-
1
-
-
84858277398
-
Tinker tailor, soldier duqu: Why cyberespionage is more dangerous than you think
-
D. Fidler, 'Tinker, Tailor, Soldier, Duqu: Why cyberespionage is more dangerous than you think, " International Journal of Critical Infrastructure Protection, vol. 5, no. I, pp. 28-29, 2012.
-
(2012)
International Journal of Critical Infrastructure Protection
, vol.5
, Issue.1
, pp. 28-29
-
-
Fidler, D.1
-
2
-
-
84870338599
-
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems
-
B. Reaves and T. Morris, ''Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems;' International Journal of Critical Infrastructure Protection, vol. 5, no. 34, pp. 154-174, 2012.
-
(2012)
International Journal of Critical Infrastructure Protection
, vol.5
, Issue.34
, pp. 154-174
-
-
Reaves, B.1
Morris, T.2
-
3
-
-
71649109185
-
An experimental investigation of malware attacks on SCADA systems
-
I. Nai Fovino, A. Carcano, M. Masera, and A. Trombetta, ''An experimental investigation of malware attacks on SCADA systems, " International Journal of Critical Infrastructure Protection, vol. 2, no. 4, pp. 139-145, 2009.
-
(2009)
International Journal of Critical Infrastructure Protection
, vol.2
, Issue.4
, pp. 139-145
-
-
Nai Fovino, I.1
Carcano, A.2
Masera, M.3
Trombetta, A.4
-
4
-
-
79953895474
-
Lessons from stuxnet
-
april
-
T. Chen and S. Abu-Nimeh, ''Lessons from Stuxnet, " Computer, vol. 44, no. 4, pp. 91-93, april 2011.
-
(2011)
Computer
, vol.44
, Issue.4
, pp. 91-93
-
-
Chen, T.1
Abu-Nimeh, S.2
-
5
-
-
84886066025
-
Towards anomaly detection in scada networks using connection patterns
-
E. Pleijsier, 'Towards anomaly detection in scada networks using connection patterns, " in 18th Twente Student Conference on IT, 2013.
-
(2013)
18th Twente Student Conference on IT
-
-
Pleijsier, E.1
-
6
-
-
84876347107
-
Towards periodicity based anomaly detection in SCADA networks
-
R. Barbosa, R. Sadre, and A. Pras, ' Towards periodicity based anomaly detection in SCADA networks, " in 17th IEEE Conference on Emerging Technologies & Factory Automation (ETFA 2012), 2012, pp. 1-4.
-
(2012)
17th IEEE Conference on Emerging Technologies & Factory Automation (ETFA 2012)
, pp. 1-4
-
-
Barbosa, R.1
Sadre, R.2
Pras, A.3
-
7
-
-
84876401574
-
A method to construct network traffic models for process control systems
-
I. Garitano, C. Siaterlis, B. Genge, R. Uribeetxeberria, and U. Zurutuza, ''A method to construct network traffic models for process control systems, " in 17th IEEE Conference on Emerging Technologies & Factory Automation (ETFA 2012), 2012, pp. 1-8.
-
(2012)
17th IEEE Conference on Emerging Technologies & Factory Automation (ETFA 2012)
, pp. 1-8
-
-
Garitano, I.1
Siaterlis, C.2
Genge, B.3
Uribeetxeberria, R.4
Zurutuza, U.5
-
8
-
-
84856339254
-
Using physical models for anomaly detection in control systems
-
C. Palmer and S. Shenoi, Eds. Springer Berlin Heidelberg
-
N. Svendsen and S. Wolthusen, "Using physical models for anomaly detection in control systems, " in Critical Infrastructure Protection Ill, ser. IFlP Advances in Information and Communication Technology, C. Palmer and S. Shenoi, Eds. Springer Berlin Heidelberg, 2009, vol. 311, pp. 139-149.
-
(2009)
Critical Infrastructure Protection Ill, Ser. IFlP Advances in Information and Communication Technology
, vol.311
, pp. 139-149
-
-
Svendsen, N.1
Wolthusen, S.2
-
9
-
-
55549120913
-
Modeling and detecting anomalies in scada systems
-
M. Papa and S. Shenoi, Eds. Springer US
-
N. Svendsen and S. Wolthusen, ''Modeling and detecting anomalies in scada systems, " in Critical Infrastructure Protection II, ser. The International Federation for Information Processing, M. Papa and S. Shenoi, Eds. Springer US, 2009, vol. 290, pp. 101-113.
-
(2009)
Critical Infrastructure Protection II, Ser. The International Federation for Information Processing
, vol.290
, pp. 101-113
-
-
Svendsen, N.1
Wolthusen, S.2
-
10
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, and response
-
New York, NY, USA: ACM
-
A. A. Cardenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry, ''Attacks against process control systems: risk assessment, detection, and response, " in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS '11. New York, NY, USA: ACM, 2011, pp. 355-366.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Ser. ASIACCS '11
, pp. 355-366
-
-
Cardenas, A.A.1
Amin, S.2
Lin, Z.-S.3
Huang, Y.-L.4
Huang, C.-Y.5
Sastry, S.6
-
11
-
-
84860491228
-
Critical statebased filtering system for securing scada network protocols
-
I. Nai Fovino, A. Coletta, A. Carcano, and M. Masera, "Critical statebased filtering system for securing scada network protocols, " Industrial Electronics, IEEE Transactions on, vol. 59, no. 10, pp. 3943-3950, 2012.
