-
3
-
-
21644440888
-
Security for industrial control systems
-
Jun
-
D. Dzung, M. Naedele, T. P. von Hoff, and M. Crevatin, "Security for industrial control systems," Proc. IEEE, vol. 93, no. 6, pp. 1152-1177, Jun. 2005.
-
(2005)
Proc. IEEE
, vol.93
, Issue.6
, pp. 1152-1177
-
-
Dzung, D.1
Naedele, M.2
Von Hoff, T.P.3
Crevatin, M.4
-
4
-
-
77954005795
-
Cyber security and power system communication-Essential parts of a smart grid infrastructure
-
Aug.
-
G. N. Ericsson, "Cyber security and power system communication-Essential parts of a smart grid infrastructure," IEEE Trans. Power Del., vol. 25, no. 3, pp. 1501-1507, Aug. 2010.
-
(2010)
IEEE Trans. Power Del
, vol.25
, Issue.3
, pp. 1501-1507
-
-
Ericsson, G.N.1
-
5
-
-
78650891506
-
Cybersecurity myths on power control systems: 21 misconceptions and false beliefs
-
Feb.
-
L. Piètre-Cambacédès, M. Tritschler, and G. N. Ericsson, "Cybersecurity myths on power control systems: 21 misconceptions and false beliefs," IEEE Trans. Power Del., vol. 26, no. 1, pp. 161-172, Feb. 2011.
-
(2011)
IEEE Trans. Power Del
, vol.26
, Issue.1
, pp. 161-172
-
-
Piètre-Cambacédès, L.1
Tritschler, M.2
Ericsson, G.N.3
-
7
-
-
84871949415
-
-
Reliability Standards-CIP (Critical Infrastructure Protection) NERC (North American Electric Reliability Corp
-
"Reliability Standards-CIP (Critical Infrastructure Protection)," NERC (North American Electric Reliability Corp.).
-
-
-
-
8
-
-
58849106722
-
Vulnerability assessment for critical infrastructure control systems
-
R. C. Parks and E. Rogers, "Vulnerability assessment for critical infrastructure control systems," IEEE Security Privacy, vol. 6, no. 6, pp. 37-43, 2008.
-
(2008)
IEEE Security Privacy
, vol.6
, Issue.6
, pp. 37-43
-
-
Parks, R.C.1
Rogers, E.2
-
9
-
-
84871988584
-
AGA 12 Part 1-Cryptographic Protection of SCADA Communications Part 1: Background Policies and Test Plan
-
"AGA 12 Part 1-Cryptographic Protection of SCADA Communications Part 1: Background, Policies and Test Plan," Amer. Gas Assoc., 2006.
-
(2006)
Amer. Gas Assoc
-
-
-
10
-
-
84871990860
-
AGA 12 Part 2-Performance test plan
-
"AGA 12 Part 2-Performance Test Plan," Amer. Gas Assoc., 2006.
-
(2006)
Amer. Gas Assoc
-
-
-
11
-
-
84871970675
-
-
"Electronic Records; Electronic Signatures (21CFR11). Code of Federal Regulations, Title 21, Volume 1 Part 11," U.S. Food & Drug Admin.-Dept. of Health & Human Services, 2001
-
"Electronic Records; Electronic Signatures (21CFR11). Code of Federal Regulations, Title 21, Volume 1 Part 11," U.S. Food & Drug Admin.-Dept. of Health & Human Services, 2001.
-
-
-
-
23
-
-
70350663440
-
-
NIST SP 800-55 rev 1
-
E. Chew, M. Swanson, K. Stine, N. Bartol, A. Brown, and W. Robinson, "Performance Measurement Guide for Information Security," NIST SP 800-55 rev. 1, 2008.
-
(2008)
Performance Measurement Guide for Information Security
-
-
Chew, E.1
Swanson, M.2
Stine, K.3
Bartol, N.4
Brown, A.5
Robinson, W.6
-
26
-
-
67650711721
-
Information security for electric power utilities (EPUs)-CIGRé Developments on frameworks, risk assessment, technology
-
Aug
-
G. N. Ericsson, "Information security for electric power utilities (EPUs)-CIGRé Developments on frameworks, risk assessment, technology," IEEE Trans. Power Del., vol. 24, no. 3, pp. 1174-1181, Aug. 2009.
-
(2009)
IEEE Trans. Power Del
, vol.24
, Issue.3
, pp. 1174-1181
-
-
Ericsson, G.N.1
-
27
-
-
54049149494
-
Toward a framework for managing information security for an electric power utility-CIGRé experiences
-
Aug
-
G. N. Ericsson, "Toward a framework for managing information security for an electric power utility-CIGRé experiences," IEEE Trans. Power Del., vol. 22, no. 3, pp. 1461-1469, Aug. 2007.
-
(2007)
IEEE Trans. Power Del
, vol.22
, Issue.3
, pp. 1461-1469
-
-
Ericsson, G.N.1
-
28
-
-
77649186560
-
Assessing risk from intelligent attacks: A perspective on approaches
-
S. D. Guikema and T. Aven, "Assessing risk from intelligent attacks: A perspective on approaches," Reliabil. Eng. Syst. Safety, vol. 95, no. 5, pp. 478-483, 2010.
