-
1
-
-
78249237761
-
Network traffic analysis and SCADA security
-
P Stavroulakis, M. Stamp, Springer New York
-
AN Mahmood, C Leckie, J Hu, Z Tari, and M. Atiquzzaman Network traffic analysis and SCADA security P Stavroulakis, M. Stamp, Handbook on information and communication security 2010 Springer New York 383 405
-
(2010)
Handbook on Information and Communication Security
, pp. 383-405
-
-
Mahmood, A.N.1
Leckie, C.2
Hu, J.3
Tari, Z.4
Atiquzzaman, M.5
-
2
-
-
83555176227
-
Development of an automatic subsea blowout preventer stack control system using PLC based SCADA
-
B Cai, Y Liu, Z Liu, F Wang, X Tian, and Y. Zhang Development of an automatic subsea blowout preventer stack control system using PLC based SCADA ISA Transactions 51 2012 198 207
-
(2012)
ISA Transactions
, vol.51
, pp. 198-207
-
-
Cai, B.1
Liu, Y.2
Liu, Z.3
Wang, F.4
Tian, X.5
Zhang, Y.6
-
3
-
-
31644450516
-
Mobile phone based SCADA for industrial automation
-
E Ozdemir, and M. Karacor Mobile phone based SCADA for industrial automation ISA Transactions 45 1 2006 67 75
-
(2006)
ISA Transactions
, vol.45
, Issue.1
, pp. 67-75
-
-
Ozdemir, E.1
Karacor, M.2
-
4
-
-
80052113604
-
Proposal strategies of key management for data encryption in SCADA network of electric power systems
-
D Kang, J Lee, B Kim, and D. Hur Proposal strategies of key management for data encryption in SCADA network of electric power systems International Journal of Electrical Power & Energy Systems 33 9 2011 1521 1526
-
(2011)
International Journal of Electrical Power & Energy Systems
, vol.33
, Issue.9
, pp. 1521-1526
-
-
Kang, D.1
Lee, J.2
Kim, B.3
Hur, D.4
-
5
-
-
77949276621
-
An efficient key management scheme for secure SCADA communication
-
S Lee, D Choi, C Park, and S. Kim An efficient key management scheme for secure SCADA communication World Academy of Science, Engineering and Technology 35 2008 457 463
-
(2008)
World Academy of Science, Engineering and Technology
, vol.35
, pp. 457-463
-
-
Lee, S.1
Choi, D.2
Park, C.3
Kim, S.4
-
6
-
-
16244381179
-
A failure to communicate: Next generation communication requirements, technologies, and architecture for the electric power grid
-
CH Hauser, DE Bakken, and A. Bose A failure to communicate: next generation communication requirements, technologies, and architecture for the electric power grid IEEE Power and Energy Magazine 3 2 2005 47 55
-
(2005)
IEEE Power and Energy Magazine
, vol.3
, Issue.2
, pp. 47-55
-
-
Hauser, C.H.1
Bakken, D.E.2
Bose, A.3
-
10
-
-
73849140062
-
A trust system architecture for SCADA network security
-
GM Coates, KM Hopkinson, SR Graham, and SH. Kurkowski A trust system architecture for SCADA network security IEEE Transactions on Power Delivery 25 1 2010 158 169
-
(2010)
IEEE Transactions on Power Delivery
, vol.25
, Issue.1
, pp. 158-169
-
-
Coates, G.M.1
Hopkinson, K.M.2
Graham, S.R.3
Kurkowski, S.H.4
-
11
-
-
80055032029
-
AGA 12 recommends how to protect SCADA communications from cyber attack
-
WF Rush, JA Kinast, and AB. Shah AGA 12 recommends how to protect SCADA communications from cyber attack Pipeline & Gas Journal 2011 40 42
-
(2011)
Pipeline & Gas Journal
, pp. 40-42
-
-
Rush, W.F.1
Kinast, J.A.2
Shah, A.B.3
-
12
-
-
79955901537
-
High-performance modular exponentiation algorithm by using a new modified modular multiplication algorithm and common-multiplicand-multiplication method
-
February
-
Rezai A, Keshavarzi P. High-performance modular exponentiation algorithm by using a new modified modular multiplication algorithm and common-multiplicand-multiplication method. In: Proceedings of the IEEE world congress on internet security. February 2011. p. 192-97.
