-
1
-
-
55549116194
-
-
NIST SP800-82. Gaithersburg, USA: National Institute of Standards and Technology (NIST)
-
NIST SP800-82. Guide to Industrial Control Systems (ICS) Security[S]. Gaithersburg, USA: National Institute of Standards and Technology (NIST), 2011.
-
(2011)
Guide to Industrial Control Systems (ICS) Security
-
-
-
3
-
-
0013080980
-
-
Boston, USA: Addison Wesley
-
Bishop M. Computer Security[M]. Boston, USA: Addison Wesley, 2003.
-
(2003)
Computer Security
-
-
Bishop, M.1
-
4
-
-
84871137164
-
-
Department of Homeland Security (DHS). Washington DC, USA: Department of Homeland Security (DHS)
-
Department of Homeland Security (DHS). Cyber Security Assessments of Industrial Control System[S]. Washington DC, USA: Department of Homeland Security (DHS), 2010.
-
(2010)
Cyber Security Assessments of Industrial Control System
-
-
-
5
-
-
84884318324
-
-
The European Network and Information Security Agency (ENISA). Heraklion, Greece: Recommendations for Europe and Member States
-
The European Network and Information Security Agency (ENISA). Protecting Industrial Control Systems, Recommendations for Europe and Member States[R]. Heraklion, Greece: Recommendations for Europe and Member States, 2011.
-
(2011)
Protecting Industrial Control Systems, Recommendations for Europe and Member States
-
-
-
6
-
-
84871160649
-
Myths and facts behind cyber security and industrial control (2003)
-
2010-02-12
-
Byres E J, Kay J, Carter J. Myths and facts behind cyber security and industrial control (2003)[Z/OL]. (2010-02-12), http://www.pimaweb.org/conference/april2003/pdfs/ MythsAndFactsBehindCyberSecurity.pdf.
-
-
-
Byres, E.J.1
Kay, J.2
Carter, J.3
-
8
-
-
0010827970
-
-
IEC 61508. Geneva, Switzerland: International Electrotechnical Commission (IEC)
-
IEC 61508. Functional Safety of E/E/PE Safety-Related Systems[S]. Geneva, Switzerland: International Electrotechnical Commission (IEC), 2000.
-
(2000)
Functional Safety of E/E/PE Safety-Related Systems
-
-
-
14
-
-
0344559509
-
-
US-CERT. Washington DC, USA: United States Computer Emergency Readiness Team
-
US-CERT. The National Strategy to Secure Cyberspace[R]. Washington DC, USA: United States Computer Emergency Readiness Team, 2003.
-
(2003)
The National Strategy to Secure Cyberspace
-
-
-
15
-
-
70449644323
-
-
Department of Homeland Security. Washington DC, USA: Department of Homeland Security
-
Department of Homeland Security. National Infrastructure Protection Plan[R]. Washington DC, USA: Department of Homeland Security, 2006.
-
(2006)
National Infrastructure Protection Plan
-
-
-
19
-
-
36248993462
-
-
Washington DC, USA: Energetics Incorporated, the US Department of Energy and the US Department of Homeland Security
-
Eisenhauer J, Donnelly P, Ellis M, et al. Roadmap to Secure Control Systems in the Energy Sector[R]. Washington DC, USA: Energetics Incorporated, the US Department of Energy and the US Department of Homeland Security, 2006.
-
(2006)
Roadmap to Secure Control Systems in the Energy Sector
-
-
Eisenhauer, J.1
Donnelly, P.2
Ellis, M.3
-
20
-
-
70449644323
-
-
Department of Homeland Security. Washington DC, USA: Department of Homeland Security
-
Department of Homeland Security. National Infrastructure Protection Plan[R]. Washington DC, USA: Department of Homeland Security, 2009.
-
(2009)
National Infrastructure Protection Plan
-
-
-
21
-
-
84860869886
-
-
Energy Sector Control Systems Working Group (ESCSWG). Washington DC, USA: Office of Electricity Delivery & Energy Reliability
-
Energy Sector Control Systems Working Group (ESCSWG). Roadmap to Achieve Energy Delivery Systems Cybersecurity[R]. Washington DC, USA: Office of Electricity Delivery & Energy Reliability, 2011.