-
(2010)
Reliabil. Eng. Syst. Safety
, vol.95
, Issue.5
, pp. 478-483
-
-
Guikema, S.D.1
Aven, T.2
-
29
-
-
33846336460
-
A unified framework for risk and vulnerability analysis covering both safety and security
-
DOI 10.1016/j.ress.2006.03.008, PII S095183200600086X
-
T. Aven, "A unified framework for risk and vulnerability analysis covering both safety and security," Reliabil. Eng. Syst. Safety, vol. 92, no. 6, pp. 745-754, 2007. (Pubitemid 46135958)
-
(2007)
Reliability Engineering and System Safety
, vol.92
, Issue.6
, pp. 745-754
-
-
Aven, T.1
-
30
-
-
39449094965
-
Bulk power risk analysis: Ranking infrastructure elements according to their risk significance
-
DOI 10.1016/j.ijepes.2007.06.013, PII S0142061507000907
-
A. M. Koonce, G. E. Apostolakis, and B. K. Cook, "Bulk power risk analysis: Ranking infrastructure elements according to their risk significance," Int. J. Electr. Power Energy Syst., vol. 30, no. 3, pp. 169-183, 2008. (Pubitemid 351273806)
-
(2008)
International Journal of Electrical Power and Energy Systems
, vol.30
, Issue.3
, pp. 169-183
-
-
Koonce, A.M.1
Apostolakis, G.E.2
Cook, B.K.3
-
31
-
-
70449638991
-
Evaluating the risk of cyber attacks on SCADA systems via Petri net analysis with application to hazardous liquid loading operations
-
M. H. Henry, R. M. Layer,K. Z. Snow, and D. R. Zaret, "Evaluating the risk of cyber attacks on SCADA systems via Petri net analysis with application to hazardous liquid loading operations," in Proc. IEEE Conf. Technol. for Homeland Security, 2009, pp. 607-614.
-
(2009)
Proc. IEEE Conf. Technol. for Homeland Security
, pp. 607-614
-
-
Henry, M.H.1
Layerk. Z Snow, R.M.2
Zaret, D.R.3
-
32
-
-
0035696915
-
Identifying, understanding, and analyzing critical infrastructure interdependencies
-
DOI 10.1109/37.969131
-
S. M. Rinaldi, J. P. Peerenboom, and T. K. Kelly, "Identifying, understanding, analyzing critical infrastructure interdependencies," IEEE Control Syst. Mag., vol. 21, no. 6, pp. 11-25, 2001. (Pubitemid 34092056)
-
(2001)
IEEE Control Systems Magazine
, vol.21
, Issue.6
, pp. 11-25
-
-
Rinaldi, S.M.1
Peerenboom, J.P.2
Kelly, T.K.3
-
33
-
-
34249711301
-
Connectivity models of interdependency in mixed-type critical infrastructure networks
-
DOI 10.1016/j.istr.2007.02.005, PII S1363412707000076
-
N. K. Svendsen and S. D.Wolthusen, "Connectivity models of interdependency in mixed-type critical infrastructure networks," Inf. Security Tech. Rep., vol. 12, no. 1, pp. 44-55, 2007. (Pubitemid 46829997)
-
(2007)
Information Security Technical Report
, vol.12
, Issue.1
, pp. 44-55
-
-
Svendsen, N.K.1
Wolthusen, S.D.2
-
34
-
-
49949089091
-
Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools
-
W. Kröger, "Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools," Reliabil. Eng. Syst. Safety, vol. 93, no. 12, pp. 1781-1787, 2008.
-
(2008)
Reliabil. Eng. Syst. Safety
, vol.93
, Issue.12
, pp. 1781-1787
-
-
Kröger, W.1
-
35
-
-
79952192413
-
Modeling interdependent network systems for identifying cascade-safe operating margins
-
Feb.
-
E. Zio and G. Sansavini, "Modeling interdependent network systems for identifying cascade-safe operating margins," IEEE Trans. Reliabil., vol. 60, no. 1, pp. 94-101, Feb. 2011.
-
(2011)
IEEE Trans. Reliabil
, vol.60
, Issue.1
, pp. 94-101
-
-
Zio, E.1
Sansavini, G.2
-
36
-
-
64649085998
-
A methodological approach to analyze vulnerability of interdependent infrastructures
-
M. Ouyang, L. Hong, Z.-J. Mao, M.-H. Yu, and F. Qi, "A methodological approach to analyze vulnerability of interdependent infrastructures," Simulation Modelling Practice and Theory, vol. 17, no. 5, pp. 817-828, 2009.
-
(2009)
Simulation Modelling Practice and Theory
, vol.17
, Issue.5
, pp. 817-828
-
-
Ouyang, M.1
Hong, L.2
Mao, Z.-J.3
Yu, M.-H.4
Qi, F.5
-
37
-
-
69849110524
-
Tools for local critical infrastructure protection: Computational support for identifying safety and security interdependencies between local critical infrastructures
-
C. W. Johnson and K. McLean, "Tools for local critical infrastructure protection: Computational support for identifying safety and security interdependencies between local critical infrastructures," in Proc. 3rd IET Int. Conf. Syst. Safety, 2008, pp. 1-6.
-
(2008)
Proc. 3rd IET Int. Conf. Syst. Safety
, pp. 1-6
-
-
Johnson, C.W.1
McLean, K.2
-
38
-
-
78651541357
-
A risk-assessment model for cyber attacks on information systems
-
S. Patel and J. Zaveri, "A risk-assessment model for cyber attacks on information systems," J. Comput., vol. 5, no. 3, pp. 352-359, 2010.
