-
1
-
-
84947567130
-
Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant?
-
Albright, D., Brannan, P., Walrond, C. 2010. Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? In Institute for Science and International Security (ISIS) report.
-
(2010)
Institute for Science and International Security (ISIS) Report
-
-
Albright, D.1
Brannan, P.2
Walrond, C.3
-
2
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., Savage, S. 2010. Experimental security analysis of a modern automobile. In Proceedings of Symposium on Security and Privacy (SP), 447-462.
-
(2010)
Proceedings of Symposium on Security and Privacy (SP)
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
Savage, S.7
-
3
-
-
84877615305
-
-
Shepard, D. P., Bhatti, J. A., Humphreys, T. E., & Fansler, A. A. 2012. Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks.
-
(2012)
Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks
-
-
Shepard, D.P.1
Bhatti, J.A.2
Humphreys, T.E.3
Fansler, A.A.4
-
4
-
-
84868596713
-
Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach
-
Yampolskiy, M., Horvath, P., Koutsoukos, X. D., Xue, Y., & Sztipanovits, J. 2012. Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach. In Proceedings of the 5th International Symposium on Resilient Control Systems (Salt Lake City, Utah, August 14-16m 2012), 55-62.
-
(2012)
Proceedings of the 5th International Symposium on Resilient Control Systems (Salt Lake City, Utah, August 14-16m 2012)
, pp. 55-62
-
-
Yampolskiy, M.1
Horvath, P.2
Koutsoukos, X.D.3
Xue, Y.4
Sztipanovits, J.5
-
5
-
-
78650062267
-
-
White paper, Symantec Corp., Security Response
-
Falliere, N., Murchu, L. O., & Chien, E. 2011. W32. stuxnet dossier. White paper, Symantec Corp., Security Response.
-
(2011)
W32. Stuxnet Dossier
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
6
-
-
22344444992
-
The myths and facts behind cyber security risks for industrial control systems
-
Byres, E., & Lowe, J. 2004. The myths and facts behind cyber security risks for industrial control systems. In Proceedings of the VDE Kongress (Vol. 116).
-
(2004)
Proceedings of the VDE Kongress
, vol.116
-
-
Byres, E.1
Lowe, J.2
-
7
-
-
3042781457
-
Crossover: Online pests plaguing the off line world
-
Levy, E. 2003. Crossover: online pests plaguing the off line world. In Security & Privacy, 1(6), 71-73.
-
(2003)
Security & Privacy
, vol.1
, Issue.6
, pp. 71-73
-
-
Levy, E.1
-
9
-
-
85014332650
-
Security in embedded systems: Design challenges
-
Ravi, S., Raghunathan, A., Kocher, P., & Hattangady, S. 2004. Security in embedded systems: Design challenges. In ACM Transactions on Embedded Computing Systems, 3(3), 461-491.
-
(2004)
ACM Transactions on Embedded Computing Systems
, vol.3
, Issue.3
, pp. 461-491
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
10
-
-
12244311689
-
A taxonomy of computer worms
-
Weaver, N., Paxson, V., Staniford, S., & Cunningham, R. 2003. A taxonomy of computer worms. In Proceedings of the 2003 ACM workshop on Rapid malcode, 11-18.
-
(2003)
Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
11
-
-
0035696915
-
Identifying, understanding, and analyzing critical infrastructure interdependencies
-
Rinaldi, S. M., Peerenboom, J. P., & Kelly, T. K. 2001. Identifying, understanding, and analyzing critical infrastructure interdependencies. In Control Systems, 21(6), 11-25.
-
(2001)
Control Systems
, vol.21
, Issue.6
, pp. 11-25
-
-
Rinaldi, S.M.1
Peerenboom, J.P.2
Kelly, T.K.3
-
13
-
-
85084140752
-
Research challenges for the security of control systems
-
Cárdenas, A. A., Amin, S., & Sastry, S. 2008. Research challenges for the security of control systems. In Proceedings of the 3rd conference on Hot topics in security, 1-6.
-
(2008)
Proceedings of the 3rd Conference on Hot Topics in Security
, pp. 1-6
-
-
Cárdenas, A.A.1
Amin, S.2
Sastry, S.3
-
15
-
-
77951617797
-
This car runs on code
-
Charette, R. N. 2009. This car runs on code. In IEEE Spectrum, 46(3), 3.
-
(2009)
IEEE Spectrum
, vol.46
, Issue.3
, pp. 3
-
-
Charette, R.N.1
-
17
-
-
15744370034
-
A taxonomy of network and computer attacks
-
DOI 10.1016/j.cose.2004.06.011, PII S0167404804001804
-
Hansman, S., & Hunt, R. 2005. A taxonomy of network and computer attacks. In Computers & Security, 24(1), 31-43. (Pubitemid 40415398)
-
(2005)
Computers and Security
, vol.24
, Issue.1
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
-
19
-
-
57849119623
-
Power supply signal calibration techniques for improving detection resolution to hardware Trojans
-
Rad, R. M., Wang, X., Tehranipoor, M., & Plusquellic, J. 2008. Power supply signal calibration techniques for improving detection resolution to hardware Trojans. In Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design, 632-639.
-
(2008)
Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design
, pp. 632-639
-
-
Rad, R.M.1
Wang, X.2
Tehranipoor, M.3
Plusquellic, J.4
-
20
-
-
35148893877
-
-
Project report
-
Lippmann, R. P., Ingols, K. W., Scott, C., Piwowarski, K., Kratkiewicz, K. J., Artz, M., & Cunningham, R. K. 2005. Evaluating and strengthening enterprise network security using attack graphs. Project report.
-
(2005)
Evaluating and Strengthening Enterprise Network Security Using Attack Graphs
-
-
Lippmann, R.P.1
Ingols, K.W.2
Scott, C.3
Piwowarski, K.4
Kratkiewicz, K.J.5
Artz, M.6
Cunningham, R.K.7
-
21
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., & Sunar, B. 2007. Trojan detection using IC fingerprinting. In Proceedings of Symposium on Security and Privacy, 296-310.
-
(2007)
Proceedings of Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
|