-
1
-
-
84894036450
-
-
04-1, Technical Information Bulletin 04-1, National Communications System, SCADA Systems. October
-
Tib N. 04-1, Technical Information Bulletin 04-1, National Communications System, SCADA Systems. October, 2004.
-
(2004)
-
-
Tib, N.1
-
3
-
-
84894087279
-
-
What is SCADA? International Conference on Accelerator and Large Experimental Physics Control Systems.
-
Daneels A, Salter W. What is SCADA? International Conference on Accelerator and Large Experimental Physics Control Systems. 1999.
-
(1999)
-
-
Daneels, A.1
Salter, W.2
-
6
-
-
84868234476
-
Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching
-
Baig ZA. Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching. International Journal of Security and Networks (IJSN) 2012; 7(2):83-94.
-
(2012)
International Journal of Security and Networks (IJSN)
, vol.7
, Issue.2
, pp. 83-94
-
-
Baig, Z.A.1
-
7
-
-
84868233925
-
An adaptive tit-for-tat strategy for IEEE 802.11 CSMA/CA protocol
-
Boyer S, Robert J, Otrok H, Rousseau C. An adaptive tit-for-tat strategy for IEEE 802.11 CSMA/CA protocol. International Journal of Security and Networks (IJSN) 2012; 7(2):95-106.
-
(2012)
International Journal of Security and Networks (IJSN)
, vol.7
, Issue.2
, pp. 95-106
-
-
Boyer, S.1
Robert, J.2
Otrok, H.3
Rousseau, C.4
-
8
-
-
84868231183
-
Intrusion prevention with two level user authentication in heterogeneous wireless sensor networks
-
Butun I, Wang Y, Lee Y, Sankar R. Intrusion prevention with two level user authentication in heterogeneous wireless sensor networks. International Journal of Security and Networks (IJSN) 2012; 7(2):107-121.
-
(2012)
International Journal of Security and Networks (IJSN)
, vol.7
, Issue.2
, pp. 107-121
-
-
Butun, I.1
Wang, Y.2
Lee, Y.3
Sankar, R.4
-
10
-
-
84865207525
-
E-mail protocols with perfect forward secrecy
-
DOI:10.1504/IJSN.2012.048491
-
Wong D, Tian X. E-mail protocols with perfect forward secrecy. International Journal of Security and Networks 2012; 7(1):1-5. DOI:10.1504/IJSN.2012.048491
-
(2012)
International Journal of Security and Networks
, vol.7
, Issue.1
, pp. 1-5
-
-
Wong, D.1
Tian, X.2
-
12
-
-
84865247751
-
A misleading active routing attack in mobile ad-hoc networks
-
DOI:10.1504/IJSN.2012.048492.
-
Kandah F, Singh Y, Zhang W, Wang T. A misleading active routing attack in mobile ad-hoc networks. International Journal of Security and Networks 2012; 7(1):17-29. DOI:10.1504/IJSN.2012.048492.