-
(2010)
J. Comput
, vol.5
, Issue.3
, pp. 352-359
-
-
Patel, S.1
Zaveri, J.2
-
39
-
-
34548017452
-
Cyber security risk assessment for SCADA and DCS networks
-
DOI 10.1016/j.isatra.2007.04.003, PII S0019057807000754
-
P. A. S. Ralston, J. H. Graham, and J. L. Hieb, "Cyber security risk assessment for SCADA and DCS networks," ISA Trans., vol. 46, no. 4, pp. 583-594, 2007. (Pubitemid 47284077)
-
(2007)
ISA Transactions
, vol.46
, Issue.4
, pp. 583-594
-
-
Ralston, P.A.S.1
Graham, J.H.2
Hieb, J.L.3
-
40
-
-
0019608535
-
Hierarchical holographic modeling
-
Y. Y. Haimes, "Hierarchical holographic modeling," IEEE Trans. Syst., Man, Cybern. A, vol. 11, no. 9, pp. 606-617, 1981.
-
(1981)
IEEE Trans. Syst., Man, Cybern. A
, vol.11
, Issue.9
, pp. 606-617
-
-
Haimes, Y.Y.1
-
41
-
-
30544447844
-
Application of the inoperability input-output model (IIM) for systemic risk assessment and management of interdependent infrastructures
-
DOI 10.1002/sys.20037
-
K. G. Crowther and Y. Y. Haimes, "Application of the inoperability input-output model (IIM) for systemic risk assessment and management of interdependent infrastructures," Syst. Eng., vol. 8, no. 4, pp. 323-341, 2005. (Pubitemid 43081877)
-
(2005)
Systems Engineering
, vol.8
, Issue.4
, pp. 323-341
-
-
Crowther, K.G.1
Haimes, Y.Y.2
-
44
-
-
0036090498
-
Risk filtering, ranking, and management framework using hierarchical holographic modeling
-
DOI 10.1111/0272-4332.00020
-
Y. Y. Haimes, S. Kaplan, and J. H. Lambert, "Risk filtering, ranking, management framework using hierarchical holographic modeling," Risk Anal., vol. 22, no. 2, pp. 383-397, 2002. (Pubitemid 34533265)
-
(2002)
Risk Analysis
, vol.22
, Issue.2
, pp. 383-397
-
-
Haimes, Y.Y.1
Kaplan, S.2
Lambert, J.H.3
-
45
-
-
38949137343
-
Estimating a system's mean time-to-compromise
-
DOI 10.1109/MSP.2008.9
-
D. J. Leversage and E. J. Byres, "Estimating a system's mean time-to-compromise," IEEE Security Privacy, vol. 6, no. 1, pp. 52-60, 2008. (Pubitemid 351229833)
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.1
, pp. 52-60
-
-
Leversage, D.J.1
Byres, E.J.2
-
46
-
-
71649091879
-
Critical infrastructure dependency assessment using the input-output inoperability model
-
R. Setola, S. De Porcellinis, and M. Sforna, "Critical infrastructure dependency assessment using the input-output inoperability model," Int. J. Critical Infrastructure Protection, vol. 2, no. 4, pp. 170-178, 2009.
-
(2009)
Int. J. Critical Infrastructure Protection
, vol.2
, Issue.4
, pp. 170-178
-
-
Setola, R.1
De Porcellinis, S.2
Sforna, M.3
-
47
-
-
77955053757
-
Agent-based input-output interdependency model
-
G. Oliva, S. Panzieri, and R. Setola, "Agent-based input-output interdependency model," Int. J. Critical Infrastructure Protection, vol. 3, no. 2, pp. 76-82, 2010.
-
(2010)
Int. J. Critical Infrastructure Protection
, vol.3
, Issue.2
, pp. 76-82
-
-
Oliva, G.1
Panzieri, S.2
Setola, R.3
-
48
-
-
0022102587
-
Fault tree analysis, methods, applications. A review
-
W. S. Lee, D. L. Grosh, F. A. Tillman, and C. H. Lie, "Fault tree analysis, methods, applications. A review," IEEE Trans. Reliabil., vol. REL-34, no. 3, pp. 194-203, 1985.
-
(1985)
IEEE Trans. Reliabil
, vol.REL-34
, Issue.3
, pp. 194-203
-
-
Lee, W.S.1
Grosh, D.L.2
Tillman, F.A.3
Lie, C.H.4
-
49
-
-
77953695984
-
Cybersecurity for critical infrastructures: Attack and defensemodeling
-
Apr.
-
C.-W. Ten, G. Manimaran, and C.-C. Liu, "Cybersecurity for critical infrastructures: Attack and defensemodeling," IEEE Trans. Syst., Man, Cybern., vol. 40, no. 4, pp. 853-865, Apr. 2010.
