-
1
-
-
0003871155
-
-
Springer-Verlag, Berlin, Germany/Heidelberg, Germany/ London, UK/ ect.
-
Jensen K. Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use [C]. Springer-Verlag, Berlin, Germany/Heidelberg, Germany/ London, UK/ ect., 1992, 1
-
(1992)
Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use [C]
, pp. 1
-
-
Jensen, K.1
-
6
-
-
0142049813
-
A software fault tree approach to requirements analysis of an intrusion detection system [C]
-
Center for education and research in information assurance and security, Perdue University, March
-
Helmer G, Wong J., Slagell M, et al. A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System [C]. In Proceeding of symposium on requirements engineering for information security. Center for education and research in information assurance and security, Perdue University, March 2001
-
(2001)
Proceeding of Symposium on Requirements Engineering for Information Security
-
-
Helmer, G.1
Wong, J.2
Slagell, M.3
-
7
-
-
84988504967
-
A graph-based system for network-vulnerability analysis [C]
-
Charlottesville, VA, USA
-
Phillips C, Swiler L P. A Graph-based System for Network-Vulnerability Analysis [C]. In proceeding of new security paradigms workshop, Charlottesville, VA, USA, 1998, 71-79
-
(1998)
Proceeding of New Security Paradigms Workshop
, pp. 71-79
-
-
Phillips, C.1
Swiler, L.P.2
-
8
-
-
50149105845
-
Software Fault Tree and Colored Petri Net based specification and implementation of agent- based intrusion detection systems
-
Helmer G, Wong J., Slagell M, et al. "Software Fault Tree and Colored Petri Net based specification and implementation of agent- based intrusion detection systems" Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007.
-
(2007)
Int. J. Information and Computer Security
, vol.1
, Issue.1-2
-
-
Helmer, G.1
Wong, J.2
Slagell, M.3
-
9
-
-
2342589865
-
A brief introduction to Colored Petri Nets
-
2 June, Aarhus, Denmark
-
K. Jensen," A brief introduction to Colored Petri Nets", Workshop on the Applicability of Formal Models, 2 June 1998, Aarhus, Denmark, pages 55-58.
-
(1998)
Workshop on the Applicability of Formal Models
, pp. 55-58
-
-
Jensen, K.1
-
10
-
-
2342589865
-
An introduction to the theoretical aspects of colored petri nets
-
Aarhus, Denmark
-
K. Jensen. " An introduction to the Theoretical Aspects of Colored Petri Nets", Workshop on the Applicability of Formal Models, Aarhus, Denmark, 1998.
-
(1998)
Workshop on the Applicability of Formal Models
-
-
Jensen, K.1
-
11
-
-
84874467666
-
-
The Center for SCADA Security, Sandia National laboratory
-
"The center for SCADA security," The Center for SCADA Security, Sandia National laboratory. [online]. Available http://www.sandia.gov/scada/ home.htm.
-
The Center for SCADA Security
-
-
-
12
-
-
77952655630
-
Supervisory control and data acquisition (SCADA) systems
-
Oct.
-
"Supervisory Control and Data Acquisition (SCADA) Systems," Technical Information Bulletin 04-1, National Communication System, Oct. 2004. [online]. Available: http://www.ncs.gov/library/tech-bulletins/2004/tib-04-1.pdf
-
(2004)
Technical Information Bulletin 04-1
-
-
-
13
-
-
84999665477
-
Understanding SCADA system security vulnerabilities
-
"Understanding SCADA system security vulnerabilities," Symantec White Paper, 2005.
-
(2005)
Symantec White Paper
-
-
-
14
-
-
20844463674
-
Security in SCADA how to handle the growing systems: Menace to process automation
-
DOI 10.1049/cce:20050306
-
T. Brown, "Security in SCADA systems: How to handle the growing menace to process automation," IEE Comp. and Control Eng., vol. 16, no. 3, Jun./Jul. 2005, pp.42-47. (Pubitemid 40860336)
-
(2005)
IEE Computing and Control Engineering
, vol.16
, Issue.3
, pp. 42-47
-
-
Brown, T.1
-
17
-
-
33745849657
-
Foundations of attack trees
-
DOI 10.1007/11734727-17, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers
-
S. Mauw and M. Oostdijk, "Foundations of attack trees," in Proc. 8th Annu. Int. Conf. Inf. Security Cryptol. (ICISC), Seoul, Korea, Dec. 2005, pp. 186-198. (Pubitemid 44029534)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3935
, pp. 186-198
-
-
Mauw, S.1
Oostdijk, M.2
-
18
-
-
70349170749
-
System level security modeling using attack trees
-
Karachi, Pakistan, Feb.
-
P. Khand, "System level security modeling using attack trees," in Proc. 2nd Int. Conf. Comput., Control, Commun. (ICA), Karachi, Pakistan, Feb. 2009, pp. 1-6.
-
(2009)
Proc. 2nd Int. Conf. Comput., Control, Commun. (ICA)
, pp. 1-6
-
-
Khand, P.1
-
19
-
-
33747585156
-
Assessment of interactions between power and telecommunications infrastructures
-
DOI 10.1109/TPWRS.2006.876692
-
K. Schneider, C.-C. Liu, and J.-P. Paul, "Assessment of interactions between power and telecommunications infrastructures," IEEE Trans. Power Sys., vol. 21, pp. 1123-1130, Aug. 2006. (Pubitemid 44263503)
-
(2006)
IEEE Transactions on Power Systems
, vol.21
, Issue.3
, pp. 1123-1130
-
-
Schneider, K.1
Liu, C.-C.2
Paul, J.-P.3
-
20
-
-
42549101645
-
Vulnerability assessment of cybersecurity for scada systems using attack trees
-
Tampa, FL, Jun.
-
C.-W. Ten, C.-C. Liu, and M. Govindarasu, "Vulnerability assessment of cybersecurity for scada systems using attack trees," in IEEE Power Eng. Soc. Gen. Meet., Tampa, FL, Jun. 2007, pp. 1-6.
-
(2007)
IEEE Power Eng. Soc. Gen. Meet.
, pp. 1-6
-
-
Ten, C.-W.1
Liu, C.-C.2
Govindarasu, M.3
-
21
-
-
77955027376
-
Energy theft in the advanced metering infrastructure
-
Bonn, Germany, Sep.
-
S. McLaughlin, D. Podkuiko, and P. McDaniel, "Energy theft in the advanced metering infrastructure," in Proc. 4th Int. Workshop Crit. Inf. Infrastruct. Security (CRITIS 2009), Bonn, Germany, Sep. 2009, pp. 176-187.
-
(2009)
Proc. 4th Int. Workshop Crit. Inf. Infrastruct. Security (CRITIS 2009)
, pp. 176-187
-
-
McLaughlin, S.1
Podkuiko, D.2
McDaniel, P.3
-
22
-
-
84874461876
-
Performance modeling of attack countermeasure using colored petri nets
-
Agadir, Morocco, May 25 - 26
-
Abdelali El Bouchti and Abdelkrim Haqiq,"Performance Modeling of Attack Countermeasure Using Colored Petri Nets", International Symposium on Security and Safety of Complex Systems, Agadir, Morocco, May 25 - 26, 2012.
-
(2012)
International Symposium on Security and Safety of Complex Systems
-
-
El Bouchti, A.1
Haqiq, A.2
|