-
1
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
Bellovin S. Security problems in the TCP/IP protocol suite. ACM SIGCOMM Computer Communication Review 1989, 19(2):32-48.
-
(1989)
ACM SIGCOMM Computer Communication Review
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.1
-
2
-
-
78549288504
-
Detection, correlation and visualization of attacks against critical infrastructure systems
-
L. Briesemeister, S. Cheung, U. Lindqvist, A. Valdes, Detection, correlation and visualization of attacks against critical infrastructure systems, in: Proceedings of the Eighth International Conference on Privacy, Security and Trust, 2010, pp. 17-19.
-
(2010)
Proceedings of the Eighth International Conference on Privacy, Security and Trust
, pp. 17-19
-
-
Briesemeister, L.1
Cheung, S.2
Lindqvist, U.3
Valdes, A.4
-
3
-
-
78349299834
-
Stuxnet, the real start of cyber warfare?
-
Chen T. Stuxnet, the real start of cyber warfare?. IEEE Network 2010, 24(6):2-3.
-
(2010)
IEEE Network
, vol.24
, Issue.6
, pp. 2-3
-
-
Chen, T.1
-
4
-
-
70350634504
-
Using model-based intrusion detection for SCADA networks
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, A. Valdes, Using model-based intrusion detection for SCADA networks, in: Proceedings of the SCADA Security Scientific Symposium, 2007, pp. 127-134.
-
(2007)
Proceedings of the SCADA Security Scientific Symposium
, pp. 127-134
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
5
-
-
84879786722
-
-
Core Security Technologies, What is Impacket? Buenos Aires, Argentina, 〈〉
-
Core Security Technologies, What is Impacket? Buenos Aires, Argentina, 〈〉, 2003. http://oss.coresecurity.com/projects/impacket.html.
-
(2003)
-
-
-
6
-
-
84879782808
-
-
Core Security Technologies, What is Pcapy? Buenos Aires, Argentina, 〈〉
-
Core Security Technologies, What is Pcapy? Buenos Aires, Argentina, 〈〉, 2010. http://oss.coresecurity.com/projects/pcapy.html.
-
(2010)
-
-
-
7
-
-
84879784682
-
-
Digital Bond, Modbus TCP Rules, Sunrise, Florida, 〈〉.
-
Digital Bond, Modbus TCP Rules, Sunrise, Florida, 〈〉. http://www.digitalbond.com/tools/quickdraw/modbus-tcp-rules.
-
-
-
-
8
-
-
79952527986
-
On SCADA control system command and response injection and intrusion detection, presented at the eCrime Researchers Summit
-
W. Gao, T. Morris, B. Reaves, D. Richey, On SCADA control system command and response injection and intrusion detection, presented at the eCrime Researchers Summit, 2010.
-
(2010)
-
-
Gao, W.1
Morris, T.2
Reaves, B.3
Richey, D.4
-
9
-
-
84866399058
-
A cyber-physical experimentation environment for the security analysis of networked industrial control systems
-
Genge B., Siaterlis C., Nai Fovino I., Masera M. A cyber-physical experimentation environment for the security analysis of networked industrial control systems. Computers and Electrical Engineering 2012, 38(5):1146-1161.
-
(2012)
Computers and Electrical Engineering
, vol.38
, Issue.5
, pp. 1146-1161
-
-
Genge, B.1
Siaterlis, C.2
Nai Fovino, I.3
Masera, M.4
-
10
-
-
77954796687
-
A testbed for secure and robust SCADA systems
-
Article no. 4
-
Giani A., Karsai G., Roosta T., Shah A., Sinopoli B., Wiley J. A testbed for secure and robust SCADA systems. ACM SIGBED Review 2008, 5(2):4. Article no. 4.
-
(2008)
ACM SIGBED Review
, vol.5
, Issue.2
, pp. 4
-
-
Giani, A.1
Karsai, G.2
Roosta, T.3
Shah, A.4
Sinopoli, B.5
Wiley, J.6
-
11
-
-
78349259735
-
Development of the PowerCyber SCADA security testbed
-
article no. 21
-
A. Hahn, B. Kregel, M. Govindarasu, J. Fitzpatrick, R. Adnan, S. Sridhar, M. Higdon, Development of the PowerCyber SCADA security testbed, in: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, article no. 21, 2010.