-
(2010)
IEEE Trans. Syst., Man, Cybern
, vol.40
, Issue.4
, pp. 853-865
-
-
Ten, C.-W.1
Manimaran, G.2
Liu, C.-C.3
-
51
-
-
0034197755
-
Event-tree analysis using binary decision diagrams
-
DOI 10.1109/24.877343
-
J. Andrews and S. Dunnett, "Event-tree analysis using binary decision diagrams," IEEE Trans. Rel., vol. 49, no. 2, pp. 230-238, 2000. (Pubitemid 32031222)
-
(2000)
IEEE Transactions on Reliability
, vol.49
, Issue.2
, pp. 230-238
-
-
Andrews, J.D.1
Dunnett, S.J.2
-
52
-
-
0025795697
-
A unified approach to failure mode, effects and criticality analysis (FMECA)
-
B.Wei, "A unified approach to failure mode, effects and criticality analysis (FMECA)," in Proc. Annu. Symp. Reliabil. Maintainability, 1991, pp. 260-271.
-
(1991)
Proc. Annu. Symp. Reliabil. Maintainability
, pp. 260-271
-
-
Wei, B.1
-
53
-
-
51849109927
-
Applying F(I)MEA-technique for SCADA-based industrial control systems dependability assessment and ensuring
-
E. Babeshko, V. Kharchenko, and A. Gorbenko, "Applying F(I)MEA-technique for SCADA-based industrial control systems dependability assessment and ensuring," in Proc. 3rd Int. Conf. Dependability Comput. Syst., 2008, pp. 309-315.
-
(2008)
Proc. 3rd Int. Conf. Dependability Comput. Syst
, pp. 309-315
-
-
Babeshko, E.1
Kharchenko, V.2
Gorbenko, A.3
-
54
-
-
67349177466
-
Hierarchical, model-based risk management of critical infrastructures
-
F. Baiardi, C. Telmon, and D. Sgandurra, "Hierarchical, model-based risk management of critical infrastructures," Reliabil. Eng. Syst. Safety, vol. 94, no. 9, pp. 1403-1415, 2009.
-
(2009)
Reliabil. Eng. Syst. Safety
, vol.94
, Issue.9
, pp. 1403-1415
-
-
Baiardi, F.1
Telmon, C.2
Sgandurra, D.3
-
55
-
-
77951494880
-
Risk analysis via heterogeneous models of scada interconnecting power grids and telco networks
-
A. Bobbio, E. Ciancamerla, S. Di Blasi, A. Iacomini, F. Mari, I. Melatti, M. Minichino, A. Scarlatti, E. Tronci, R. Terruggia, and E. Zendri, "Risk analysis via heterogeneous models of scada interconnecting power grids and telco networks," in Proc. 4th Int. Conf. Risks Security Internet Syst., 2009, pp. 90-97.
-
(2009)
Proc. 4th Int. Conf. Risks Security Internet Syst
, pp. 90-97
-
-
Bobbio, A.1
Ciancamerla, E.2
Di Blasi, S.3
Iacomini, A.4
Mari, F.5
Melatti, I.6
Minichino, M.7
Scarlatti, A.8
Tronci, E.9
Terruggia, R.10
Zendri, E.11
-
56
-
-
70549085143
-
Cyber security: Assessing our vulnerabilities and developing an effective defense
-
LNCS
-
E. H. Spafford, "Cyber security: Assessing our vulnerabilities and developing an effective defense," in Proc. 2nd Annu. Workshop Inf. Privacy Nat. Security, 2009, vol. 5661, LNCS, pp. 20-33.
-
(2009)
Proc. 2nd Annu. Workshop Inf. Privacy Nat. Security
, vol.5661
, pp. 20-33
-
-
Spafford, E.H.1
-
57
-
-
85084140752
-
Research challenges for the security of control systems
-
A. A. Cárdenas, S. Amin, and S. Sastry, "Research challenges for the security of control systems," in Proc. 3rd USENIX Workshop on Hot Topics in Security, 2008, pp. 1-6.
-
(2008)
Proc. 3rd USENIX Workshop on Hot Topics in Security
, pp. 1-6
-
-
Cárdenas, A.A.1
Amin, S.2
Sastry, S.3
-
58
-
-
80055028776
-
Challenges for Securing Cyber Physical Systems
-
Online. Available
-
A. A. Cárdenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. Sastry, "Challenges for Securing Cyber Physical Systems," in Proc. Int. Workshop Future Directions in Cyber-phys. Syst. Security, 2009 [Online]. Available: http://cimic.rutgers.edu/positionPapers/cps-security-challenges- Cardenas.pdf
-
(2009)
Proc. Int. Workshop Future Directions in Cyber-phys. Syst. Security
-
-
Cárdenas, A.A.1
Amin, S.2
Sinopoli, B.3
Giani, A.4
Perrig, A.5
Sastry, S.6
-
59
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, response
-
A. A. Cárdenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry, "Attacks against process control systems: Risk assessment, detection, response," in Proc. 6th ACM Symp. Inf., Comput. Commun. Security, 2011, pp. 355-366.
-
(2011)
Proc. 6th. ACM Symp. Inf., Comput. Commun. Security
, pp. 355-366
-
-
Cárdenas, A.A.1
Amin, S.2
Lin, Z.-S.3
Huang, Y.-L.4
Huang, C.-Y.5
Sastry, S.6
-
60
-
-
67349092251
-
Detecting chains of vulnerabilities in industrial networks
-
M. Cheminod, I. Cibrario Bertolotti, L. Durante, P.Maggi, D. Pozza, R. Sisto, and A. Valenzano, "Detecting chains of vulnerabilities in industrial networks," IEEE Trans. Ind. Informat., vol. 5, no. 2, pp. 181-193, 2009.
