메뉴 건너뛰기




Volumn 7, Issue 1, 2014, Pages 175-194

SCADA communication and security issues

Author keywords

Communication; SCADA; Security; Smart grid

Indexed keywords

COMMUNICATION; ELECTRIC POWER TRANSMISSION; ELECTRIC POWER TRANSMISSION NETWORKS; SCADA SYSTEMS;

EID: 84894061097     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.698     Document Type: Article
Times cited : (79)

References (96)
  • 1
    • 84894036450 scopus 로고    scopus 로고
    • 04-1, Technical Information Bulletin 04-1, National Communications System, SCADA Systems. October
    • Tib N. 04-1, Technical Information Bulletin 04-1, National Communications System, SCADA Systems. October, 2004.
    • (2004)
    • Tib, N.1
  • 3
    • 84894087279 scopus 로고    scopus 로고
    • What is SCADA? International Conference on Accelerator and Large Experimental Physics Control Systems.
    • Daneels A, Salter W. What is SCADA? International Conference on Accelerator and Large Experimental Physics Control Systems. 1999.
    • (1999)
    • Daneels, A.1    Salter, W.2
  • 6
    • 84868234476 scopus 로고    scopus 로고
    • Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching
    • Baig ZA. Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching. International Journal of Security and Networks (IJSN) 2012; 7(2):83-94.
    • (2012) International Journal of Security and Networks (IJSN) , vol.7 , Issue.2 , pp. 83-94
    • Baig, Z.A.1
  • 8
    • 84868231183 scopus 로고    scopus 로고
    • Intrusion prevention with two level user authentication in heterogeneous wireless sensor networks
    • Butun I, Wang Y, Lee Y, Sankar R. Intrusion prevention with two level user authentication in heterogeneous wireless sensor networks. International Journal of Security and Networks (IJSN) 2012; 7(2):107-121.
    • (2012) International Journal of Security and Networks (IJSN) , vol.7 , Issue.2 , pp. 107-121
    • Butun, I.1    Wang, Y.2    Lee, Y.3    Sankar, R.4
  • 10
    • 84865207525 scopus 로고    scopus 로고
    • E-mail protocols with perfect forward secrecy
    • DOI:10.1504/IJSN.2012.048491
    • Wong D, Tian X. E-mail protocols with perfect forward secrecy. International Journal of Security and Networks 2012; 7(1):1-5. DOI:10.1504/IJSN.2012.048491
    • (2012) International Journal of Security and Networks , vol.7 , Issue.1 , pp. 1-5
    • Wong, D.1    Tian, X.2
  • 11
    • 84865239000 scopus 로고    scopus 로고
    • Lightweight testbed for evaluating worm containment systems
    • DOI:10.1504/IJSN.2012.048478
    • Vespa LJ, Chakrovorty R, Weng N. Lightweight testbed for evaluating worm containment systems. International Journal of Security and Networks 2012; 7(1):6-16. DOI:10.1504/IJSN.2012.048478
    • (2012) International Journal of Security and Networks , vol.7 , Issue.1 , pp. 6-16
    • Vespa, L.J.1    Chakrovorty, R.2    Weng, N.3
  • 12
    • 84865247751 scopus 로고    scopus 로고
    • A misleading active routing attack in mobile ad-hoc networks
    • DOI:10.1504/IJSN.2012.048492.
    • Kandah F, Singh Y, Zhang W, Wang T. A misleading active routing attack in mobile ad-hoc networks. International Journal of Security and Networks 2012; 7(1):17-29. DOI:10.1504/IJSN.2012.048492.
