensure-application-security 1646
-
(2005)
GIAC Security Essentials Cer-ti?cation (GSEC) Practical Assignment
-
-
Burns, S.1
-
17
-
-
33847258361
-
Threat modeling-uncover security design flaws using the stride approach
-
S. Hernan, S. Lambert, T. Ostwald, and A. Shostack, "Threat modeling-uncover security design flaws using the stride approach," MSDN Magazine-Louisville, pp. 68-75, 2006. [Online]. Available: http://msdn. microsoft.com/en-us/magazine/cc163519.aspx
-
(2006)
MSDN Magazine-Louisville
, pp. 68-75
-
-
Hernan, S.1
Lambert, S.2
Ostwald, T.3
Shostack, A.4
-
18
-
-
15744370034
-
A taxonomy of network and computer attacks
-
S. Hansman and R. Hunt, "A taxonomy of network and computer attacks," Computers & Security, vol. 24, no. 1, pp. 31-43, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.1
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
-
19
-
-
79952918124
-
-
University of Memphis, Technical Report CS-09-003
-
C. Simmons, C. Ellis, S. Shiva, D. Dasgupta, and Q. Wu, "Avoidit: A cyber attack taxonomy," University of Memphis, Technical Report CS-09-003, 2009. [Online]. Available: http://issrl.cs.memphis.edu/files/papers/ CyberAttackTaxonomy IEEE Mag.pdf
-
(2009)
Avoidit: A Cyber Attack Taxonomy
-
-
Simmons, C.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Wu, Q.5
-
20
-
-
84868578953
-
-
Asctec hummingbird autopilot. [Online]
-
Asctec hummingbird autopilot. [Online]. Available: http://www.asctec. de/asctec-hummingbird-autopilot-5/
-
-
-
-
21
-
-
84868539311
-
-
M. Howard, D. LeBlanc, S. T. B. Online, and S. B. O. (Firme), Writing secure code. Microsoft press Redmond, WA, 2003, vol. 2.
-
(2003)
Writing Secure Code. Microsoft Press Redmond
, vol.2
-
-
Howard, M.1
Leblanc, D.2
Online, S.T.B.3
Firme, S.B.O.4
-
22
-
-
80055028776
-
Challenges for securing cyber physical systems
-
A. Cárdenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. Sastry, "Challenges for securing cyber physical systems," in Workshop on Future Directions in Cyber-physical Systems Security. DHS, 2009.
-
(2009)
Workshop on Future Directions in Cyber-physical Systems Security. DHS
-
-
Cárdenas, A.1
Amin, S.2
Sinopoli, B.3
Giani, A.4
Perrig, A.5
Sastry, S.6
|