-
(2009)
IEEE Trans. Ind. Informat
, vol.5
, Issue.2
, pp. 181-193
-
-
Cheminod, M.1
Cibrario Bertolotti, I.2
Durante, L.3
Maggi, P.4
Pozza, D.5
Sisto, R.6
Valenzano, A.7
-
61
-
-
58849130197
-
Usable global network access policy for process control systems
-
D. M. Nicol, W. H. Sanders, S. Singh, and M. Seri, "Usable global network access policy for process control systems," IEEE Security Privacy, vol. 6, no. 6, pp. 30-36, 2008.
-
(2008)
IEEE Security Privacy
, vol.6
, Issue.6
, pp. 30-36
-
-
Nicol, D.M.1
Sanders, W.H.2
Singh, S.3
Seri, M.4
-
62
-
-
77957550874
-
Automatic analysis of security policies in industrial networks
-
M. Cheminod, I. Cibrario Bertolotti, L. Durante, and A. Valenzano, "Automatic analysis of security policies in industrial networks," in Proc. 8th IEEE Int. Workshop Factory Commun. Syst., 2010, pp. 109-118.
-
(2010)
Proc. 8th IEEE Int. Workshop Factory Commun. Syst
, pp. 109-118
-
-
Cheminod, M.1
Cibrario Bertolotti, I.2
Durante, L.3
Valenzano, A.4
-
63
-
-
84870175876
-
System configuration check against security policies in industrial networks
-
M. Cheminod, L. Durante, and A. Valenzano, "System configuration check against security policies in industrial networks," in Proc. 7th IEEE Int. Symp. Ind. Embedded Syst., 2012, pp. 247-256.
-
(2012)
Proc. 7th. IEEE Int. Symp. Ind. Embedded Syst
, pp. 247-256
-
-
Cheminod, M.1
Durante, L.2
Valenzano, A.3
-
64
-
-
77951758583
-
Experiences validating the access policy tool in industrial settings
-
D. M. Nicol, W. H. Sanders, M. Seri, and S. Singh, "Experiences validating the access policy tool in industrial settings," in Proc. 43rd Hawaii Int. Conf. Syst. Sci., 2010, pp. 1-8.
-
(2010)
Proc. 43rd Hawaii Int. Conf. Syst. Sci
, pp. 1-8
-
-
Nicol, D.M.1
Sanders, W.H.2
Seri, M.3
Singh, S.4
-
65
-
-
84871955248
-
Assessing and exploiting the internal security of an organization
-
T. Stephanou, "Assessing and Exploiting the Internal Security of an Organization," SANS Inst., 2001.
-
(2001)
SANS Inst
-
-
Stephanou, T.1
-
68
-
-
28444465910
-
Distributed device networks with security constraints
-
DOI 10.1109/TII.2005.843826
-
X. Yuefei, R. Song, L. Korba, L. Wang, W. Shen, and S. Lang, "Distributed device networks with security constraints," IEEE Trans. Ind. Informat., vol. 1, no. 4, pp. 217-225, 2005. (Pubitemid 41729785)
-
(2005)
IEEE Transactions on Industrial Informatics
, vol.1
, Issue.4
, pp. 217-225
-
-
Xu, Y.1
Song, R.2
Korba, L.3
Wang, L.4
Shen, W.5
Lang, S.6
-
69
-
-
36249028736
-
Security strategies for SCADA networks
-
R. Chandia, J. Gonzalez, T. Kilpatrick,M. Papa, and S. Shenoi, "Security strategies for SCADA networks," Critical Infrastructure Protection, ser. Int. Fed. Inf. Process., vol. 253, pp. 117-131, 2007.
-
(2007)
Critical Infrastructure Protection, Ser. Int. Fed. Inf. Process
, vol.253
, pp. 117-131
-
-
Chandia, R.1
Gonzalez, J.2
Kilpatrick, T.3
Papa, M.4
Shenoi, S.5
-
70
-
-
67650661171
-
Advanced key-management architecture for secure SCADA communications
-
Aug
-
D. Choi, H. Kim, D. Won, and S. Kim, "Advanced key-management architecture for secure SCADA communications," IEEE Trans. Power Del., vol. 24, no. 3, pp. 1154-1163, Aug. 2009.
-
(2009)
IEEE Trans. Power Del
, vol.24
, Issue.3
, pp. 1154-1163
-
-
Choi, D.1
Kim, H.2
Won, D.3
Kim, S.4
-
71
-
-
77950187346
-
Efficient secure group communications for SCADA
-
May
-
D. Choi, S. Lee, D. Won, and S. Kim, "Efficient secure group communications for SCADA," IEEE Trans. Power Del., vol. 25, no. 2, pp. 714-722, May 2010.
-
(2010)
IEEE Trans. Power Del
, vol.25
, Issue.2
, pp. 714-722
-
-
Choi, D.1
Lee, S.2
Won, D.3
Kim, S.4
-
72
-
-
84871951474
-
SSCADA: Securing SCADA infrastructure communications
-
Y. Wang, "sSCADA: Securing SCADA infrastructure communications, " Int. J. Commun. Netw. Distrib. Syst., vol. 6, no. 1, pp. 59-78, 2011.
-
(2011)
Int. J. Commun. Netw. Distrib. Syst
, vol.6
, Issue.1
, pp. 59-78
-
-
Wang, Y.1
-
73
-
-
33645695288
-
Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information
-
M. Long and C.-H. J.Wu, "Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information," IEEE Trans. Ind. Informat., vol. 2, no. 1, pp. 40-47, 2006.