    • (2012) International Journal of Security and Networks , vol.7 , Issue.1 , pp. 17-29
    • Kandah, F.1    Singh, Y.2    Zhang, W.3    Wang, T.4
  • 13
    • 84865267570 scopus 로고    scopus 로고
    • Security configuration management in intrusion detection and prevention systems
    • DOI:10.1504/IJSN.2012.048493
    • Alsubhi K, Alhazmi Y, Bouabdallah N, Boutaba R. Security configuration management in intrusion detection and prevention systems. International Journal of Security and Networks 2012; 7(1):30-39. DOI:10.1504/IJSN.2012.048493
    • (2012) International Journal of Security and Networks , vol.7 , Issue.1 , pp. 30-39
    • Alsubhi, K.1    Alhazmi, Y.2    Bouabdallah, N.3    Boutaba, R.4
  • 14
    • 84865251659 scopus 로고    scopus 로고
    • PeerReview re-evaluation for accountability in distributed systems or networks
    • DOI:10.1504/IJSN.2012.048494
    • Xiao Z, Xiao Y. PeerReview re-evaluation for accountability in distributed systems or networks. International Journal of Security and Networks 2012; 7(1):40-58. DOI:10.1504/IJSN.2012.048494
    • (2012) International Journal of Security and Networks , vol.7 , Issue.1 , pp. 40-58
    • Xiao, Z.1    Xiao, Y.2
  • 15
    • 84865243345 scopus 로고    scopus 로고
    • Defensive computer worms: an overview
    • DOI:10.1504/IJSN.2012.048479
    • Al-Salloum ZS. Defensive computer worms: an overview. International Journal of Security and Networks 2012; 7(1):59-70. DOI:10.1504/IJSN.2012.048479
    • (2012) International Journal of Security and Networks , vol.7 , Issue.1 , pp. 59-70
    • Al-Salloum, Z.S.1
  • 17
    • 85016433011 scopus 로고    scopus 로고
    • Efficient multicast stream authentication for the fully adversarial network model
    • Tartary C, Tartary H. Efficient multicast stream authentication for the fully adversarial network model. International Journal of Security and Networks 2007; 2(3/4):175-191.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 175-191
    • Tartary, C.1    Tartary, H.2
  • 19
    • 79951648076 scopus 로고    scopus 로고
    • LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
    • Hsu H, Zhu S, Hurson AR. LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. International Journal of Security and Networks 2007; 2(3/4):202-215.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 202-215
    • Hsu, H.1    Zhu, S.2    Hurson, A.R.3
  • 22
    • 68149086398 scopus 로고    scopus 로고
    • Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
    • Hoeper K, Gong G. Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4):239-250.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 239-250
    • Hoeper, K.1    Gong, G.2
  • 23
    • 38049042723 scopus 로고    scopus 로고
    • On security proof of McCullagh-Barreto's key agreement protocol and its variants
    • Cheng Z, Chen L. On security proof of McCullagh-Barreto's key agreement protocol and its variants. International Journal of Security and Networks 2007; 2(3/4):251-259.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 251-259
    • Cheng, Z.1    Chen, L.2
  • 25
    • 66249092571 scopus 로고    scopus 로고
    • Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
    • Huang D. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4):272-283.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 272-283
    • Huang, D.1
  • 28
    • 79551652560 scopus 로고    scopus 로고
    • DKMS: distributed hierarchical access control for multimedia networks
    • Li R, Li J, Chen H. DKMS: distributed hierarchical access control for multimedia networks. International Journal of Security and Networks 2007; 2(1/2):3-10.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 3-10
    • Li, R.1    Li, J.2    Chen, H.3
  • 30
    • 74549116861 scopus 로고    scopus 로고
    • Securing Wi-Fi networks with position verification: extended version
    • Malaney RA. Securing Wi-Fi networks with position verification: extended version. International Journal of Security and Networks 2007; 2(1/2):27-36.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 27-36
    • Malaney, R.A.1
  • 32
    • 74049111426 scopus 로고    scopus 로고
    • Hash-AV: fast virus signature scanning by cache-resident filters
    • Erdogan O, Cao P. Hash-AV: fast virus signature scanning by cache-resident filters. International Journal of Security and Networks 2007; 2(1/2):50-59.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 50-59
