-
2
-
-
0242314137
-
-
President's Critical Infrastructure Protection Board and Office of Energy Assurance U.S. Department of Energy. U.S. Department of Energy
-
President's Critical Infrastructure Protection Board and Office of Energy Assurance U.S. Department of Energy. 21 Steps to Improve Cyber Security of SCADA Networks. U.S. Department of Energy, 2002.
-
(2002)
21 Steps to Improve Cyber Security of SCADA Networks.
-
-
-
3
-
-
14644404940
-
Effective fault treatment for improving the dependability of COTS and legacy-based applications
-
A. Bondavalli, S. Chiaradonna, D. Cotroneo, and L. Romano. Effective fault treatment for improving the dependability of COTS and legacy-based applications. IEEE Transactions on Parallel and Distributed Systems, 1(4):223-237, 2004.
-
(2004)
IEEE Transactions on Parallel and Distributed Systems
, vol.1
, Issue.4
, pp. 223-237
-
-
Bondavalli, A.1
Chiaradonna, S.2
Cotroneo, D.3
Romano, L.4
-
4
-
-
34047192955
-
NISCC good practice guide on firewall deployment for SCADA and process control networks
-
February. Revision 1.4
-
E. Byres, J. Karsch, and J. Carter. NISCC good practice guide on firewall deployment for SCADA and process control networks. Technical report, NISCC, February 2005. Revision 1.4.
-
(2005)
Technical Report, NISCC
-
-
Byres, E.1
Karsch, J.2
Carter, J.3
-
5
-
-
77956994520
-
Attacks and accidents: Policy to protect the power grid's critical computing and communication needs
-
Stanford University, May
-
J. Cieslewicz. Attacks and accidents: Policy to protect the power grid's critical computing and communication needs. Senior interdisciplinary honors thesis in international security studies, Stanford University, May 2004.
-
(2004)
Senior Interdisciplinary Honors Thesis in International Security Studies
-
-
Cieslewicz, J.1
-
6
-
-
34548114582
-
Critical utiliy infrastructural resilience
-
March
-
G. Dondossola, G. Deconinck, F. Di Giandomenico, S. Donatelli, M. Kaaniche, and P. Veríssimo. Critical utiliy infrastructural resilience. In International Workshop on Complex Network and Infrastructure Protection, March 2006.
-
(2006)
International Workshop on Complex Network and Infrastructure Protection
-
-
Dondossola, G.1
Deconinck, G.2
Di Giandomenico, F.3
Donatelli, S.4
Kaaniche, M.5
Veríssimo, P.6
-
8
-
-
31944451961
-
Security of critical control systems sparks concern
-
January
-
D. Geer. Security of critical control systems sparks concern. IEEE Computer, pages 20-23, January 2006.
-
(2006)
IEEE Computer
, pp. 20-23
-
-
Geer, D.1
-
10
-
-
77952407814
-
-
Organization-based access control. June
-
A. A. El Kalam, R. Elbaida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. MiFge, C. Saurel, and G. Trouessin. Organization-based access control. In IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pages 277-288, June 2003.
-
(2003)
IEEE 4th International Workshop on Policies for Distributed Systems and Networks
, pp. 277-288
-
-
El Kalam, A.A.1
Elbaida, R.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Mifge, A.7
Saurel, C.8
Trouessin, G.9
-
11
-
-
84976699318
-
The byzantine generals problem
-
July
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401, July 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
12
-
-
21244471172
-
Strategic power infrastructure defense
-
May
-
H. Li, G. W. Rosenwald, J. Jung, and C. Liu. Strategic power infrastructure defense. Proceedings of the IEEE, 93(5):918-933, May 2005.
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.5
, pp. 918-933
-
-
Li, H.1
Rosenwald, G.W.2
Jung, J.3
Liu, C.4
-
13
-
-
35048870265
-
Redundancy and diversity in security
-
In P. Samarati, P. Rian, D. Gollmann, and R. Molva, editors, LNCS 3193. Springer
-
B. Littlewood and L. Strigini. Redundancy and diversity in security. In P. Samarati, P. Rian, D. Gollmann, and R. Molva, editors, Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, LNCS 3193, pages 423-438. Springer, 2004.