-
(2006)
IEEE Trans. Ind. Informat
, vol.2
, Issue.1
, pp. 40-47
-
-
Long, M.1
Wu, C.-H.J.2
-
74
-
-
62449110159
-
Static security optimization for real-time systems
-
M. Lin, L. Xu, L. T. Yang, X. Qin, N. Zheng, Z. Wu, and M. Qiu, "Static security optimization for real-time systems," IEEE Trans. Ind. Informat., vol. 5, no. 1, pp. 22-37, 2009.
-
(2009)
IEEE Trans. Ind. Informat
, vol.5
, Issue.1
, pp. 22-37
-
-
Lin, M.1
Xu, L.2
Yang, L.T.3
Qin, X.4
Zheng, N.5
Wu, Z.6
Qiu, M.7
-
75
-
-
70149101305
-
Application of trusted network technology to industrial control networks
-
H. Okhravi and D. M. Nicol, "Application of trusted network technology to industrial control networks," Int. J. Critical Infrastructure Protection, vol. 2, no. 3, pp. 84-94, 2009.
-
(2009)
Int. J. Critical Infrastructure Protection
, vol.2
, Issue.3
, pp. 84-94
-
-
Okhravi, H.1
Nicol, D.M.2
-
76
-
-
67650535901
-
Rethinking security properties, threat models, the design space in sensor networks: A case study in SCADA systems
-
A. A. Cárdenas, T. Roosta, and S. Sastry, "Rethinking security properties, threat models, the design space in sensor networks: A case study in SCADA systems," Ad Hoc Networks, vol. 7, no. 8, pp. 1434-1447, 2009.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1434-1447
-
-
Cárdenas, A.A.1
Roosta, T.2
Sastry, S.3
-
77
-
-
77953688880
-
A security analysis for wireless sensor mesh networks in highly critical systems
-
Apr.
-
C. Alcaraz and J. Lopez, "A security analysis for wireless sensor mesh networks in highly critical systems," IEEE Trans. Syst., Man, Cybern. C, vol. 40, no. 4, pp. 419-428, Apr. 2010.
-
(2010)
IEEE Trans. Syst., Man, Cybern. C
, vol.40
, Issue.4
, pp. 419-428
-
-
Alcaraz, C.1
Lopez, J.2
-
79
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
DOI 10.1109/TIE.2006.881998
-
C.-C. Lee, M.-S. Hwang, and I.-E. Liao, "Security enhancement on a new authentication scheme with anonymity for wireless environments," IEEE Trans. Ind. Electron., vol. 53, no. 5, pp. 1683-1687, May 2006. (Pubitemid 44593519)
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.-C.1
Hwang, M.-S.2
Liao, I.-E.3
-
80
-
-
77958017287
-
Safety-and security-critical services in building automation and control systems
-
Nov.
-
T. Novak and A. Gerstinger, "Safety-and security-critical services in building automation and control systems," IEEE Trans. Ind. Electron., vol. 57, no. 11, pp. 3614-3621, Nov. 2010.
-
(2010)
IEEE Trans. Ind. Electron
, vol.57
, Issue.11
, pp. 3614-3621
-
-
Novak, T.1
Gerstinger, A.2
-
81
-
-
77956599919
-
Security in building automation systems
-
Nov.
-
W. Granzer, F. Praus, andW.Kastner, "Security in building automation systems," IEEE Trans. Ind. Electron., vol. 57, no. 11, pp. 3622-3630, Nov. 2010.
-
(2010)
IEEE Trans. Ind. Electron
, vol.57
, Issue.11
, pp. 3622-3630
-
-
Granzer, W.1
Praus, F.2
Kastner, W.3
-
82
-
-
59049098426
-
Credential management for automatic identification solutions in supply chain management
-
Apr
-
M. Henseler, M. Rossberg, and G. Schaefer, "Credential management for automatic identification solutions in supply chain management," IEEE Trans. Ind. Informat., vol. 4, no. 4, pp. 303-314, Apr. 2008.
-
(2008)
IEEE Trans. Ind. Informat
, vol.4
, Issue.4
, pp. 303-314
-
-
Henseler, M.1
Rossberg, M.2
Schaefer, G.3
-
84
-
-
70149104596
-
Forensic analysis of SCADA systems and networks
-
DOI 10.1504/IJSN.2008.017222
-
T. Kilpatrick, J. Gonzalez, R. Chandia, M. Papa, and S. Shenoi, "Forensic analysis of SCADA systems and networks," Int. J. Secur. Netw., vol. 3, no. 2, pp. 95-102, 2008. (Pubitemid 351292178)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 95-102
-
-
Kilpatrick, T.1
Gonzalez, J.2
Chandia, R.3
Papa, M.4
Shenoi, S.5
-
85
-
-
67349114068
-
Tools for cryptographic protocols analysis: A technical and experimental comparison
-
M. Cheminod, I. Cibrario Bertolotti, L. Durante, R. Sisto, and A. Valenzano, "Tools for cryptographic protocols analysis: A technical and experimental comparison," Comput. Standards & Interfaces, vol. 31, no. 5, pp. 954-961, 2009.