    • Erdogan, O.1    Cao, P.2
  • 33
    • 79551643767 scopus 로고    scopus 로고
    • Secure message delivery in publish/subscribe networks using overlay multicast
    • Rabinovich P, Simon R. Secure message delivery in publish/subscribe networks using overlay multicast. International Journal of Security and Networks 2007; 2(1/2):60-70.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 60-70
    • Rabinovich, P.1    Simon, R.2
  • 34
    • 34548366188 scopus 로고    scopus 로고
    • Optimal worm-scanning method using vulnerable-host distributions
    • Chen Z, Ji C. Optimal worm-scanning method using vulnerable-host distributions. International Journal of Security and Networks 2007; 2(1/2):71-80.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 71-80
    • Chen, Z.1    Ji, C.2
  • 37
    • 79551646922 scopus 로고    scopus 로고
    • End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
    • Ling H, Znati T. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. International Journal of Security and Networks 2007; 2(1/2):109-121.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 109-121
    • Ling, H.1    Znati, T.2
  • 38
  • 42
    • 77955716028 scopus 로고    scopus 로고
    • The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
    • Wang X. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. International Journal of Security and Networks 2006; 1(3/4):184-197.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 184-197
    • Wang, X.1
  • 46
    • 79951716783 scopus 로고    scopus 로고
    • Low-power authenticated group key agreement for heterogeneous wireless networks
    • Teo J, Tan C, Ng J. Low-power authenticated group key agreement for heterogeneous wireless networks. International Journal of Security and Networks 2006; 1(3/4):226-236.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 226-236
    • Teo, J.1    Tan, C.2    Ng, J.3
  • 47
    • 77954644745 scopus 로고    scopus 로고
    • A new signature scheme without random oracles
    • Tan C. A new signature scheme without random oracles. International Journal of Security and Networks 2006; 1(3/4):237-242.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 237-242
    • Tan, C.1
  • 48
    • 67649498303 scopus 로고    scopus 로고
    • Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
    • Liu Y, Comaniciu C, Man H. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. International Journal of Security and Networks 2006; 1(3/4):243-254.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 243-254
    • Liu, Y.1    Comaniciu, C.2    Man, H.3
  • 52
  • 53
    • 79951694028 scopus 로고    scopus 로고
    • Analysis of routing security-energy trade-offs in wireless sensor networks
    • Al-Karaki JN. Analysis of routing security-energy trade-offs in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4):147-157.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 147-157
    • Al-Karaki, J.N.1
  • 54
    • 49949107235 scopus 로고    scopus 로고
    • Load-balanced key establishment methodologies in wireless sensor networks
    • Araz O, Qi H. Load-balanced key establishment methodologies in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4):158-166.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 158-166
    • Araz, O.1    Qi, H.2
  • 55
    • 84890880165 scopus 로고    scopus 로고
    • Limiting DoS attacks during multihop data delivery in wireless sensor networks
    • Deng J, Han R, Mishra S. Limiting DoS attacks during multihop data delivery in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4):167-178.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 167-178
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 56
    • 0029226515 scopus 로고
    • quot;The design of next generation SCADA systems," in Power Industry Computer Application Conference, 1995. Conference Proceedings, 1995 IEEE
    • Duong T. "The design of next generation SCADA systems, " in Power Industry Computer Application Conference, 1995. Conference Proceedings, 1995 IEEE. 1995; 431-436.
    • (1995) , pp. 431-436
    • Duong, T.1
  • 58
    • 0032231226 scopus 로고    scopus 로고
    • quot;SCADA-EMS on the Internet," in Energy Management and Power Delivery, 1998. Proceedings of EMPD '98. International Conference on, 1998
    • Medida S, et al. "SCADA-EMS on the Internet, " in Energy Management and Power Delivery, 1998. Proceedings of EMPD '98. International Conference on, 1998. 1998; 2: 656-660.
