-
5
-
-
84876124711
-
Wide-Area Situational Awareness for Critical Infrastructure Protection
-
Alcaraz, C., Lopez, J.: Wide-Area Situational Awareness for Critical Infrastructure Protection. IEEE Computer 46(4), 30-37 (2013), http://doi.ieeecomputersociety.org/10.1109/MC.2013.72
-
(2013)
IEEE Computer
, vol.46
, Issue.4
, pp. 30-37
-
-
Alcaraz, C.1
Lopez, J.2
-
6
-
-
34249731961
-
Adaptive Real-Time Anomaly Detection with Incremental Clustering
-
Burbeck, K., Nadjm-Tehrani, S.: Adaptive Real-Time Anomaly Detection with Incremental Clustering. Information Security Technical Report 12(1), 56-67 (2007)
-
(2007)
Information Security Technical Report
, vol.12
, Issue.1
, pp. 56-67
-
-
Burbeck, K.1
Nadjm-Tehrani, S.2
-
8
-
-
67650679664
-
An Intrusion Detection System for Wireless Process Control Systems
-
IEEE
-
Roosta, T., Nilsson, D., Lindqvist, U., Valdes, A.: An Intrusion Detection System for Wireless Process Control Systems. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2008, pp. 866-872. IEEE (2008)
-
(2008)
5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2008
, pp. 866-872
-
-
Roosta, T.1
Nilsson, D.2
Lindqvist, U.3
Valdes, A.4
-
9
-
-
77955029557
-
Cyber-Critical Infrastructure Protection using Real-Time Payload-Based Anomaly Detection
-
Düssel, P., Gehl, C., Laskov, P., Bußer, J., Störmann, C., Kästner, J.: Cyber-Critical Infrastructure Protection using Real-Time Payload-Based Anomaly Detection. Critical Information Infrastructures Security, 85-97 (2010)
-
(2010)
Critical Information Infrastructures Security
, pp. 85-97
-
-
Düssel, P.1
Gehl, C.2
Laskov, P.3
Bußer, J.4
Störmann, C.5
Kästner, J.6
-
10
-
-
80052933495
-
High-Speed Intrusion Detection in Support of Critical Infrastructure Protection
-
D'Antonio, S., Oliviero, F., Setola, R.: High-Speed Intrusion Detection in Support of Critical Infrastructure Protection. Critical Information Infrastructures Security, 222-234 (2006)
-
(2006)
Critical Information Infrastructures Security
, pp. 222-234
-
-
D'Antonio, S.1
Oliviero, F.2
Setola, R.3
-
11
-
-
34047126237
-
Anomaly-based Intrusion Detection for SCADA Systems
-
Yang, D., Usynin, A., Hines, J.: Anomaly-based Intrusion Detection for SCADA Systems. In: 5th Intl. Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 2005), pp. 12-16 (2006)
-
(2006)
5th Intl. Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 2005)
, pp. 12-16
-
-
Yang, D.1
Usynin, A.2
Hines, J.3
-
12
-
-
84893200660
-
-
Hadziosmanovic, D., Bolzoni, D., Hartel, P., Etalle, S.: MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures (2011)
-
(2011)
MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures
-
-
Hadziosmanovic, D.1
Bolzoni, D.2
Hartel, P.3
Etalle, S.4
-
13
-
-
77955015254
-
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept
-
Carcano, A., Fovino, I., Masera, M., Trombetta, A.: State-Based Network Intrusion Detection Systems for SCADA Protocols: a Proof of Concept. Critical Information Infrastructures Security, 138-150 (2010)
-
(2010)
Critical Information Infrastructures Security
, pp. 138-150
-
-
Carcano, A.1
Fovino, I.2
Masera, M.3
Trombetta, A.4
-
14
-
-
84863206416
-
Intrusion Detection for Resource-Constrained Embedded Control Systems in the Power Grid
-
Reeves, J., Ramaswamy, A., Locasto, M., Bratus, S., Smith, S.: Intrusion Detection for Resource-Constrained Embedded Control Systems in the Power Grid. International Journal of Critical Infrastructure Protection (2012)
-
(2012)
International Journal of Critical Infrastructure Protection
-
-
Reeves, J.1
Ramaswamy, A.2
Locasto, M.3
Bratus, S.4
Smith, S.5
-
15
-
-
70350634504
-
Using Modelbased Intrusion Detection for SCADA Networks
-
Cheung, S., Dutertre, B., Fong, M., Lindqvist, U., Skinner, K., Valdes, A.: Using Modelbased Intrusion Detection for SCADA Networks. In: Proceedings of the SCADA Security Scientific Symposium, pp. 127-134 (2007)
-
(2007)
Proceedings of the SCADA Security Scientific Symposium
, pp. 127-134
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
16
-
-
84893168554
-
-
Lin, H., Slagell, A., Martino, C.D., Kalbarczyk, Z., Iyer, R.: Adapting Bro into SCADA: Building a Specification-based Intrusion Detection System for the DNP3 Protocol (2012)
-
(2012)
Adapting Bro into SCADA: Building a Specification-based Intrusion Detection System for the DNP3 Protocol
-
-
Lin, H.1
Slagell, A.2
Martino, C.D.3
Kalbarczyk, Z.4
Iyer, R.5
-
17
-
-
84893119961
-
Embedded cyber-physical anomaly detection in smart meters
-
Hämmerli, B.M., Kalstad Svendsen, N., Lopez, J. (eds.) CRITIS 2012. Springer, Heidelberg
-
Raciti, M., Nadjm-Tehrani, S.: Embedded cyber-physical anomaly detection in smart meters. In: Hämmerli, B.M., Kalstad Svendsen, N., Lopez, J. (eds.) CRITIS 2012. LNCS, vol. 7722, pp. 34-45. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7722
, pp. 34-45
-
-
Raciti, M.1
Nadjm-Tehrani, S.2
|