-
(2011)
Roadmap to Achieve Energy Delivery Systems Cybersecurity
-
-
-
22
-
-
85081764324
-
Revelation of industrial control security management in the United States
-
in Chinese
-
GAO Yang, PENG Yong, XIE Feng. Revelation of industrial control security management in the United States[J]. China Information Security, 2012, 27(03): 44-47. (in Chinese)
-
(2012)
China Information Security
, vol.27
, Issue.3
, pp. 44-47
-
-
Gao, Y.1
Peng, Y.2
Xie, F.3
-
23
-
-
85081767233
-
National SCADA testbed
-
2012-07-01
-
Department of Energy. National SCADA Testbed[Z/OL]. (2012-07-01), http://www.doe.gov/oe/national-scada-test-bed/.
-
-
-
-
24
-
-
85081772554
-
NSTB fact sheet, national SCADA test bed, enhancing control systems security in the energy sector
-
US Department of Energy, 2012-06-16
-
Office of Electricity Delivery and Energy Reliability, US Department of Energy. NSTB fact sheet, national SCADA test bed, enhancing control systems security in the energy sector[Z/OL]. (2012-06-16), http://energy.gov/sites/prod/files/oeprod/Documentsand Media/NSTB_Fact_Sheet_ FINAL_09-16-09.pdf.
-
-
-
-
25
-
-
85081772554
-
NSTB fact sheet, national SCADA test bed, enhancing control systems security in the energy sector
-
2012-06-16
-
Office of Electricity Delivery and Energy Reliability, US Department of Energy. NSTB fact sheet, national SCADA test bed, enhancing control systems security in the energy sector[Z/OL]. (2012-06-16), http://www.inl.gov/scada/factsheets/d/nstb.pdf.
-
-
-
-
26
-
-
85081763315
-
-
US-CERT. ICS-CERT[Z/OL]. (2012-06-20)
-
US-CERT. ICS-CERT[Z/OL]. (2012-06-20), http://www.us-cert.gov/control_system/.
-
-
-
-
27
-
-
33646239120
-
-
Commission of the European Communities. Communication from the Commission to the Council and the European Parliament. Brussels, Belgium: Commission of the European Communities
-
Commission of the European Communities. Communication from the Commission to the Council and the European Parliament. Critical Infrastructure Protection in the Fight Against Terrorism, COM (2004) 702 Final[R]. Brussels, Belgium: Commission of the European Communities, 2004.
-
(2004)
Critical Infrastructure Protection in the Fight Against Terrorism, COM (2004) 702 Final
-
-
-
30
-
-
84875511071
-
-
Commission of the European Communities. Communication from the Commission to the European Parliament, the Council, Brussels, Belgium: Commission of the European Communities
-
Commission of the European Communities. Communication from the Commission to the European Parliament, the Council, The European Economic and Social Committee and the Committee of the Regions-A Digital Agenda for Europe, COM (2010) 245[R]. Brussels, Belgium: Commission of the European Communities, 2010.
-
(2010)
The European Economic and Social Committee and the Committee of the Regions-A Digital Agenda for Europe, COM (2010) 245
-
-
-
31
-
-
85081761597
-
-
API Standard 1164. New York, USA: American Petroleum Institute
-
API Standard 1164. Pipeline SCADA Security Guideline[S]. New York, USA: American Petroleum Institute, 2009.
-
(2009)
Pipeline SCADA Security Guideline
-
-
-
33
-
-
85081767848
-
-
ANSI/ISA-99. Los Angeles, USA: American National Standards Institute(ANSI)/ USA International Standards Authority(ISA)
-
ANSI/ISA-99. Manufacturing and Control System Security, Standards and Guidelines[S]. Los Angeles, USA: American National Standards Institute(ANSI)/ USA International Standards Authority(ISA), 2009.