    • (1998) , vol.2 , pp. 656-660
    • Medida, S.1
  • 59
    • 0036936706 scopus 로고    scopus 로고
    • Migrating electrical power network SCADA systems to TCP/IP and Ethernet networking
    • Kwok-Hong M, Holland BL. Migrating electrical power network SCADA systems to TCP/IP and Ethernet networking. Power Engineering Journal 2002; 16:305-311.
    • (2002) Power Engineering Journal , vol.16 , pp. 305-311
    • Kwok-Hong, M.1    Holland, B.L.2
  • 60
    • 0036075555 scopus 로고    scopus 로고
    • quot;The benefits of networked SCADA systems utilizing IP-enabled networks," in Rural Electric Power Conference, 2002. 2002 IEEE
    • McClanahan RH. "The benefits of networked SCADA systems utilizing IP-enabled networks, " in Rural Electric Power Conference, 2002. 2002 IEEE. 2002; 7: C5-C5.
    • (2002) , vol.7
    • McClanahan, R.H.1
  • 61
    • 84954452024 scopus 로고    scopus 로고
    • quot;Development of the Intranet-based SCADA (supervisory control and data acquisition system) for power system," in Power Engineering Society Winter Meeting, 2000. IEEE
    • Ebata Y, et al. "Development of the Intranet-based SCADA (supervisory control and data acquisition system) for power system, " in Power Engineering Society Winter Meeting, 2000. IEEE. 2000; 3: 1656-1661.
    • (2000) , vol.3 , pp. 1656-1661
    • Ebata, Y.1
  • 62
    • 84989955704 scopus 로고    scopus 로고
    • quot;Web based interface to SCADA system," in Power System Technology, 1998. Proceedings. POWERCON '98. International Conference on, 1998
    • Zecevic G. "Web based interface to SCADA system, " in Power System Technology, 1998. Proceedings. POWERCON '98. International Conference on, 1998. 1998; 2: 1218-1221.
    • (1998) , vol.2 , pp. 1218-1221
    • Zecevic, G.1
  • 63
    • 0036946010 scopus 로고    scopus 로고
    • quot;The design of SCADA based on industrial Ethernet," in Intelligent Control and Automation, Proceedings of the 4th World Congress on, 2002 2786-2789 vol.4.
    • Zhihao L, Jinshou Y. "The design of SCADA based on industrial Ethernet, " in Intelligent Control and Automation, 2002. Proceedings of the 4th World Congress on, 2002, pp. 2786-2789 vol.4.
    • (2002)
    • Zhihao, L.1    Jinshou, Y.2
  • 64
    • 0034186813 scopus 로고    scopus 로고
    • Web-based SCADA display systems (WSDS) for access via Internet
    • Qiu B, Gooi HB. Web-based SCADA display systems (WSDS) for access via Internet. Power Systems, IEEE Transactions on 2000l; 15:681-686.
    • (2000) Power Systems, IEEE Transactions on , vol.15 , pp. 681-686
    • Qiu, B.1    Gooi, H.B.2
  • 65
    • 85071706606 scopus 로고    scopus 로고
    • quot;IEEE Standard for SCADA and automation systems," IEEE Std C37.1-2007 (revision of IEEE Std C37.1-1994)
    • "IEEE Standard for SCADA and automation systems, " IEEE Std C37.1-2007 (revision of IEEE Std C37.1-1994). 2008; c1-133.
    • (2008)
  • 66
    • 84894089791 scopus 로고
    • quot;IEEE recommended practice for master/remote supervisory control and data acquisition (SCADA) communications," IEEE Std. 999-1992, p. 0_1
    • "IEEE recommended practice for master/remote supervisory control and data acquisition (SCADA) communications, " IEEE Std. 999-1992, p. 0_1, 1993.
    • (1993)
  • 67
    • 84894056423 scopus 로고    scopus 로고
    • IBM Internet security systems. Available
    • IBM Internet security systems. Available: http://www.iss.net/
  • 68
    • 0032138022 scopus 로고    scopus 로고
    • Reliability analysis of electric utility SCADA systems
    • Aug.
