-
1
-
-
78650062267
-
-
Version 1.4. Symantec Security Response, Cupertino
-
Falliere, N., Murchu, L.O., Chien, E.: W32.Stuxnet Dossier, Version 1.4. Symantec Security Response, Cupertino (2011)
-
(2011)
W32.Stuxnet Dossier
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
2
-
-
84876380168
-
-
Version 1.4. Symantec Security Response, Mountain View
-
W32.Duqu - The precursor to the next Stuxnet, Version 1.4. Symantec Security Response, Mountain View (2011)
-
(2011)
W32.Duqu - The Precursor to the Next Stuxnet
-
-
-
5
-
-
39049138889
-
Performance Aspects of PROFINET IO
-
Kleines, H., Detert, S., Drochner, M., Suxdorf, F.: Performance Aspects of PROFINET IO. Proc. of the IEEE Transactions on Nuclear Science 55, 290-294 (2008)
-
(2008)
Proc. of the IEEE Transactions on Nuclear Science
, vol.55
, pp. 290-294
-
-
Kleines, H.1
Detert, S.2
Drochner, M.3
Suxdorf, F.4
-
6
-
-
37549037774
-
PLC Communication using PROFINET: Experimental Results and Analysis
-
IEEE
-
Antolovic, M., Acton, K., Kalappa, N., Mantri, S., Parrott, J., Luntz, J.E., Moyne, J.R., Tilbury, D.M.: PLC Communication using PROFINET: Experimental Results and Analysis. In: Proc. of the 11th IEEE Intl. Conf. on Emerging Technologies and Factory Automation (ETFA 2006). IEEE (2006)
-
(2006)
Proc. of the 11th IEEE Intl. Conf. on Emerging Technologies and Factory Automation (ETFA 2006)
-
-
Antolovic, M.1
Acton, K.2
Kalappa, N.3
Mantri, S.4
Parrott, J.5
Luntz, J.E.6
Moyne, J.R.7
Tilbury, D.M.8
-
9
-
-
70350453950
-
Exploring Network Security in PROFIsafe
-
Buth, B., Rabe, G., Seyfarth, T. (eds.) SAFECOMP 2009. Springer, Heidelberg
-
Åkerberg, J., Björkman, M.: Exploring Network Security in PROFIsafe. In: Buth, B., Rabe, G., Seyfarth, T. (eds.) SAFECOMP 2009. LNCS, vol. 5775, pp. 67-80. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5775
, pp. 67-80
-
-
Åkerberg, J.1
Björkman, M.2
-
11
-
-
80655139034
-
Using Automatic Topology Discovery to Diagnose PROFINET Networks
-
IEEE
-
Jäger, M., Just, R., Niggemann, O.: Using Automatic Topology Discovery to Diagnose PROFINET Networks. In: Proc. of the 16th IEEE Intl. Conf. on Emerging Technologies and Factory Automation (ETFA 2011), pp. 1-4. IEEE (2011)
-
(2011)
Proc. of the 16th IEEE Intl. Conf. on Emerging Technologies and Factory Automation (ETFA 2011)
, pp. 1-4
-
-
Jäger, M.1
Just, R.2
Niggemann, O.3
-
14
-
-
50649107305
-
Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)
-
IEEE
-
Verba, J., Milvich, M.: Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS). In: Proc. of the IEEE Conf. on Technologies for Homeland Security (THS 2008), pp. 469-473. IEEE (2008)
-
(2008)
Proc. of the IEEE Conf. on Technologies for Homeland Security (THS 2008)
, pp. 469-473
-
-
Verba, J.1
Milvich, M.2
-
15
-
-
77955015254
-
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept
-
Rome, E., Bloomfield, R. (eds.) CRITIS 2009. Springer, Heidelberg
-
Carcano, A., Fovino, I.N., Masera, M., Trombetta, A.: State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 138-150. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6027
, pp. 138-150
-
-
Carcano, A.1
Fovino, I.N.2
Masera, M.3
Trombetta, A.4
-
16
-
-
77954883964
-
Intrusion Detection in SCADA Networks
-
Stiller, B., De Turck, F. (eds.) AIMS 2010. Springer, Heidelberg
-
Barbosa, R.R.R., Pras, A.: Intrusion Detection in SCADA Networks. In: Stiller, B., De Turck, F. (eds.) AIMS 2010. LNCS, vol. 6155, pp. 163-166. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6155
, pp. 163-166
-
-
Barbosa, R.R.R.1
Pras, A.2
-
17
-
-
70449371464
-
Neural Network based Intrusion Detection System for critical infrastructures
-
IEEE
-
Linda, O., Vollmer, T., Manic, M.: Neural Network based Intrusion Detection System for critical infrastructures. In: Proc. of the Intl. Joint Conference on Neural Networks (IJCNN 2009), pp. 1827-1834. IEEE (2009)
-
(2009)
Proc. of the Intl. Joint Conference on Neural Networks (IJCNN 2009)
, pp. 1827-1834
-
-
Linda, O.1
Vollmer, T.2
Manic, M.3
-
18
-
-
33847767196
-
Safeguarding SCADA Systems with Anomaly Detection
-
Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. Springer, Heidelberg
-
Bigham, J., Gamez, D., Lu, N.: Safeguarding SCADA Systems with Anomaly Detection. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 171-182. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2776
, pp. 171-182
-
-
Bigham, J.1
Gamez, D.2
Lu, N.3
-
19
-
-
79952527986
-
On SCADA Control System Command and Response Injection and Intrusion Detection
-
IEEE
-
Gao, W., Morris, T., Reaves, B., Richey, D.: On SCADA Control System Command and Response Injection and Intrusion Detection. In: Proc. of the Fifth eCrime Researchers Summit (eCrime 2010), pp. 1-9. IEEE (2010)
-
(2010)
Proc. of the Fifth ECrime Researchers Summit (ECrime 2010)
, pp. 1-9
-
-
Gao, W.1
Morris, T.2
Reaves, B.3
Richey, D.4
-
21
-
-
84866543673
-
Challenges and Opportunities in Securing Industrial Control Systems
-
IEEE
-
Hadziosmanović, D., Bolzoni, D., Etalle, S., Hartel, P.H.: Challenges and Opportunities in Securing Industrial Control Systems. In: Proc. of the IEEE Workshop on Complexity in Engineering (COMPENG 2012), pp. 1-6. IEEE (2012)
-
(2012)
Proc. of the IEEE Workshop on Complexity in Engineering (COMPENG 2012)
, pp. 1-6
-
-
Hadziosmanović, D.1
Bolzoni, D.2
Etalle, S.3
Hartel, P.H.4
-
22
-
-
84867893847
-
N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols
-
Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. Springer, Heidelberg
-
Hadžiosmanović, D., Simionato, L., Bolzoni, D., Zambon, E., Etalle, S.: N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 354-373. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7462
, pp. 354-373
-
-
Hadžiosmanović, D.1
Simionato, L.2
Bolzoni, D.3
Zambon, E.4
Etalle, S.5
-
23
-
-
84879610439
-
Towards learning normality for anomaly detection in industrial control networks
-
Doyen, G.,Waldburger, M., Celeda, P., Sperotto, A., Stiller, B. (eds.) AIMS 2013. Springer, Heidelberg
-
Schuster, F., Paul, A., König, H.: Towards learning normality for anomaly detection in industrial control networks. In: Doyen, G.,Waldburger, M., Celeda, P., Sperotto, A., Stiller, B. (eds.) AIMS 2013. LNCS, vol. 7943, pp. 62-73. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7943
, pp. 62-73
-
-
Schuster, F.1
Paul, A.2
König, H.3
|