-
(2012)
International Journal of Security and Networks
, vol.7
, Issue.1
, pp. 17-29
-
-
Kandah, F.1
Singh, Y.2
Zhang, W.3
Wang, T.4
-
13
-
-
84865267570
-
Security configuration management in intrusion detection and prevention systems
-
DOI:10.1504/IJSN.2012.048493
-
Alsubhi K, Alhazmi Y, Bouabdallah N, Boutaba R. Security configuration management in intrusion detection and prevention systems. International Journal of Security and Networks 2012; 7(1):30-39. DOI:10.1504/IJSN.2012.048493
-
(2012)
International Journal of Security and Networks
, vol.7
, Issue.1
, pp. 30-39
-
-
Alsubhi, K.1
Alhazmi, Y.2
Bouabdallah, N.3
Boutaba, R.4
-
14
-
-
84865251659
-
PeerReview re-evaluation for accountability in distributed systems or networks
-
DOI:10.1504/IJSN.2012.048494
-
Xiao Z, Xiao Y. PeerReview re-evaluation for accountability in distributed systems or networks. International Journal of Security and Networks 2012; 7(1):40-58. DOI:10.1504/IJSN.2012.048494
-
(2012)
International Journal of Security and Networks
, vol.7
, Issue.1
, pp. 40-58
-
-
Xiao, Z.1
Xiao, Y.2
-
15
-
-
84865243345
-
Defensive computer worms: an overview
-
DOI:10.1504/IJSN.2012.048479
-
Al-Salloum ZS. Defensive computer worms: an overview. International Journal of Security and Networks 2012; 7(1):59-70. DOI:10.1504/IJSN.2012.048479
-
(2012)
International Journal of Security and Networks
, vol.7
, Issue.1
, pp. 59-70
-
-
Al-Salloum, Z.S.1
-
17
-
-
85016433011
-
Efficient multicast stream authentication for the fully adversarial network model
-
Tartary C, Tartary H. Efficient multicast stream authentication for the fully adversarial network model. International Journal of Security and Networks 2007; 2(3/4):175-191.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 175-191
-
-
Tartary, C.1
Tartary, H.2
-
19
-
-
79951648076
-
LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
-
Hsu H, Zhu S, Hurson AR. LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. International Journal of Security and Networks 2007; 2(3/4):202-215.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 202-215
-
-
Hsu, H.1
Zhu, S.2
Hurson, A.R.3
-
20
-
-
34548042117
-
On the design of secure protocols for hierarchical sensor networks
-
Oliveira LB, Wong H, Loureiro AAF, Dahab R. On the design of secure protocols for hierarchical sensor networks. International Journal of Security and Networks 2007; 2(3/4):216-227.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 216-227
-
-
Oliveira, L.B.1
Wong, H.2
Loureiro, A.A.F.3
Dahab, R.4
-
21
-
-
79951645452
-
Server side hashing core exceeding 3Gbps of throughput
-
Michail HE, Panagiotakopoulos GA, Thanasoulis VN, Kakarountas AP, Goutis CE. Server side hashing core exceeding 3Gbps of throughput. International Journal of Security and Networks 2007; 2(3/4):228-238.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 228-238
-
-
Michail, H.E.1
Panagiotakopoulos, G.A.2
Thanasoulis, V.N.3
Kakarountas, A.P.4
Goutis, C.E.5
-
22
-
-
68149086398
-
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
-
Hoeper K, Gong G. Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4):239-250.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 239-250
-
-
Hoeper, K.1
Gong, G.2
-
23
-
-
38049042723
-
On security proof of McCullagh-Barreto's key agreement protocol and its variants
-
Cheng Z, Chen L. On security proof of McCullagh-Barreto's key agreement protocol and its variants. International Journal of Security and Networks 2007; 2(3/4):251-259.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 251-259
-
-
Cheng, Z.1
Chen, L.2
-
24
-
-
77949415724
-
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
-
Finnigin KM, Mullins BE, Raines RA, Potoczny HB. Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks. International Journal of Security and Networks 2007; 2(3/4):260-271.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 260-271
-
-
Finnigin, K.M.1
Mullins, B.E.2
Raines, R.A.3
Potoczny, H.B.4
-
25
-
-
66249092571
-
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
-
Huang D. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4):272-283.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 272-283
-
-
Huang, D.1
-
26
-
-
79951638712
-
Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol
-
Abdalla M, Bresson E, Chevassut O, Moller B, Pointcheval D. Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol. International Journal of Security and Networks 2007; 2(3/4):284-296.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 284-296
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Moller, B.4
Pointcheval, D.5
-
28
-
-
79551652560
-