    • Bruce AG. Reliability analysis of electric utility SCADA systems. IEEE Transactions on Power Systems 1998; 13(3):844-849 Aug.
    • (1998) IEEE Transactions on Power Systems , vol.13 , Issue.3 , pp. 844-849
    • Bruce, A.G.1
  • 69
    • 84894106426 scopus 로고    scopus 로고
    • Industrial cybersecurity for power system and SCADA networks. Paper No. PCIC-2005-34.
    • Creery A, Byres EJ. Industrial cybersecurity for power system and SCADA networks. Paper No. PCIC-2005-34.
    • Creery, A.1    Byres, E.J.2
  • 70
    • 0036474004 scopus 로고    scopus 로고
    • Application of ATM-based network for an integrated distribution SCADA-GIS system
    • Shyh-Jier H, Chih-Chieh L. Application of ATM-based network for an integrated distribution SCADA-GIS system. Power Systems IEEE Transactions on 2002; 17:80-86.
    • (2002) Power Systems IEEE Transactions on , vol.17 , pp. 80-86
    • Shyh-Jier, H.1    Chih-Chieh, L.2
  • 71
    • 4143065058 scopus 로고    scopus 로고
    • Open distributed EMS/SCADA system
    • Toshida N, et al. Open distributed EMS/SCADA system. Hitachi Review 1998; 47:208-213.
    • (1998) Hitachi Review , vol.47 , pp. 208-213
    • Toshida, N.1
  • 73
    • 0142187752 scopus 로고    scopus 로고
    • quot;Automated meter reading and SCADA application for wireless sensor network," Ad-Hoc, Mobile, and Wireless Networks
    • Molina F, et al. "Automated meter reading and SCADA application for wireless sensor network, " Ad-Hoc, Mobile, and Wireless Networks. 2003; 223-234.
    • (2003) , pp. 223-234
    • Molina, F.1
  • 74
    • 31644450516 scopus 로고    scopus 로고
    • Mobile phone based SCADA for industrial automation
    • Ozdemir E, Karacor M. Mobile phone based SCADA for industrial automation. ISA Transactions 2006; 45:67-75.
    • (2006) ISA Transactions , vol.45 , pp. 67-75
    • Ozdemir, E.1    Karacor, M.2
  • 75
    • 4944245598 scopus 로고    scopus 로고
    • SCADA system using TETRA communication network. Recent advances in computers, computing and communications
    • Ozimek I, Kandus G. SCADA system using TETRA communication network. Recent advances in computers, computing and communications. 164-166.
    • Ozimek, I.1    Kandus, G.2
  • 76
    • 84894055929 scopus 로고    scopus 로고
    • quot;Key management for SCADA," Cryptog. Information Sys. Security Dept., Sandia Nat. Labs, Tech. Rep. SAND2001-3252.
    • Beaver C, et al. "Key management for SCADA, " Cryptog. Information Sys. Security Dept., Sandia Nat. Labs, Tech. Rep. SAND2001-3252. 2002.
    • (2002)
    • Beaver, C.1
  • 77
    • 33750391626 scopus 로고    scopus 로고
    • Low-latency cryptographic protection for SCADA communications
    • Wright A, et al. Low-latency cryptographic protection for SCADA communications. 2004; 263-277.
    • (2004) , pp. 263-277
    • Wright, A.1
  • 78
    • 67650661171 scopus 로고    scopus 로고
    • Advanced key-management architecture for secure SCADA communications
    • Donghyun C, et al. Advanced key-management architecture for secure SCADA communications. Power Delivery IEEE Transactions on 2009; 24:1154-1163.