-
(2004)
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security
, pp. 423-438
-
-
Littlewood, B.1
Strigini, L.2
-
15
-
-
51449101349
-
Getting a grip on the grid
-
December
-
V. Madani and D. Novosel. Getting a grip on the grid. IEEE Spectrum, 42(12):42-47, December 2005.
-
(2005)
IEEE Spectrum
, vol.42
, Issue.12
, pp. 42-47
-
-
Madani, V.1
Novosel, D.2
-
16
-
-
33845597598
-
Using attack injection to discover new vulnerabilities
-
June
-
N. F. Neves, J. Antunes, M. Correia, P. Verfssimo, and R. Neves. Using attack injection to discover new vulnerabilities. In Proceedings of the International Conference on Dependable Systems and Networks, June 2006.
-
(2006)
Proceedings of the International Conference on Dependable Systems and Networks
-
-
Neves, N.F.1
Antunes, J.2
Correia, M.3
Verfssimo, P.4
Neves, R.5
-
20
-
-
34047144699
-
Common vulnerabilities in critical infrastructure control systems
-
Sandia National Laboratories, May
-
J. Stamp, J. Dillinger, W. Young, and J. DePoy. Common vulnerabilities in critical infrastructure control systems. Technical report, Sandia National Laboratories, May 2003.
-
(2003)
Technical Report
-
-
Stamp, J.1
Dillinger, J.2
Young, W.3
Depoy, J.4
-
22
-
-
84885727030
-
-
Trends for January 05-June 05. Symantec, September
-
D. Turner, S. Entwisle, O. Friedrichs, D. Ahmad, J. Blackbird, M. Fossi, D. Hanson, S. Gordon, D. Cole, D. Cowlings, D. Morss, B. Bradley, P. Szor, E. Chien, J. Ward, J. Gough, and J. Talbot. Symantec Internet security threat report. Trends for January 05-June 05. Symantec, Volume VIII, September 2005.
-
(2005)
Symantec Internet Security Threat Report
, vol.VIII
-
-
Turner, D.1
Entwisle, S.2
Friedrichs, O.3
Ahmad, D.4
Blackbird, J.5
Fossi, M.6
Hanson, D.7
Gordon, S.8
Cole, D.9
Cowlings, D.10
Morss, D.11
Bradley, B.12
Szor, P.13
Chien, E.14
Ward, J.15
Gough, J.16
Talbot, J.17
-
23
-
-
84855556571
-
The enemy within: System complexity and organizational surprises
-
In M. Dunn and V. Mauer, editors, Center for Security Studies, ETH Zurich
-
M. van Eeten, E. Roe, P. Schulman, and M. de Bruijne. The enemy within: System complexity and organizational surprises. In M. Dunn and V. Mauer, editors, International CIIP Handbook 2006, volume II, pages 89-110. Center for Security Studies, ETH Zurich, 2006.
-
(2006)
International CIIP Handbook 2006
, vol.II
, pp. 89-110
-
-
Van Eeten, M.1
Roe, E.2
Schulman, P.3
De Bruijne, M.4
-
26
-
-
33747276448
-
Intrusion-tolerant middleware: The road to automatic security
-
Jul./Aug
-
P. Veríssimo, N. F. Neves, C. Cachin, J. Poritz, D. Powell, Y. Deswarte, R. Stroud, and I. Welch. Intrusion-tolerant middleware: The road to automatic security. IEEE Security & Privacy, 4(4):54-62, Jul./Aug. 2006.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.4
, pp. 54-62
-
-
Veríssimo, P.1
Neves, N.F.2
Cachin, C.3
Poritz, J.4
Powell, D.5
Deswarte, Y.6
Stroud, R.7
Welch, I.8
-
27
-
-
84881247246
-
Intrusion-tolerant architectures: Concepts and design
-
In R. Lemos, C. Gacek, and A. Romanovsky, editors
-
P. Veríssimo, N. F. Neves, and M. Correia. Intrusion-tolerant architectures: Concepts and design. In R. Lemos, C. Gacek, and A. Romanovsky, editors, Architecting Dependable Systems, volume 2677, pages 3-36. 2003.
-
(2003)
Architecting Dependable Systems
, vol.2677
, pp. 3-36
-
-
Veríssimo, P.1
Neves, N.F.2
Correia, M.3
-
28
-
-
77649269871
-
Terrorist capabilities for cyber-attack
-
In M. Dunn and V. Mauer, editors, Center for Security Studies, ETH Zurich
-
C. Wilson. Terrorist capabilities for cyber-attack. In M. Dunn and V. Mauer, editors, International CIIP Handbook 2006, volume II, pages 69-88. Center for Security Studies, ETH Zurich, 2006.
-
(2006)
International CIIP Handbook 2006
, vol.II
, pp. 69-88
-
-
Wilson, C.1
|