-
(2009)
Comput. Standards & Interfaces
, vol.31
, Issue.5
, pp. 954-961
-
-
Cheminod, M.1
Bertolotti, I.C.2
Durante, L.3
Sisto, R.4
Valenzano, A.5
-
86
-
-
79951577827
-
Formal vulnerability analysis of a security system for remote fieldbus access
-
M. Cheminod, A. Pironti, and R. Sisto, "Formal vulnerability analysis of a security system for remote fieldbus access," IEEE Trans. Ind. Informat., vol. 7, no. 1, pp. 30-40, 2011.
-
(2011)
IEEE Trans. Ind. Informat
, vol.7
, Issue.1
, pp. 30-40
-
-
Cheminod, M.1
Pironti, A.2
Sisto, R.3
-
88
-
-
79959296407
-
Modular multiplication and exponentiation architectures for fast RSA cryptosystem based on digit serial computation
-
Jul.
-
G. D. Sutter, J.-P. Deschamps, and J. L. Imana, "Modular multiplication and exponentiation architectures for fast RSA cryptosystem based on digit serial computation," IEEE Trans. Ind. Electron., vol. 58, no. 7, pp. 3101-3109, Jul. 2011.
-
(2011)
IEEE Trans. Ind. Electron
, vol.58
, Issue.7
, pp. 3101-3109
-
-
Sutter, G.D.1
Deschamps, J.-P.2
Imana, J.L.3
-
89
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
Jan
-
J. Zhu and J. Ma, "A new authentication scheme with anonymity for wireless environments," IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 231-235, Jan. 2004.
-
(2004)
IEEE Trans. Consum. Electron
, vol.50
, Issue.1
, pp. 231-235
-
-
Zhu, J.1
Ma, J.2
-
90
-
-
0023294428
-
An intrusion-detection model
-
D. E. Denning, "An intrusion-detection model," IEEE Trans. Softw. Eng., vol. 13, no. 2, pp. 222-232, 1987.
-
(1987)
IEEE Trans. Softw. Eng
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
91
-
-
77956987558
-
An intrusion detection system for iec61850 automated substations
-
Nov.
-
U. Premaratne, J. Samarabandu, T. Sidhu, R. Beresh, and J.-C. Tan, "An intrusion detection system for iec61850 automated substations," IEEE Trans. Power Del., vol. 25, no. 4, pp. 2376-2383, Nov. 2010.
-
(2010)
IEEE Trans. Power Del
, vol.25
, Issue.4
, pp. 2376-2383
-
-
Premaratne, U.1
Samarabandu, J.2
Sidhu, T.3
Beresh, R.4
Tan, J.-C.5
-
92
-
-
77955015254
-
State-based network intrusion detection systems for SCADA protocols: A proof of concept
-
A. Carcano, I. Fovino,M.Masera, and A. Trombetta, "State-based network intrusion detection systems for SCADA protocols: A proof of concept," Proc. 4th Int. Workshop Critical Inf. Infrastructures Security, ser. LNCS, vol. 6027, pp. 138-150, 2010.
-
(2010)
Proc. 4th Int. Workshop Critical Inf. Infrastructures Security, Ser. LNCS
, vol.6027
, pp. 138-150
-
-
Carcano, A.1
Fovino, I.2
Masera, M.3
Trombetta, A.4
-
93
-
-
20344364652
-
Denial of service attacks on network-based control systems: Impact and mitigation
-
DOI 10.1109/TII.2005.844422
-
M. Long, C.-H. J. Wu, and J. Y. Hung, "Denial of service attacks on network-based control systems: Impact and mitigation," IEEE Trans. Ind. Informat., vol. 1, no. 2, pp. 85-96, 2005. (Pubitemid 40786123)
-
(2005)
IEEE Transactions on Industrial Informatics
, vol.1
, Issue.2
, pp. 85-96
-
-
Long, M.1
Wu, C.-H.2
Hung, J.Y.3
-
94
-
-
56349168450
-
Denial-of-service in automation systems
-
W. Granzer, C. Reinisch, and W. Kastner, "Denial-of-service in automation systems," in Proc. 13th IEEE Int. Conf. Emerging Technol. Factory Automation, 2008, pp. 468-471.
-
(2008)
Proc. 13th IEEE Int. Conf. Emerging Technol. Factory Automation
, pp. 468-471
-
-
Granzer, W.1
Reinisch, C.2
Kastner, W.3
-
95
-
-
70449371464
-
Neural network based intrusion detection system for critical infrastructures
-
O. Linda, T. Vollmer, and M. Manic, "Neural network based intrusion detection system for critical infrastructures," in Proc. Int. IEEE-INNSENNS Joint Conf. Neural Networks, 2009, pp. 1827-1834.
-
(2009)
Proc. Int IEEE-INNSENNS Joint Conf. Neural Networks
, pp. 1827-1834
-
-
Linda, O.1
Vollmer, T.2
Manic, M.3
-
96
-
-
77955029557
-
Cyber-critical infrastructure protection using real-time payload-based anomaly detection
-
LNCS
-
P.Düssel,C.Gehl,P. Laskov, J.-U.Bußer, C. Störmann, and J. Kästner, "Cyber-critical infrastructure protection using real-time payload-based anomaly detection," in Proc. 4th Int. Workshop Critical Inf. Infrastructures Security, 2010, vol. 6027, LNCS, pp. 85-97.