DKMS: distributed hierarchical access control for multimedia networks
-
Li R, Li J, Chen H. DKMS: distributed hierarchical access control for multimedia networks. International Journal of Security and Networks 2007; 2(1/2):3-10.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 3-10
-
-
Li, R.1
Li, J.2
Chen, H.3
-
30
-
-
74549116861
-
Securing Wi-Fi networks with position verification: extended version
-
Malaney RA. Securing Wi-Fi networks with position verification: extended version. International Journal of Security and Networks 2007; 2(1/2):27-36.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 27-36
-
-
Malaney, R.A.1
-
32
-
-
74049111426
-
Hash-AV: fast virus signature scanning by cache-resident filters
-
Erdogan O, Cao P. Hash-AV: fast virus signature scanning by cache-resident filters. International Journal of Security and Networks 2007; 2(1/2):50-59.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 50-59
-
-
Erdogan, O.1
Cao, P.2
-
33
-
-
79551643767
-
Secure message delivery in publish/subscribe networks using overlay multicast
-
Rabinovich P, Simon R. Secure message delivery in publish/subscribe networks using overlay multicast. International Journal of Security and Networks 2007; 2(1/2):60-70.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 60-70
-
-
Rabinovich, P.1
Simon, R.2
-
34
-
-
34548366188
-
Optimal worm-scanning method using vulnerable-host distributions
-
Chen Z, Ji C. Optimal worm-scanning method using vulnerable-host distributions. International Journal of Security and Networks 2007; 2(1/2):71-80.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 71-80
-
-
Chen, Z.1
Ji, C.2
-
36
-
-
34547148771
-
8 Single packet IP traceback in AS-level partial deployment scenario
-
Korkmaz T, Gong C, Sarac K, Dykes SG. 8 Single packet IP traceback in AS-level partial deployment scenario. International Journal of Security and Networks 2007; 2(1/2):95-10.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 95-10
-
-
Korkmaz, T.1
Gong, C.2
Sarac, K.3
Dykes, S.G.4
-
37
-
-
79551646922
-
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
-
Ling H, Znati T. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. International Journal of Security and Networks 2007; 2(1/2):109-121.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 109-121
-
-
Ling, H.1
Znati, T.2
-
39
-
-
79551551587
-
Analysis of flow-correlation attacks in anonymity network
-
Zhu Y, Fu X, Bettati R, Zhao W. Analysis of flow-correlation attacks in anonymity network. International Journal of Security and Networks 2007; 2(1/2):137-153.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 137-153
-
-
Zhu, Y.1
Fu, X.2
Bettati, R.3
Zhao, W.4
-
40
-
-
74549177130
-
Defence against packet injection in ad hoc networks
-
Gu Q, Liu P, Chu C, Zhu S. Defence against packet injection in ad hoc networks. International Journal of Security and Networks 2007; 2(1/2):154-169.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 154-169
-
-
Gu, Q.1
Liu, P.2
Chu, C.3
Zhu, S.4
-
41
-
-
37849002205
-
End-to-end security mechanisms for SMS
-
Hwu J, Hsu S, Lin Y-B, Chen R. End-to-end security mechanisms for SMS. International Journal of Security and Networks 2006; 1(3/4):177-183.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 177-183
-
-
Hwu, J.1
Hsu, S.2
Lin, Y.-B.3
Chen, R.4
-
42
-
-
77955716028
-
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
-
Wang X. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. International Journal of Security and Networks 2006; 1(3/4):184-197.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 184-197
-
-
Wang, X.1
-
43
-
-
51249122792
-
A self-encryption authentication protocol for teleconference services
-
Jiang Y, Lin C, Shi M, Shen X. A self-encryption authentication protocol for teleconference services. International Journal of Security and Networks 2006; 1(3/4):198-205.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 198-205
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.4
-
46
-
-
79951716783
-
Low-power authenticated group key agreement for heterogeneous wireless networks
-
Teo J, Tan C, Ng J. Low-power authenticated group key agreement for heterogeneous wireless networks. International Journal of Security and Networks 2006; 1(3/4):226-236.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 226-236
-
-
Teo, J.1
Tan, C.2
Ng, J.3
-
47
-
-
77954644745
-
A new signature scheme without random oracles
-
Tan C. A new signature scheme without random oracles. International Journal of Security and Networks 2006; 1(3/4):237-242.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 237-242
-
-
Tan, C.1
-
48
-
-
67649498303