-
(2009)
Manufacturing and Control System Security, Standards and Guidelines
-
-
-
40
-
-
85081772960
-
Innovative defense strategies for securing SCADA control systems
-
Chicago, USA: Instrumentation, Systems, and Automation Society (ISA)
-
Pollet J. Innovative defense strategies for securing SCADA control systems[C]// Innovative Defense Strategies for Securing Manufacturing & Control Systems-ISA EXPO 2005. Chicago, USA: Instrumentation, Systems, and Automation Society (ISA), 2005.
-
(2005)
Innovative Defense Strategies for Securing Manufacturing & Control Systems-ISA EXPO 2005
-
-
Pollet, J.1
-
42
-
-
33847283607
-
The special needs of SCADA/PCN firewalls: Architectures and test results
-
Catania, Italy: Institute of Electrical and Electronics Engineers Inc
-
Byres E, Chauvin B, Karsch J, et al. The special needs of SCADA/PCN firewalls: Architectures and test results[C]// Proceedings of the 10th IEEE Conference on Emerging Technologies and Factory Automation, 2005, ETFA 2005. Catania, Italy: Institute of Electrical and Electronics Engineers Inc, 2005: 876-884.
-
(2005)
Proceedings of the 10th IEEE Conference on Emerging Technologies and Factory Automation, 2005, ETFA 2005
, pp. 876-884
-
-
Byres, E.1
Chauvin, B.2
Karsch, J.3
-
44
-
-
54949112031
-
Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements
-
Patel S C, Graham J H, Ralston P A S. Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements[J]. International Journal of Information Management, 2008, 28(6): 483-491.
-
(2008)
International Journal of Information Management
, vol.28
, Issue.6
, pp. 483-491
-
-
Patel, S.C.1
Graham, J.H.2
Ralston, P.A.S.3
-
46
-
-
85081767513
-
Snort 2.0 intrusion detection syngress, Feb 2003
-
2012-06-18
-
Jay B, James C F, Jeffrey P, et al. Snort 2.0 Intrusion Detection Syngress, Feb 2003[Z/OL]. (2012-06-18), http://security.irost.org/ebooks/.
-
-
-
Jay, B.1
James, C.F.2
Jeffrey, P.3
-
48
-
-
84857971054
-
A retrofit network intrusion detection system for MODBUS RTU and ASCII industrial control systems
-
Kauai, USA: Institute of Electrical and Electronics Engineers Computer Society
-
Morris T, Vaughn R, Dandass Y. A retrofit network intrusion detection system for MODBUS RTU and ASCII industrial control systems[C]// HICSS 2012. Kauai, USA: Institute of Electrical and Electronics Engineers Computer Society, 2012: 2338-2345.
-
(2012)
HICSS 2012
, pp. 2338-2345
-
-
Morris, T.1
Vaughn, R.2
Dandass, Y.3
-
49
-
-
67650679664
-
An intrusion detection system for wireless process control systems
-
Atlanta, USA: IEEE Press
-
Roosta T, Nilsson D, Lindqvist U, et al. An intrusion detection system for wireless process control systems[C]// The 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems. Atlanta, USA: IEEE Press, 2008: 866-872.
-
(2008)
The 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems
, pp. 866-872
-
-
Roosta, T.1
Nilsson, D.2
Lindqvist, U.3
-
53
-
-
79952527986
-
On SCADA control system command and response injection and intrusion detection
-
Dallas, USA: IEEE Press
-
Gao W, Morris T, Reaves B, et al. On SCADA control system command and response injection and intrusion detection[C]// Proceedings of 2010 IEEE eCrime Researchers Summit. Dallas, USA: IEEE Press, 2010: 1-8.
-
(2010)
Proceedings of 2010 IEEE eCrime Researchers Summit
, pp. 1-8
-
-
Gao, W.1
Morris, T.2
Reaves, B.3
-
54
-
-
84857516371
-
A taxonomy of cyber attacks on SCADA systems
-
Washington DC, USA: IEEE Computer Society
-
Zhu B, Joseph A, Sastry S. A taxonomy of cyber attacks on SCADA systems[C]// Proceedings of the 2011 International Conference on Internet of Things and the 4th International Conference on Cyber, Physical and Social Computing (ITHINGSCPSCOM'11). Washington DC, USA: IEEE Computer Society, 2011: 380-388.
