-
2
-
-
84866543673
-
Challenges and Opportunities in Securing Industrial Control Systems
-
IEEE
-
Hadziosmanović, D., Bolzoni, D., Etalle, S., Hartel, P.H.: Challenges and Opportunities in Securing Industrial Control Systems. In: Proc. of the IEEE Workshop on Complexity in Engineering (COMPENG 2012). IEEE (2012)
-
(2012)
Proc. of the IEEE Workshop on Complexity in Engineering (COMPENG 2012)
-
-
Hadziosmanović, D.1
Bolzoni, D.2
Etalle, S.3
Hartel, P.H.4
-
3
-
-
77954883964
-
Intrusion Detection in SCADA Networks
-
Stiller, B., De Turck, F. (eds.) AIMS 2010 Springer, Heidelberg
-
Barbosa, R.R.R., Pras, A.: Intrusion Detection in SCADA Networks. In: Stiller, B., De Turck, F. (eds.) AIMS 2010. LNCS, vol. 6155, pp. 163-166. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6155
, pp. 163-166
-
-
Barbosa, R.R.R.1
Pras, A.2
-
4
-
-
84861978550
-
Real-Time and Resilient Intrusion Detection: A Flow-Based Approach
-
Sadre, R., Novotný, J., Čeleda, P., Waldburger, M., Stiller, B. (eds.) AIMS 2012 Springer, Heidelberg
-
Hofstede, R., Pras, A.: Real-Time and Resilient Intrusion Detection: A Flow-Based Approach. In: Sadre, R., Novotný, J., Čeleda, P., Waldburger, M., Stiller, B. (eds.) AIMS 2012. LNCS, vol. 7279, pp. 109-112. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7279
, pp. 109-112
-
-
Hofstede, R.1
Pras, A.2
-
5
-
-
84859034021
-
Difficulties in Modeling SCADA Traffic: A Comparative Analysis
-
Taft, N., Ricciato, F. (eds.) PAM 2012 Springer, Heidelberg
-
Barbosa, R.R., Sadre, R., Pras, A.: Difficulties in Modeling SCADA Traffic: A Comparative Analysis. In: Taft, N., Ricciato, F. (eds.) PAM 2012. LNCS, vol. 7192, pp. 126-135. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7192
, pp. 126-135
-
-
Barbosa, R.R.1
Sadre, R.2
Pras, A.3
-
8
-
-
79952527986
-
On SCADA Control System Command and Response Injection and Intrusion Detection
-
IEEE
-
Gao, W., Morris, T., Reaves, B., Richey, D.: On SCADA Control System Command and Response Injection and Intrusion Detection. In: Proc. of the Fifth eCrime Researchers Summit, pp. 1-9. IEEE (2010)
-
(2010)
Proc. of the Fifth ECrime Researchers Summit
, pp. 1-9
-
-
Gao, W.1
Morris, T.2
Reaves, B.3
Richey, D.4
-
9
-
-
71649109185
-
An Experimental Investigation of Malware Attacks on SCADA Systems
-
Nai Fovino, I., Carcano, A., Masera, M., Trombetta, A.: An Experimental Investigation of Malware Attacks on SCADA Systems. Intl. Journal of Critical Infrastructure Protection 2(4), 139-145 (2009)
-
(2009)
Intl. Journal of Critical Infrastructure Protection
, vol.2
, Issue.4
, pp. 139-145
-
-
Nai Fovino, I.1
Carcano, A.2
Masera, M.3
Trombetta, A.4
-
11
-
-
84867893847
-
N-Gram Against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols
-
Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012 Springer, Heidelberg
-
Hadziosmanović, D., Simionato, L., Bolzoni, D., Zambon, E., Etalle, S.: N-Gram Against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 354-373. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7462
, pp. 354-373
-
-
Hadziosmanović, D.1
Simionato, L.2
Bolzoni, D.3
Zambon, E.4
Etalle, S.5
-
12
-
-
33745163595
-
Learning intrusion detection: Supervised or unsupervised?