-
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
-
Liu Y, Comaniciu C, Man H. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. International Journal of Security and Networks 2006; 1(3/4):243-254.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 243-254
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
49
-
-
44649095872
-
A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks
-
Karyotis V, Papavassiliou S, Grammatikou M, Maglaris V. A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks. International Journal of Security and Networks 2006; 1(3/4):255-265.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 255-265
-
-
Karyotis, V.1
Papavassiliou, S.2
Grammatikou, M.3
Maglaris, V.4
-
50
-
-
79951685922
-
Editorial: security issues on sensor networks
-
Xiao Y, Jia X, Sun B, Du X. Editorial: security issues on sensor networks. International Journal of Security and Networks 2006; 1(3/4):125-126.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 125-126
-
-
Xiao, Y.1
Jia, X.2
Sun, B.3
Du, X.4
-
52
-
-
79955980141
-
A lightweight encryption and authentication scheme for wireless sensor networks
-
Zheng J, Li J, Lee MJ, Anshel M. A lightweight encryption and authentication scheme for wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4):138-146.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 138-146
-
-
Zheng, J.1
Li, J.2
Lee, M.J.3
Anshel, M.4
-
53
-
-
79951694028
-
Analysis of routing security-energy trade-offs in wireless sensor networks
-
Al-Karaki JN. Analysis of routing security-energy trade-offs in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4):147-157.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 147-157
-
-
Al-Karaki, J.N.1
-
54
-
-
49949107235
-
Load-balanced key establishment methodologies in wireless sensor networks
-
Araz O, Qi H. Load-balanced key establishment methodologies in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4):158-166.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 158-166
-
-
Araz, O.1
Qi, H.2
-
55
-
-
84890880165
-
Limiting DoS attacks during multihop data delivery in wireless sensor networks
-
Deng J, Han R, Mishra S. Limiting DoS attacks during multihop data delivery in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4):167-178.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 167-178
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
56
-
-
0029226515
-
-
quot;The design of next generation SCADA systems," in Power Industry Computer Application Conference, 1995. Conference Proceedings, 1995 IEEE
-
Duong T. "The design of next generation SCADA systems, " in Power Industry Computer Application Conference, 1995. Conference Proceedings, 1995 IEEE. 1995; 431-436.
-
(1995)
, pp. 431-436
-
-
Duong, T.1
-
58
-
-
0032231226
-
-
quot;SCADA-EMS on the Internet," in Energy Management and Power Delivery, 1998. Proceedings of EMPD '98. International Conference on, 1998
-
Medida S, et al. "SCADA-EMS on the Internet, " in Energy Management and Power Delivery, 1998. Proceedings of EMPD '98. International Conference on, 1998. 1998; 2: 656-660.
-
(1998)
, vol.2
, pp. 656-660
-
-
Medida, S.1
-
59
-
-
0036936706
-
Migrating electrical power network SCADA systems to TCP/IP and Ethernet networking
-
Kwok-Hong M, Holland BL. Migrating electrical power network SCADA systems to TCP/IP and Ethernet networking. Power Engineering Journal 2002; 16:305-311.
-
(2002)
Power Engineering Journal
, vol.16
, pp. 305-311
-
-
Kwok-Hong, M.1
Holland, B.L.2
-
60
-
-
0036075555
-
-
quot;The benefits of networked SCADA systems utilizing IP-enabled networks," in Rural Electric Power Conference, 2002. 2002 IEEE
-
McClanahan RH. "The benefits of networked SCADA systems utilizing IP-enabled networks, " in Rural Electric Power Conference, 2002. 2002 IEEE. 2002; 7: C5-C5.
-
(2002)
, vol.7
-
-
McClanahan, R.H.1
-
61
-
-
84954452024
-
-
quot;Development of the Intranet-based SCADA (supervisory control and data acquisition system) for power system," in Power Engineering Society Winter Meeting, 2000. IEEE
-
Ebata Y, et al. "Development of the Intranet-based SCADA (supervisory control and data acquisition system) for power system, " in Power Engineering Society Winter Meeting, 2000. IEEE. 2000; 3: 1656-1661.
-
(2000)
, vol.3
, pp. 1656-1661
-
-
Ebata, Y.1
-
62
-
-
84989955704
-
-
quot;Web based interface to SCADA system," in Power System Technology, 1998. Proceedings. POWERCON '98. International Conference on, 1998
-
Zecevic G. "Web based interface to SCADA system, " in Power System Technology, 1998. Proceedings. POWERCON '98. International Conference on, 1998. 1998; 2: 1218-1221.