-
(2011)
Proceedings of the 2011 International Conference on Internet of Things and the 4th International Conference on Cyber, Physical and Social Computing (ITHINGSCPSCOM'11)
, pp. 380-388
-
-
Zhu, B.1
Joseph, A.2
Sastry, S.3
-
55
-
-
2642525256
-
Mobile agent based security monitoring and analysis for the electric power infrastructure
-
New York, USA: ACTA Press
-
David M W, Sakurai K. Mobile agent based security monitoring and analysis for the electric power infrastructure[C]// Proceeding of Communication, Network, and Information Security 2003. New York, USA: ACTA Press, 2003.
-
(2003)
Proceeding of Communication, Network, and Information Security 2003
-
-
David, M.W.1
Sakurai, K.2
-
56
-
-
0036161259
-
Gene selection for cancer classification using support vector machines
-
Isabelle G, Jason W, Stephen B, et al. Gene selection for cancer classification using support vector machines[J]. Machine Learning, 2002, 46(1-3): 389-422.
-
(2002)
Machine Learning
, vol.46
, Issue.1-3
, pp. 389-422
-
-
Isabelle, G.1
Jason, W.2
Stephen, B.3
-
57
-
-
78649420561
-
Mean field variational approximation for continuous-time Bayesian network
-
Ido C, Tal E H, Nir F, et al. Mean field variational approximation for continuous-time Bayesian network[J]. Journal of Machine Learning Research, 2010, 11: 2745-2783.
-
(2010)
Journal of Machine Learning Research
, vol.11
, pp. 2745-2783
-
-
Ido, C.1
Tal, E.H.2
Nir, F.3
-
58
-
-
85081767318
-
Machine learning and knowledge discovery in databases-European Conference
-
Athens, Greece: Part I. Heisenberg, Germany: Springer
-
Dimitrios G, Thomas H, Donato M, et al. Machine learning and knowledge discovery in databases-European Conference[C]// Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD 2011). Athens, Greece: Part I. Heisenberg, Germany: Springer 2011.
-
(2011)
Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD 2011)
-
-
Dimitrios, G.1
Thomas, H.2
Donato, M.3
-
59
-
-
63149140167
-
Mixed-signal approximate computation: A neural predictor case study
-
Renée S A, Daniel A J, Doug B. Mixed-signal approximate computation: A neural predictor case study[J]. IEEE Micro, 2009, 29(1): 104-115.
-
(2009)
IEEE Micro
, vol.29
, Issue.1
, pp. 104-115
-
-
Renée, S.A.1
Daniel, A.J.2
Doug, B.3
-
61
-
-
55549100131
-
-
Idaho, USA: Idaho National Laboratory
-
Fink R, Spencer D, Wells R. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems, INL/CON-06-11665[R]. Idaho, USA: Idaho National Laboratory, 2006.
-
(2006)
Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems, INL/CON-06-11665
-
-
Fink, R.1
Spencer, D.2
Wells, R.3
-
64
-
-
85081763904
-
Power infrastructure cybersecurity laboratory of electrical and computer engineering department
-
Iowa State University. 2012-06-11
-
Iowa State University. Power Infrastructure Cybersecurity Laboratory of Electrical and Computer Engineering Department[Z/OL]. (2012-06-11), http://powercyber.ece.iastate.edu/powercyber.html.
-
-
-
-
65
-
-
84871122984
-
Summary and implications for China of the information security work of the ICS system in the oil and gas industry in America
-
in Chinese
-
XIONG Qi, JING Xiaowei, ZHAN Feng. Summary and implications for China of the information security work of the ICS system in the oil and gas industry in America[J]. China Information Security, 2012, 27(03): 80-83. (in Chinese)
-
(2012)
China Information Security
, vol.27
, Issue.3
, pp. 80-83
-
-
Xiong, Q.1
Jing, X.2
Zhan, F.3
-
66
-
-
85081764559
-
-
Industrial Instrumentation Process Lab. British Columbia Institute of Technology, 2012-07-11
-
Industrial Instrumentation Process Lab. British Columbia Institute of Technology[Z/OL]. (2012-07-11), http://www.bcit.ca/appliedresearch/tc/facilities/industrial.shtml.