-
DOI 10.1007/11553595-6, Image Analysis and Processing - ICIAP 2005, 13th International Conference, Proceedings
-
Laskov, P., Düssel, P., Schäfer, C., Rieck, K.: Learning Intrusion Detection: Supervised or Unsupervised? In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, vol. 3617, pp. 50-57. Springer, Heidelberg (2005) (Pubitemid 43901959)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3617 LNCS
, pp. 50-57
-
-
Laskov, P.1
Dussel, P.2
Schafer, C.3
Rieck, K.4
-
13
-
-
77955015254
-
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept
-
Rome, E., Bloomfield, R. (eds.) CRITIS 2009 Springer, Heidelberg
-
Carcano, A., Fovino, I.N., Masera, M., Trombetta, A.: State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 138-150. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6027
, pp. 138-150
-
-
Carcano, A.1
Fovino, I.N.2
Masera, M.3
Trombetta, A.4
-
14
-
-
79955867639
-
A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems
-
Carcano, A., Coletta, A., Guglielmi, M., Masera, M., Fovino, I.N., Trombetta, A.: A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems. IEEE Trans. on Industrial Informatics 7(2), 179-186 (2011)
-
(2011)
IEEE Trans. on Industrial Informatics
, vol.7
, Issue.2
, pp. 179-186
-
-
Carcano, A.1
Coletta, A.2
Guglielmi, M.3
Masera, M.4
Fovino, I.N.5
Trombetta, A.6
-
15
-
-
84891760516
-
Detecting Anomalies in Process Control Networks
-
Palmer, C., Shenoi, S. (eds.) Critical Infrastructure Protection III Springer, Heidelberg
-
Rrushi, J., Kang, K.D.: Detecting Anomalies in Process Control Networks. In: Palmer, C., Shenoi, S. (eds.) Critical Infrastructure Protection III. IFIP AICT, vol. 311, pp. 151-165. Springer, Heidelberg (2009)
-
(2009)
IFIP AICT
, vol.311
, pp. 151-165
-
-
Rrushi, J.1
Kang, K.D.2
-
16
-
-
70449371464
-
Neural Network based Intrusion Detection System for Critical Infrastructures
-
IEEE
-
Linda, O., Vollmer, T., Manic, M.: Neural Network based Intrusion Detection System for Critical Infrastructures. In: Proc. of the 2009 Intl. Joint Conf. on Neural Networks (IJCNN 2009), pp. 1827-1834. IEEE (2009)
-
(2009)
Proc. of the 2009 Intl. Joint Conf. on Neural Networks (IJCNN 2009)
, pp. 1827-1834
-
-
Linda, O.1
Vollmer, T.2
Manic, M.3
-
17
-
-
34047126237
-
Anomaly-based Intrusion Detection for SCADA Systems
-
Curran Associates
-
Yang, D., Usynin, A., Hines, J.W.: Anomaly-based Intrusion Detection for SCADA Systems. In: Proc of the Fifth Intl. Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC/HMIT 2006), pp. 12-16. Curran Associates (2006)
-
(2006)
Proc of the Fifth Intl. Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC/HMIT 2006)
, pp. 12-16
-
-
Yang, D.1
Usynin, A.2
Hines, J.W.3
-
18
-
-
84879631395
-
-
Snort 2.9.4
-
Snort: Snort 2.9.4, http://www.snort.org
-
-
-
-
19
-
-
84879673682
-
Ethernet-based Real-time Communications with PROFINET IO
-
World Scientific and Engineering Academy and Society, WSEAS
-
Neumann, P., Pöschmann, A.: Ethernet-based Real-time Communications with PROFINET IO. In: Proc. of the Seventh WSEAS Intl. Conf. on Automatic Control, Modeling and Simulation (ACMOS 2005), pp. 54-61. World Scientific and Engineering Academy and Society, WSEAS (2005)
-
(2005)
Proc. of the Seventh WSEAS Intl. Conf. on Automatic Control, Modeling and Simulation (ACMOS 2005)
, pp. 54-61
-
-
Neumann, P.1
Pöschmann, A.2
-
20
-
-
0003408420
-
-
MIT Press, Cambridge
-
Schölkopf, B., Smola, A.J.: Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond. MIT Press, Cambridge (2001)
-
(2001)
Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond
-
-
Schölkopf, B.1
Smola, A.J.2
-
22
-
-
0141688369
-
Discretization: An Enabling Technique
-
Liu, H., Hussain, F., Tan, C.L., Dash, M.: Discretization: An Enabling Technique. Data Mining and Knowledge Discovery 6(4), 393-423 (2002)
-
(2002)
Data Mining and Knowledge Discovery
, vol.6
, Issue.4
, pp. 393-423
-
-
Liu, H.1
Hussain, F.2
Tan, C.L.3
Dash, M.4
-
23
-
-
77949294775
-
Study on Comparison of Discretization Methods
-
IEEE
-
Peng, L., Qing, W., Yujia, G.: Study on Comparison of Discretization Methods. In: Proc. of the Intl. Conf. on Artificial Intelligence and Computational Intelligence, AICI 2009. IEEE (2009)
-
(2009)
Proc. of the Intl. Conf. on Artificial Intelligence and Computational Intelligence, AICI 2009
-
-
Peng, L.1
Qing, W.2
Yujia, G.3
-
24
-
-
84879633390
-
Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IO
-
Accepted for the
-
Paul, A., Schuster, F., König, H.: Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IO. Accepted for the 10th Conf. on Detection of Intrusions and Malware and Vulnerability Assessment, DIMVA 2013 (2013)
-
(2013)
10th Conf. on Detection of Intrusions and Malware and Vulnerability Assessment, DIMVA 2013
-
-
Paul, A.1
Schuster, F.2
König, H.3
|