-
(1998)
, vol.2
, pp. 1218-1221
-
-
Zecevic, G.1
-
63
-
-
0036946010
-
-
quot;The design of SCADA based on industrial Ethernet," in Intelligent Control and Automation, Proceedings of the 4th World Congress on, 2002 2786-2789 vol.4.
-
Zhihao L, Jinshou Y. "The design of SCADA based on industrial Ethernet, " in Intelligent Control and Automation, 2002. Proceedings of the 4th World Congress on, 2002, pp. 2786-2789 vol.4.
-
(2002)
-
-
Zhihao, L.1
Jinshou, Y.2
-
64
-
-
0034186813
-
Web-based SCADA display systems (WSDS) for access via Internet
-
Qiu B, Gooi HB. Web-based SCADA display systems (WSDS) for access via Internet. Power Systems, IEEE Transactions on 2000l; 15:681-686.
-
(2000)
Power Systems, IEEE Transactions on
, vol.15
, pp. 681-686
-
-
Qiu, B.1
Gooi, H.B.2
-
65
-
-
85071706606
-
-
quot;IEEE Standard for SCADA and automation systems," IEEE Std C37.1-2007 (revision of IEEE Std C37.1-1994)
-
"IEEE Standard for SCADA and automation systems, " IEEE Std C37.1-2007 (revision of IEEE Std C37.1-1994). 2008; c1-133.
-
(2008)
-
-
-
66
-
-
84894089791
-
-
quot;IEEE recommended practice for master/remote supervisory control and data acquisition (SCADA) communications," IEEE Std. 999-1992, p. 0_1
-
"IEEE recommended practice for master/remote supervisory control and data acquisition (SCADA) communications, " IEEE Std. 999-1992, p. 0_1, 1993.
-
(1993)
-
-
-
67
-
-
84894056423
-
-
IBM Internet security systems. Available
-
IBM Internet security systems. Available: http://www.iss.net/
-
-
-
-
68
-
-
0032138022
-
Reliability analysis of electric utility SCADA systems
-
Aug.
-
Bruce AG. Reliability analysis of electric utility SCADA systems. IEEE Transactions on Power Systems 1998; 13(3):844-849 Aug.
-
(1998)
IEEE Transactions on Power Systems
, vol.13
, Issue.3
, pp. 844-849
-
-
Bruce, A.G.1
-
69
-
-
84894106426
-
-
Industrial cybersecurity for power system and SCADA networks. Paper No. PCIC-2005-34.
-
Creery A, Byres EJ. Industrial cybersecurity for power system and SCADA networks. Paper No. PCIC-2005-34.
-
-
-
Creery, A.1
Byres, E.J.2
-
70
-
-
0036474004
-
Application of ATM-based network for an integrated distribution SCADA-GIS system
-
Shyh-Jier H, Chih-Chieh L. Application of ATM-based network for an integrated distribution SCADA-GIS system. Power Systems IEEE Transactions on 2002; 17:80-86.
-
(2002)
Power Systems IEEE Transactions on
, vol.17
, pp. 80-86
-
-
Shyh-Jier, H.1
Chih-Chieh, L.2
-
71
-
-
4143065058
-
Open distributed EMS/SCADA system
-
Toshida N, et al. Open distributed EMS/SCADA system. Hitachi Review 1998; 47:208-213.
-
(1998)
Hitachi Review
, vol.47
, pp. 208-213
-
-
Toshida, N.1
-
73
-
-
0142187752
-
-
quot;Automated meter reading and SCADA application for wireless sensor network," Ad-Hoc, Mobile, and Wireless Networks
-
Molina F, et al. "Automated meter reading and SCADA application for wireless sensor network, " Ad-Hoc, Mobile, and Wireless Networks. 2003; 223-234.
-
(2003)
, pp. 223-234
-
-
Molina, F.1
-
74
-
-
31644450516
-
Mobile phone based SCADA for industrial automation
-
Ozdemir E, Karacor M. Mobile phone based SCADA for industrial automation. ISA Transactions 2006; 45:67-75.