-
-
-
-
67
-
-
85084163310
-
The virtual power system testbed and inter-testbed integration
-
Montreal, Canada: USENIX
-
Bergman D, JIN Dong, Nicol D, et al. The virtual power system testbed and inter-testbed integration[C]// USENIX 2nd Workshop on Cyber Security Experimentation and Test (CSET'09) held in Conjunction with the 18th USENIX Security Symposium (USENIX Security'09). Montreal, Canada: USENIX, 2009: 1-6.
-
(2009)
USENIX 2nd Workshop on Cyber Security Experimentation and Test (CSET'09) held in Conjunction with the 18th USENIX Security Symposium (USENIX Security'09)
, pp. 1-6
-
-
Bergman, D.1
Jin, D.2
Nicol, D.3
-
68
-
-
84871111834
-
Simulation of network attacks on SCADA systems
-
Stockholm, Sweden: Team for Research in Ubiquitous Secure Technology (TRUSTSTC)
-
Rohan C, Bruno S, Gabor K, et al. Simulation of network attacks on SCADA systems[C]// First Workshop on Secure Control Systems, 2010. Stockholm, Sweden: Team for Research in Ubiquitous Secure Technology (TRUSTSTC), 2010.
-
(2010)
First Workshop on Secure Control Systems, 2010
-
-
Rohan, C.1
Bruno, S.2
Gabor, K.3
-
69
-
-
72849150312
-
Building a SCADA security testbed
-
Gold Coast, QLD. Washington DC, USA: IEEE Press
-
Queiroz C, Mahmood A, HU Jiankun, et al. Building a SCADA Security Testbed[C]// Third International Conference on Network and System Security (NSS'09). Gold Coast, QLD. Washington DC, USA: IEEE Press, 2009: 357-364.
-
(2009)
Third International Conference on Network and System Security (NSS'09)
, pp. 357-364
-
-
Queiroz, C.1
Mahmood, A.2
Hu, J.3
-
70
-
-
0141804902
-
The OMNeT++discrete event simulation system
-
Prague, Czech Republic: The European Multidisciplinary Society for Modelling and Simulation Technology (EUROSIS)
-
Varga A. The OMNeT++discrete event simulation system[C]// Proceedings of the European Simulation Multiconference (ESM'2001). Prague, Czech Republic: The European Multidisciplinary Society for Modelling and Simulation Technology (EUROSIS), 2001: 319-324.
-
(2001)
Proceedings of the European Simulation Multiconference (ESM'2001)
, pp. 319-324
-
-
Varga, A.1
-
71
-
-
84871177331
-
INET framework for OMNeT++4.0
-
The OMNeT++Community. 2012-07-02
-
The OMNeT++Community. INET Framework for OMNeT++4.0[Z/OL]. (2012-07-02), http://inet.omnetpp.org/.
-
-
-
-
72
-
-
85081775006
-
Lego mindstroms NXT
-
2012-07-03
-
The LEGO Group. Lego Mindstroms NXT[Z/OL]. (2012-07-03), http://mindstorms.lego.com.
-
-
-
-
73
-
-
72849121168
-
Libmodbus-A modbus library for Linux and OSX
-
2012-07-03
-
Raimbault S. Libmodbus-A modbus library for Linux and OSX[Z/OL]. (2012-07-03), http://www.libmodbus.org.
-
-
-
Raimbault, S.1
-
74
-
-
48449088699
-
SCADA cyber security testbed development
-
Washington DC, USA: IEEE Press
-
Davis C, Tate J, Okhravi H, et al. SCADA cyber security testbed development[C]// Proceedings of the 38th North American in Power Symposium, 2006 (NAPS 2006). Washington DC, USA: IEEE Press, 2006: 483-488.