-
(2012)
Industrial Electronics, IEEE Transactions on
, vol.59
, Issue.10
, pp. 3943-3950
-
-
Nai Fovino, I.1
Coletta, A.2
Carcano, A.3
Masera, M.4
-
12
-
-
79955867639
-
A multidimensional critical state analysis for detecting intrusions in scada systems
-
A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. Fovino, and A. Trombetta, ''A multidimensional critical state analysis for detecting intrusions in scada systems;' Industrial Informatics, IEEE Transactions on, vol. 7, no. 2, pp. 179-186, 2011.
-
(2011)
Industrial Informatics, IEEE Transactions on
, vol.7
, Issue.2
, pp. 179-186
-
-
Carcano, A.1
Coletta, A.2
Guglielmi, M.3
Masera, M.4
Fovino, I.5
Trombetta, A.6
-
13
-
-
77954330725
-
Modbusldnp3 state-based intrusion detection system
-
I. Nai Fovino, A. Carcano, T. De Lacheze Murel, A. Trombetta, and M. Masera, ''Modbusldnp3 state-based intrusion detection system, " in Advanced Information Networking and Applications (AlNA), 2010 24th IEEE International Conference on, 2010, pp. 729-736.
-
(2010)
Advanced Information Networking and Applications (AlNA), 2010 24th IEEE International Conference on
, pp. 729-736
-
-
Nai Fovino, I.1
Carcano, A.2
De Murel Lacheze, T.3
Trombetta, A.4
Masera, M.5
-
17
-
-
0012882330
-
Theory of evidence-A survey of its mathematical foundations, applications and computational analysis
-
J. Kohlas and P. Monney, 'Theory of evidence-a survey of its mathematical foundations, applications and computational analysis, " ZOR-Mathematical Methods of Operations Research, vol. 39, pp. 35-68, 1994.
-
(1994)
ZOR-Mathematical Methods of Operations Research
, vol.39
, pp. 35-68
-
-
Kohlas, J.1
Monney, P.2
-
19
-
-
84866399058
-
A cyber-physical experimentation environment for the security analysis of networked industrial control systems
-
B. Genge, C. Siaterlis, I. Nai Fovino, and M. Masera, ' 'A cyber-physical experimentation environment for the security analysis of networked industrial control systems, " Computers & Electrical Engineering, vol. 38, no. 5, pp. 1146-1161, 2012.
-
(2012)
Computers & Electrical Engineering
, vol.38
, Issue.5
, pp. 1146-1161
-
-
Genge, B.1
Siaterlis, C.2
Nai Fovino, I.3
Masera, M.4
-
20
-
-
84866375520
-
On the use of Emulab testbeds for scientifically rigorous experiments
-
C. Siaterlis, A. Garcia, and B. Genge, "On the use of Emulab testbeds for scientifically rigorous experiments, " IEEE Communications Surveys and Tutorials, vol. PP, no. 99, pp. 1-14, 2012.
-
(2012)
IEEE Communications Surveys and Tutorials
, Issue.99
, pp. 1-14
-
-
Siaterlis, C.1
Garcia, A.2
Genge, B.3
-
21
-
-
84978371883
-
An integrated experimental environment for distributed systems and networks
-
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Jogiekar, ''An integrated experimental environment for distributed systems and networks, " in Proceedings of the 5th Symposium on Operating Systems Design and Implementation, 2002, pp. 255-270.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
, pp. 255-270
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Jogiekar, A.9
-
23
-
-
0028369782
-
Emergency load shedding to avoid risks of voltage instability using indicators
-
feb
-
T. Than, J. Fandino, N. Hadjsaid, J. Sabonnadiere, and H. Vu, "Emergency load shedding to avoid risks of voltage instability using indicators, " Power Systems, IEEE Transactions on, vol. 9, no. 1, pp. 341-351, feb 1994.
-
(1994)
Power Systems, IEEE Transactions on
, vol.9
, Issue.1
, pp. 341-351
-
-
Than, T.1
Fandino, J.2
Hadjsaid, N.3
Sabonnadiere, J.4
Vu, H.5
-
24
-
-
16244374965
-
Modelling the load curve of aggregate electricity consumption using principal components
-
Nov.
-
M. Manera and A. Marzullo, ''Modelling the load curve of aggregate electricity consumption using principal components, " Environ. Model. Softw., vol. 20, no. 11, pp. 1389-1400, Nov. 2005.
-
(2005)
Environ. Model. Softw.
, vol.20
, Issue.11
, pp. 1389-1400
-
-
Manera, M.1
Marzullo, A.2
-
26
-
-
84863194412
-
Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC)
-
C. Deccio, "Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC), " International Journal of Critical Infrastructure Protection, vol. 5, no. 2, pp. 98-103, 2012.
-
(2012)
International Journal of Critical Infrastructure Protection
, vol.5
, Issue.2
, pp. 98-103
-
-
Deccio, C.1
-
27
-
-
84858290582
-
Analysis of the security of VPN configurations in industrial control environments
-
S. Rahimi and M. Zargham, ''Analysis of the security of VPN configurations in industrial control environments;' International Journal of Critical Infrastructure Protection, vol. 5, no. 1, pp. 3-13, 2012.
-
(2012)
International Journal of Critical Infrastructure Protection
, vol.5
, Issue.1
, pp. 3-13
-
-
Rahimi, S.1
Zargham, M.2
|