-
(2006)
ISA Transactions
, vol.45
, pp. 67-75
-
-
Ozdemir, E.1
Karacor, M.2
-
75
-
-
4944245598
-
-
SCADA system using TETRA communication network. Recent advances in computers, computing and communications
-
Ozimek I, Kandus G. SCADA system using TETRA communication network. Recent advances in computers, computing and communications. 164-166.
-
-
-
Ozimek, I.1
Kandus, G.2
-
76
-
-
84894055929
-
-
quot;Key management for SCADA," Cryptog. Information Sys. Security Dept., Sandia Nat. Labs, Tech. Rep. SAND2001-3252.
-
Beaver C, et al. "Key management for SCADA, " Cryptog. Information Sys. Security Dept., Sandia Nat. Labs, Tech. Rep. SAND2001-3252. 2002.
-
(2002)
-
-
Beaver, C.1
-
77
-
-
33750391626
-
-
Low-latency cryptographic protection for SCADA communications
-
Wright A, et al. Low-latency cryptographic protection for SCADA communications. 2004; 263-277.
-
(2004)
, pp. 263-277
-
-
Wright, A.1
-
78
-
-
67650661171
-
Advanced key-management architecture for secure SCADA communications
-
Donghyun C, et al. Advanced key-management architecture for secure SCADA communications. Power Delivery IEEE Transactions on 2009; 24:1154-1163.
-
(2009)
Power Delivery IEEE Transactions on
, vol.24
, pp. 1154-1163
-
-
Donghyun, C.1
-
79
-
-
0035304576
-
Communications technology guidelines for EMS/SCADA systems
-
Marihart DJ. Communications technology guidelines for EMS/SCADA systems. Power Delivery IEEE Transactions on 2001; 16:181-188.
-
(2001)
Power Delivery IEEE Transactions on
, vol.16
, pp. 181-188
-
-
Marihart, D.J.1
-
80
-
-
35348897182
-
-
quot;SCADA based under frequency load shedding integrated with rate of frequency decline," in Power Engineering Society General Meeting, 2006. IEEE
-
Parniani M, Nasri A. "SCADA based under frequency load shedding integrated with rate of frequency decline, " in Power Engineering Society General Meeting, 2006. IEEE, 2006; 6.
-
(2006)
, pp. 6
-
-
Parniani, M.1
Nasri, A.2
-
81
-
-
84894029517
-
-
quot;Trends in security incidents in the SCADA and process industries: a summary - part II" Eric Byres, David Leversage, Nate Kube, Symantec Corporation.
-
"Trends in security incidents in the SCADA and process industries: a summary - part II" Eric Byres, David Leversage, Nate Kube, Symantec Corporation. 2007.
-
(2007)
-
-
-
82
-
-
84894106350
-
-
quot;SQL slammer worm lessons learned for consideration by the electricity sector," North American Electric Reliability Council, Princeton NJ, June 20.
-
"SQL slammer worm lessons learned for consideration by the electricity sector, " North American Electric Reliability Council, Princeton NJ, June 20. 2003.
-
(2003)
-
-
-
83
-
-
84894100452
-
-
IBM internet security systems white paper, quot;A Strategic Approach to Protecting SCADA and Process Control Systems".
-
IBM internet security systems white paper, "A Strategic Approach to Protecting SCADA and Process Control Systems".
-
-
-
-
84
-
-
84894057813
-
-
C1Working group members of power system relying committee. Cyber Security Issues for Protective Relays, Power Engineering Society general meeting.
-
C1Working group members of power system relying committee. Cyber Security Issues for Protective Relays, Power Engineering Society general meeting. 2007.
-
(2007)
-
-
-
85
-
-
84894041007
-
-
Concerns about intrusions into remotely accessible substation controllers and SCADA systems.
-
Oman P, Edmund O. S, Frincke D. Concerns about intrusions into remotely accessible substation controllers and SCADA systems. 2000.