-
(2006)
Proceedings of the 38th North American in Power Symposium, 2006 (NAPS 2006)
, pp. 483-488
-
-
Davis, C.1
Tate, J.2
Okhravi, H.3
-
75
-
-
79957979992
-
A testbed for analyzing security of SCADA control systems (TASSCS)
-
Hilton Anaheim, USA: IEEE Computer Society
-
Mallouhi M, AI-Nashif Y, Cox D, et al. A testbed for analyzing security of SCADA control systems (TASSCS)[C]// 2011 IEEE PES on Innovative Smart Grid Technologies (ISGT). Hilton Anaheim, USA: IEEE Computer Society, 2011: 1-7.
-
(2011)
2011 IEEE PES on Innovative Smart Grid Technologies (ISGT)
, pp. 1-7
-
-
Mallouhi, M.1
Ai-Nashif, Y.2
Cox, D.3
-
77
-
-
1842829828
-
-
NIST SP 800-30. Gaithersburg, USA: National Institute of Standards and Technology (NIST)
-
NIST SP 800-30. Risk Management Guide for Information Technology Systems[S]. Gaithersburg, USA: National Institute of Standards and Technology (NIST), 2002.
-
(2002)
Risk Management Guide for Information Technology Systems
-
-
-
78
-
-
0019608535
-
Hierarchical holographic modeling
-
Haimes Y Y. Hierarchical holographic modeling[J]. IEEE Transactions on Systems, Man, and Cybernetics, 1981, 11(9): 606-617.
-
(1981)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.11
, Issue.9
, pp. 606-617
-
-
Haimes, Y.Y.1
-
80
-
-
21244494118
-
A roadmap for quantifying the efficacy of risk management of information security and interdependent SCADA systems
-
Haimes Y Y, Chittester C G. A roadmap for quantifying the efficacy of risk management of information security and interdependent SCADA systems[J]. Journal of Homeland Security and Emergency Management, 2005, 2(2): 1-21.
-
(2005)
Journal of Homeland Security and Emergency Management
, vol.2
, Issue.2
, pp. 1-21
-
-
Haimes, Y.Y.1
Chittester, C.G.2
-
81
-
-
84871147819
-
First exploration on the information security risk assessment of the industrial control system
-
in Chinese
-
XIONG Qi, PENG Yong, DAI Zhonghua. First exploration on the information security risk assessment of the industrial control system[J]. China Information Security, 2012, 27(03): 57-59. (in Chinese)
-
(2012)
China Information Security
, vol.27
, Issue.3
, pp. 57-59
-
-
Xiong, Q.1
Peng, Y.2
Dai, Z.3
-
82
-
-
0019540987
-
On the quantitative definition of risk
-
Kaplan S, Garrick B J. On the quantitative definition of risk[J]. Risk Analysis, 1981, 1(1): 11-37.
-
(1981)
Risk Analysis
, vol.1
, Issue.1
, pp. 11-37
-
-
Kaplan, S.1
Garrick, B.J.2
-
83
-
-
33748075456
-
Toward a unified security/safety model
-
Stoneburner G. Toward a unified security/safety model[J]. Computer, 2006, 39(8): 96-97.
-
(2006)
Computer
, vol.39
, Issue.8
, pp. 96-97
-
-
Stoneburner, G.1
-
84
-
-
0002670359
-
Attack trees: Modeling security threats
-
Dr.
-
Schneier B. Attack trees: Modeling security threats[J]. Dr. Dobb's Journal, 1999, 12(24): 21-29.
-
(1999)
Dobb's Journal
, vol.12
, Issue.24
, pp. 21-29
-
-
Schneier, B.1
-
85
-
-
78649573044
-
Cyber incident blamed for nuclear power plant shutdown
-
2012-06-12
-
Brian K. Cyber incident blamed for nuclear power plant shutdown[Z/OL]. (2012-06-12), http://www.washingtonpost.com/wp-dyn/content/ article/2008/06/05/AR2008060501958.html.
-
-
-
Brian, K.1
-
86
-
-
50649100814
-
-
Technical Report INL/EXT-05-00671, Idaho, USA: Idaho National Laboratory
-
Robert J T. Cyber Incidents Involving Control Systems, Technical Report INL/EXT-05-00671[R]. Idaho, USA: Idaho National Laboratory, 2005.
