메뉴 건너뛰기




Volumn , Issue , 2012, Pages 55-62

Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach

Author keywords

CPS security; CPS vulnerability assessment; Cyber Physical Attacks; Cyber Physical Systems (CPS); Taxonomy

Indexed keywords

CPS SECURITY; CYBER PHYSICAL SYSTEMS (CPSS); CYBER-ATTACKS; CYBER-PHYSICAL ATTACKS; DATA FLOW DIAGRAMS; MANUAL ANALYSIS; PHYSICAL ELEMENTS; STRUCTURAL ELEMENTS; SYSTEMATIC ANALYSIS; VULNERABILITY ASSESSMENTS;

EID: 84868596713     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISRCS.2012.6309293     Document Type: Conference Paper
Times cited : (49)

References (22)
  • 1
    • 72849108705 scopus 로고    scopus 로고
    • Malicious control system cyber security attack case study-maroochy water services
    • M. Abrams and J. Weiss, "Malicious control system cyber security attack case study-maroochy water services," Australia, NIST, pp. 8-9, 2008.
    • (2008) Australia, NIST , pp. 8-9
    • Abrams, M.1    Weiss, J.2
  • 8
    • 0022250464 scopus 로고
    • Dependable computing and fault-tolerance
    • J. Laprie, "Dependable computing and fault-tolerance," Digest of Papers FTCS-15, pp. 2-11, 1985. [Online]. Available: http://www. macedo.ufba.br/conceptsANDTermonology.pdf
    • (1985) Digest of Papers FTCS-15 , pp. 2-11
    • Laprie, J.1
  • 13
    • 0035696915 scopus 로고    scopus 로고
    • Identifying, understanding, and analyzing critical infrastructure interdependencies
    • S. M. Rinaldi, J. P. Peerenboom, and T. K. Kelly, "Identifying, understanding, and analyzing critical infrastructure interdependencies," IEEE Control Systems, vol. 21, no. 6, pp. 11-25, 2001.
    • (2001) IEEE Control Systems , vol.21 , Issue.6 , pp. 11-25
    • Rinaldi, S.M.1    Peerenboom, J.P.2    Kelly, T.K.3
  • 14
  • 16
    • 84868562178 scopus 로고    scopus 로고
    • Threat modeling: A process to ensure application security
    • S. Burns, "Threat modeling: A process to ensure application security," GIAC Security Essentials Cer-ti?cation (GSEC) Practical Assignment, 2005. [Online]. Available: http://www.sans.org/reading room/whitepapers/securecode/threat-modeling-process-ensure-application-security 1646
    • (2005) GIAC Security Essentials Cer-ti?cation (GSEC) Practical Assignment
    • Burns, S.1
  • 17
    • 33847258361 scopus 로고    scopus 로고
    • Threat modeling-uncover security design flaws using the stride approach
    • S. Hernan, S. Lambert, T. Ostwald, and A. Shostack, "Threat modeling-uncover security design flaws using the stride approach," MSDN Magazine-Louisville, pp. 68-75, 2006. [Online]. Available: http://msdn. microsoft.com/en-us/magazine/cc163519.aspx
    • (2006) MSDN Magazine-Louisville , pp. 68-75
    • Hernan, S.1    Lambert, S.2    Ostwald, T.3    Shostack, A.4
  • 18
    • 15744370034 scopus 로고    scopus 로고
    • A taxonomy of network and computer attacks
    • S. Hansman and R. Hunt, "A taxonomy of network and computer attacks," Computers & Security, vol. 24, no. 1, pp. 31-43, 2005.
    • (2005) Computers & Security , vol.24 , Issue.1 , pp. 31-43
    • Hansman, S.1    Hunt, R.2
  • 19
    • 79952918124 scopus 로고    scopus 로고
    • University of Memphis, Technical Report CS-09-003
    • C. Simmons, C. Ellis, S. Shiva, D. Dasgupta, and Q. Wu, "Avoidit: A cyber attack taxonomy," University of Memphis, Technical Report CS-09-003, 2009. [Online]. Available: http://issrl.cs.memphis.edu/files/papers/ CyberAttackTaxonomy IEEE Mag.pdf
    • (2009) Avoidit: A Cyber Attack Taxonomy
    • Simmons, C.1    Ellis, C.2    Shiva, S.3    Dasgupta, D.4    Wu, Q.5
  • 20
    • 84868578953 scopus 로고    scopus 로고
    • Asctec hummingbird autopilot. [Online]
    • Asctec hummingbird autopilot. [Online]. Available: http://www.asctec. de/asctec-hummingbird-autopilot-5/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.