-
(2000)
-
-
Oman, P.1
Edmund, O.S.2
Frincke, D.3
-
86
-
-
84894081211
-
-
IEEE Power Engineering Society. IEEE Standard 1402-2000: IEEE Guide for Electric Power Substation Physical and Electronic Security, IEEE. New York, NY, Apr. 4
-
IEEE Power Engineering Society. IEEE Standard 1402-2000: IEEE Guide for Electric Power Substation Physical and Electronic Security, IEEE. New York, NY, Apr. 4, 2000.
-
(2000)
-
-
-
87
-
-
84894103579
-
-
National Security Telecommunications Advisory Committee Information Assurance Task Force. Electric Power Risk Assessment. March
-
National Security Telecommunications Advisory Committee Information Assurance Task Force. Electric Power Risk Assessment. March, 1997.
-
(1997)
-
-
-
88
-
-
84894028008
-
-
quot;Lights out: NIPC unveils plan to monitor cyber attacks on the power grid," an InfoSec News Article Ported to Security Focus Web Page. May 25,
-
Poulsen K. "Lights out: NIPC unveils plan to monitor cyber attacks on the power grid, " an InfoSec News Article Ported to Security Focus Web Page. May 25, 2000: http://www.securityfocus.com/news/41
-
(2000)
-
-
Poulsen, K.1
-
89
-
-
33749639831
-
-
Quantitative cyber risk reduction estimation methodology for a small SCADA control system. International Conference on System Sciences.
-
McQueen MA, Boyer WF, Flynn MA, Beitel GA. Quantitative cyber risk reduction estimation methodology for a small SCADA control system. International Conference on System Sciences. 2006
-
(2006)
-
-
McQueen, M.A.1
Boyer, W.F.2
Flynn, M.A.3
Beitel, G.A.4
-
90
-
-
84894101079
-
-
NISCC good practice guide, quot;Firewall Deployment for SCADA and Process Control Networks 1.4" British Columbia Institute of Technology.
-
NISCC good practice guide, "Firewall Deployment for SCADA and Process Control Networks 1.4" British Columbia Institute of Technology. 2005.
-
(2005)
-
-
-
91
-
-
84894087711
-
-
quot;Trends in security incidents in the SCADA and process industries: a summary - part I" Eric Byres, David Leversage, Nate Kube, Symantec Corporation.
-
"Trends in security incidents in the SCADA and process industries: a summary - part I" Eric Byres, David Leversage, Nate Kube, Symantec Corporation. 2007.
-
(2007)
-
-
-
93
-
-
0035686956
-
-
quot;Migrating from SCADA to automation," in Transmission and Distribution Conference and Exposition, 2001 IEEE/PES.
-
Gacek D, et al. "Migrating from SCADA to automation, " in Transmission and Distribution Conference and Exposition, 2001 IEEE/PES. 2001; 1: 343-348.
-
(2001)
, vol.1
, pp. 343-348
-
-
Gacek, D.1
-
94
-
-
35348812494
-
-
quot;Applying multi-agent system technology in practice: automated management and analysis of SCADA and digital fault recorder data," in Power Engineering Society General Meeting, 2006. IEEE.
-
Davidson EM, et al. "Applying multi-agent system technology in practice: automated management and analysis of SCADA and digital fault recorder data, " in Power Engineering Society General Meeting, 2006. IEEE. 2006; 1.
-
(2006)
, pp. 1
-
-
Davidson, E.M.1
-
95
-
-
0036621791
-
SCADA system of DC motor with implementation of fuzzy logic controller on neural network
-
Horng J. SCADA system of DC motor with implementation of fuzzy logic controller on neural network. Advances in Engineering Software 2002; 33:361-364.
-
(2002)
Advances in Engineering Software
, vol.33
, pp. 361-364
-
-
Horng, J.1
-
96
-
-
84894060614
-
-
quot;Enabling interoperability and extensibility of future SCADA systems," University Southern California, USC/ISI Technical Report, ISITR-625
-
Ye W, Heidemann J. "Enabling interoperability and extensibility of future SCADA systems, " University Southern California, USC/ISI Technical Report, ISITR-625, 2006.
-
(2006)
-
-
Ye, W.1
Heidemann, J.2
|