-
(2011)
Proceedings of the IEEE World Congress on Internet Security
, pp. 192-197
-
-
Rezai, A.1
Keshavarzi, P.2
-
14
-
-
84872800478
-
SKMA, a key management architecture for SCADA systems
-
January
-
Dawson R, Boyd C, Dawson E, Nieto J. SKMA, a key management architecture for SCADA systems. In: Proceedings of the fourth Australasian information security workshop. January 2006. p. 138-92.
-
(2006)
Proceedings of the Fourth Australasian Information Security Workshop
, pp. 138-192
-
-
Dawson, R.1
Boyd, C.2
Dawson, E.3
Nieto, J.4
-
16
-
-
67650661171
-
Advanced key management architecture for SCADA communications
-
D Choi, H Kim, D Won, and S. Kim Advanced key management architecture for SCADA communications IEEE Transactions on Power Delivery 24 3 2009 1154 1163
-
(2009)
IEEE Transactions on Power Delivery
, vol.24
, Issue.3
, pp. 1154-1163
-
-
Choi, D.1
Kim, H.2
Won, D.3
Kim, S.4
-
17
-
-
77950187346
-
Efficient secure group communications for SCADA
-
D Choi, S Lee, D Won, and S. Kim Efficient secure group communications for SCADA IEEE Transactions on Power Delivery 25 2 2010 714 722
-
(2010)
IEEE Transactions on Power Delivery
, vol.25
, Issue.2
, pp. 714-722
-
-
Choi, D.1
Lee, S.2
Won, D.3
Kim, S.4
-
18
-
-
84876252922
-
Hybrid key management architecture for robust SCADA systems
-
D. Choi, H. Jeong, D. Won, and S. Kim Hybrid key management architecture for robust SCADA systems Journal of Information Science and Engineering 29 2 2013 281 298
-
(2013)
Journal of Information Science and Engineering
, vol.29
, Issue.2
, pp. 281-298
-
-
Choi, D.1
Jeong, H.2
Won, D.3
Kim, S.4
-
20
-
-
34548017452
-
Cyber security risk assessment for SCADA and DCS networks
-
P Ralston, J Graham, and J. Hieb Cyber security risk assessment for SCADA and DCS networks ISA Transactions 46 2007 583 594
-
(2007)
ISA Transactions
, vol.46
, pp. 583-594
-
-
Ralston, P.1
Graham, J.2
Hieb, J.3
-
22
-
-
33750391626
-
Low-latency cryptographic protection for SCADA communications
-
Andrew K, John A, Joe M., Low-latency cryptographic protection for SCADA communications. In: Proceedings of second applied cryptography and network security, lecture notes in computer science 3089. (2004). p 263-77.
-
(2004)
Proceedings of Second Applied Cryptography and Network Security, Lecture Notes in Computer Science
, vol.3089
, pp. 263-277
-
-
Andrew, K.1
John, A.2
Joe, M.3
-
26
-
-
84879885588
-
-
September
-
Crypto++ 5.6 benchmarks. September 2012; 〈http://www.cryptopp.com/ benchmarks.html〉. Online.
-
(2012)
Crypto++ 5.6 Benchmarks
-
-
-
28
-
-
84879883168
-
CCS Representation: A new non-adjacent form and its application in ECC
-
A Rezai, and P. Keshavarzi CCS Representation: a new non-adjacent form and its application in ECC Journal of Basic and Applied Scientific Research 2 5 2012 4577 4586
-
(2012)
Journal of Basic and Applied Scientific Research
, vol.2
, Issue.5
, pp. 4577-4586
-
-
Rezai, A.1
Keshavarzi, P.2
|