-
(2010)
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
-
-
Hahn, A.1
Kregel, B.2
Govindarasu, M.3
Fitzpatrick, J.4
Adnan, R.5
Sridhar, S.6
Higdon, M.7
-
13
-
-
79957979992
-
A testbed for analyzing security of SCADA control systems (TASSCS)
-
M. Mallouhi, Y. Al-Nashif, D. Cox, T. Chadaga, S. Hariri, A testbed for analyzing security of SCADA control systems (TASSCS), in: Proceedings of the IEEE Innovative Smart Grid Technologies Conference, 2011.
-
(2011)
Proceedings of the IEEE Innovative Smart Grid Technologies Conference
-
-
Mallouhi, M.1
Al-Nashif, Y.2
Cox, D.3
Chadaga, T.4
Hariri, S.5
-
14
-
-
84879786668
-
-
Modbus-IDA, Modbus Messaging on TCP/IP Implementation Guide V1.0b, Hopkinton, Massachusetts 〈〉
-
Modbus-IDA, Modbus Messaging on TCP/IP Implementation Guide V1.0b, Hopkinton, Massachusetts 〈〉, 2006. http://www.modbus.org/docs/Modbus_Messaging_Implementation_Guide_V1_0b.pdf.
-
(2006)
-
-
-
15
-
-
85116480404
-
Configurable middleware-level intrusion detection for embedded systems
-
E. Naess, D. Frincke, A. McKinnon, D. Bakken, Configurable middleware-level intrusion detection for embedded systems, in: Proceedings of the Twenty-Fifth IEEE International Conference on Distributed Computing Systems, 2005, pp. 144-151.
-
(2005)
Proceedings of the Twenty-Fifth IEEE International Conference on Distributed Computing Systems
, pp. 144-151
-
-
Naess, E.1
Frincke, D.2
McKinnon, A.3
Bakken, D.4
-
16
-
-
77954330725
-
Modbus/DNP3 state-based intrusion detection system
-
I. Nai Fovino, A. Carcano, T. De Lacheze Murel, A. Trombetta, M. Masera, Modbus/DNP3 state-based intrusion detection system, in: Proceedings of the Twenty-Fourth IEEE International Conference on Advanced Information Networking and Applications, 2010, pp. 729-736.
-
(2010)
Proceedings of the Twenty-Fourth IEEE International Conference on Advanced Information Networking and Applications
, pp. 729-736
-
-
Nai Fovino, I.1
Carcano, A.2
De Lacheze Murel, T.3
Trombetta, A.4
Masera, M.5
-
18
-
-
84879783098
-
-
SRI International, Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD), Menlo Park, California 〈〉.
-
SRI International, Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD), Menlo Park, California 〈〉. http://www.csl.sri.com/projects/emerald.
-
-
-
-
19
-
-
33847299487
-
Multi-agent intrusion detection system for an industrial network using ant colony clustering approach and unsupervised feature extraction
-
C. Tsang, S. Kwong, Multi-agent intrusion detection system for an industrial network using ant colony clustering approach and unsupervised feature extraction, in: Proceedings of the IEEE International Conference on Industrial Technology, 2005, pp. 51-56.
-
(2005)
Proceedings of the IEEE International Conference on Industrial Technology
, pp. 51-56
-
-
Tsang, C.1
Kwong, S.2
-
22
-
-
77953170814
-
A simulation environment for SCADA security analysis and assessment
-
C. Wang, L. Fang, Y. Dai, A simulation environment for SCADA security analysis and assessment, in: Proceedings of the International Conference on Measuring Technology and Mechatronics, vol. 1, 2010, pp. 342-347.
-
(2010)
Proceedings of the International Conference on Measuring Technology and Mechatronics
, vol.1
, pp. 342-347
-
-
Wang, C.1
Fang, L.2
Dai, Y.3
-
23
-
-
34047126237
-
Anomaly-based intrusion detection for SCADA systems
-
D. Yang, A. Usynin, J. Hines, Anomaly-based intrusion detection for SCADA systems, in: Proceedings of the Fifth International Topical Meeting on Nuclear Plant Instrumentation, Control and Human-Machine Interface Technologies, 2006, pp. 12-16.
-
(2006)
Proceedings of the Fifth International Topical Meeting on Nuclear Plant Instrumentation, Control and Human-Machine Interface Technologies
, pp. 12-16
-
-
Yang, D.1
Usynin, A.2
Hines, J.3
|