-
(2005)
Cyber Incidents Involving Control Systems
-
-
Robert, J.T.1
-
87
-
-
79956004912
-
Hackers penetrate water system computers
-
2012-06-06
-
Richard E. Hackers penetrate water system computers[Z/OL]. (2012-06-06), http://blogs.abcnews.com/theblotter/ 2006/10/ hackers_penetra.html.
-
-
-
Richard, E.1
-
88
-
-
84871114680
-
Sacramento man pleads guilty to attempting to shut down California's power grid
-
2012-06-07
-
United States Attorney. Sacramento man pleads guilty to attempting to shut down California's power grid[Z/OL]. (2012-06-07), http://www.usdoj.gov/usao/cae/press_releases/ docs/2007/12-14-07DenisonPlea.pdf.
-
-
-
-
89
-
-
79956019292
-
Feds: Hacker disabled offshore oil platform leak-detection system
-
2012-06-06
-
Kravets D. Feds: Hacker disabled offshore oil platform leak-detection system[Z/OL]. (2012-06-06), http://www.wired.com/threatlevel/2009/03/feds-hacker-dis.
-
-
-
Kravets, D.1
-
91
-
-
85081771380
-
-
W32. Washington DC, USA: Symantec
-
Nicolas F, Liam O M, Eric C. W32. Stuxnet Dossier, Version 1.3 Edition[R]. Washington DC, USA: Symantec, 2010.
-
(2010)
Stuxnet Dossier, Version 1.3 Edition
-
-
Nicolas, F.1
Liam, O.M.2
Eric, C.3
-
92
-
-
79551623891
-
Stuxnet: The first weaponized software?
-
2012-06-06
-
Bellovin S. Stuxnet: The first weaponized software?[Z/OL]. (2012-06-06), http://www.cs.columbia.edu/~smb/blog/2010-09-27.html.
-
-
-
Bellovin, S.1
-
93
-
-
34047240072
-
The use of attack trees in assessing vulnerabilities in SCADA systems
-
Lisbon, Portugal: Institute of Electrical and Electronics Engineers
-
Byres E J, Franz M, Miller D. The use of attack trees in assessing vulnerabilities in SCADA systems[C]// International Infrastructure Survivability Workshop (IISW'04). Lisbon, Portugal: Institute of Electrical and Electronics Engineers, 2004.
-
(2004)
International Infrastructure Survivability Workshop (IISW'04)
-
-
Byres, E.J.1
Franz, M.2
Miller, D.3
-
94
-
-
42549101645
-
Vulnerability assessment of cybersecurity for SCADA systems using attack trees
-
Tampa, USA: Institute of Electrical and Electronics Engineers Inc
-
Ten C W, LIU Chenching, Govindarasu M. Vulnerability assessment of cybersecurity for SCADA systems using attack trees[C]// The 2007 IEEE Conference on Power Engineering Society General Meeting. Tampa, USA: Institute of Electrical and Electronics Engineers Inc., 2007: 1-8.
-
(2007)
The 2007 IEEE Conference on Power Engineering Society General Meeting
, pp. 1-8
-
-
Ten, C.W.1
Liu, C.2
Govindarasu, M.3
-
96
-
-
54949112031
-
Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements
-
Patel S C, Graham J H, Ralston P A S. Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements[J]. International Journal of Information Management, 2008, 28(6): 483-491.
-
(2008)
International Journal of Information Management
, vol.28
, Issue.6
, pp. 483-491
-
-
Patel, S.C.1
Graham, J.H.2
Ralston, P.A.S.3
-
97
-
-
70450092394
-
RRE: A game-theoretic intrusion response and recovery engine
-
Lisbon, Portugal: Institute of Electrical and Electronics Engineers
-
Zonouz S A, Khurana H, Sanders W H, et al. RRE: A game-theoretic intrusion response and recovery engine[C]// IEEE/IFIP International Conference on Dependable Systems & Networks, 2009 (DSN'09). Lisbon, Portugal: Institute of Electrical and Electronics Engineers, 2009: 439-448.
-
(2009)
IEEE/IFIP International Conference on Dependable Systems & Networks, 2009 (DSN'09)
, pp. 439-448
-
-
Zonouz, S.A.1
Khurana, H.2
Sanders, W.H.3
|