-
(2010)
Proc. 4th Int. Workshop Critical Inf. Infrastructures Security
, vol.6027
, pp. 85-97
-
-
Düssel, P.1
Gehl, C.2
Laskov, P.3
Bußer, J.-U.4
Störmann, C.5
Kästner, J.6
-
97
-
-
79955867639
-
A multidimensional critical state analysis for detecting intrusions in SCADA systems
-
A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. Nai Fovino, and A. Trombetta, "A multidimensional critical state analysis for detecting intrusions in SCADA systems," IEEE Trans. Ind. Informat., vol. 7, no. 2, pp. 179-186, 2011.
-
(2011)
IEEE Trans. Ind. Informat
, vol.7
, Issue.2
, pp. 179-186
-
-
Carcano, A.1
Coletta, A.2
Guglielmi, M.3
Masera, M.4
Nai Fovino, I.5
Trombetta, A.6
-
98
-
-
70350634504
-
Using model-based intrusion detection for SCADA networks
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A. Valdes, "Using model-based intrusion detection for SCADA networks," in Proc. SCADA Security Scientific Symp., 2007, pp. 1-12.
-
(2007)
Proc. SCADA Security Scientific Symp
, pp. 1-12
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
99
-
-
77954883964
-
Intrusion detection in SCADA networks
-
LNCS
-
R. Barbosa and A. Pras, "Intrusion detection in SCADA networks," in Mechanisms for Autonomous Management of Networks and Services-Proc. 4th Int. Conf. Auton. Infrastructure, Manag., Security, 2010, vol. 6155, LNCS, pp. 163-166.
-
(2010)
Mechanisms for Autonomous Management of Networks and Services-Proc. 4th Int. Conf. Auton. Infrastructure, Manag., Security
, vol.6155
, pp. 163-166
-
-
Barbosa, R.1
Pras, A.2
-
100
-
-
34047126237
-
Anomaly-based intrusion detection for SCADA systems
-
Online. Available
-
D. Yang, E. Usynin, and J.W. Hines, "Anomaly-based intrusion detection for SCADA systems," in Proc. 5th Amer. Nuclear Soc. Int. Topical Meeting on Nuclear Plant Instrum., Controls, Human Machine Interface Technol., 2006 [Online]. Available: http://entrac.iaea.org/iand-c/tm idaho 2006/cd/IAEA%20Day%202/Hines%20paper.pdf
-
(2006)
Proc. 5th Amer. Nuclear Soc. Int. Topical Meeting on Nuclear Plant Instrum., Controls, Human Machine Interface Technol
-
-
Yang, D.1
Usynin, E.2
Hines, J.W.3
-
101
-
-
36249007497
-
Intrusion detection and event monitoring in SCADA Networks
-
P. Oman and M. Phillips, "Intrusion detection and event monitoring in SCADA Networks," in Proc. Critical Infrastructure Protection, 2007, vol. 253, pp. 161-173.
-
(2007)
Proc. Critical Infrastructure Protection
, vol.253
, pp. 161-173
-
-
Oman, P.1
Phillips, M.2
-
102
-
-
78149468870
-
An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
-
S. Shin, T. Kwon, G.-Y. Jo, Y. Park, and H. Rhy, "An experimental study of hierarchical intrusion detection for wireless industrial sensor networks," IEEE Trans. Ind. Informat., vol. 6, no. 4, pp. 744-757, 2010.
-
(2010)
IEEE Trans. Ind. Informat
, vol.6
, Issue.4
, pp. 744-757
-
-
Shin, S.1
Kwon, T.2
Jo, G.-Y.3
Park, Y.4
Rhy, H.5
-
103
-
-
38549122472
-
A workflow-based non-intrusive approach for enhancing the survivability of critical infrastructures in cyber environment
-
K. Xiao, N. Chen, S. Ren, L. Shen, X. Sun, K. Kwiat, and M. Macalik, "A workflow-based non-intrusive approach for enhancing the survivability of critical infrastructures in cyber environment," in Proc. 3rd Int. Workshop Software Eng. for Secure Syst., 2007, pp. 4-10.
-
(2007)
Proc. 3rd Int. Workshop Software Eng. for Secure Syst
, pp. 4-10
-
-
Xiao, K.1
Chen, N.2
Ren, S.3
Shen, L.4
Sun, X.5
Kwiat, K.6
MacAlik, M.7
-
104
-
-
10044254666
-
A distributed architecture for online power systems security analysis
-
Jun
-
M. Di Santo, A. Vaccaro, D. Villacci, and E. Zimeo, "A distributed architecture for online power systems security analysis," IEEE Trans. Ind. Electron., vol. 51, no. 6, pp. 1238-1248, Jun. 2004.
-
(2004)
IEEE Trans. Ind. Electron
, vol.51
, Issue.6
, pp. 1238-1248
-
-
Di Santo, M.1
Vaccaro, A.2
Villacci, D.3
Zimeo, E.4
-
105
-
-
77949908962
-
Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration
-
H. Hadeli, R. Schierholz, M. Braendle, and C. Tuduce, "Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration," in Proc. 14th IEEE Int. Conf. Emerging Technol. Factory Automation, 2009, pp. 1-8.
-
(2009)
Proc. 14th IEEE Int. Conf. Emerging Technol. Factory Automation
, pp. 1-8
-
-
Hadeli, H.1
Schierholz, R.2
Braendle, M.3
Tuduce, C.4
|