    • (2009) Power Delivery IEEE Transactions on , vol.24 , pp. 1154-1163
    • Donghyun, C.1
  • 79
    • 0035304576 scopus 로고    scopus 로고
    • Communications technology guidelines for EMS/SCADA systems
    • Marihart DJ. Communications technology guidelines for EMS/SCADA systems. Power Delivery IEEE Transactions on 2001; 16:181-188.
    • (2001) Power Delivery IEEE Transactions on , vol.16 , pp. 181-188
    • Marihart, D.J.1
  • 80
    • 35348897182 scopus 로고    scopus 로고
    • quot;SCADA based under frequency load shedding integrated with rate of frequency decline," in Power Engineering Society General Meeting, 2006. IEEE
    • Parniani M, Nasri A. "SCADA based under frequency load shedding integrated with rate of frequency decline, " in Power Engineering Society General Meeting, 2006. IEEE, 2006; 6.
    • (2006) , pp. 6
    • Parniani, M.1    Nasri, A.2
  • 81
    • 84894029517 scopus 로고    scopus 로고
    • quot;Trends in security incidents in the SCADA and process industries: a summary - part II" Eric Byres, David Leversage, Nate Kube, Symantec Corporation.
    • "Trends in security incidents in the SCADA and process industries: a summary - part II" Eric Byres, David Leversage, Nate Kube, Symantec Corporation. 2007.
    • (2007)
  • 82
    • 84894106350 scopus 로고    scopus 로고
    • quot;SQL slammer worm lessons learned for consideration by the electricity sector," North American Electric Reliability Council, Princeton NJ, June 20.
    • "SQL slammer worm lessons learned for consideration by the electricity sector, " North American Electric Reliability Council, Princeton NJ, June 20. 2003.
    • (2003)
  • 83
    • 84894100452 scopus 로고    scopus 로고
    • IBM internet security systems white paper, quot;A Strategic Approach to Protecting SCADA and Process Control Systems".
    • IBM internet security systems white paper, "A Strategic Approach to Protecting SCADA and Process Control Systems".
  • 84
    • 84894057813 scopus 로고    scopus 로고
    • C1Working group members of power system relying committee. Cyber Security Issues for Protective Relays, Power Engineering Society general meeting.
    • C1Working group members of power system relying committee. Cyber Security Issues for Protective Relays, Power Engineering Society general meeting. 2007.
    • (2007)
  • 85
    • 84894041007 scopus 로고    scopus 로고
    • Concerns about intrusions into remotely accessible substation controllers and SCADA systems.
    • Oman P, Edmund O. S, Frincke D. Concerns about intrusions into remotely accessible substation controllers and SCADA systems. 2000.
    • (2000)
    • Oman, P.1    Edmund, O.S.2    Frincke, D.3
  • 86
    • 84894081211 scopus 로고    scopus 로고
    • IEEE Power Engineering Society. IEEE Standard 1402-2000: IEEE Guide for Electric Power Substation Physical and Electronic Security, IEEE. New York, NY, Apr. 4
    • IEEE Power Engineering Society. IEEE Standard 1402-2000: IEEE Guide for Electric Power Substation Physical and Electronic Security, IEEE. New York, NY, Apr. 4, 2000.
    • (2000)
  • 87
    • 84894103579 scopus 로고    scopus 로고
    • National Security Telecommunications Advisory Committee Information Assurance Task Force. Electric Power Risk Assessment. March
    • National Security Telecommunications Advisory Committee Information Assurance Task Force. Electric Power Risk Assessment. March, 1997.
    • (1997)
  • 88
    • 84894028008 scopus 로고    scopus 로고
    • quot;Lights out: NIPC unveils plan to monitor cyber attacks on the power grid," an InfoSec News Article Ported to Security Focus Web Page. May 25,
    • Poulsen K. "Lights out: NIPC unveils plan to monitor cyber attacks on the power grid, " an InfoSec News Article Ported to Security Focus Web Page. May 25, 2000: http://www.securityfocus.com/news/41
    • (2000)
    • Poulsen, K.1
  • 89
    • 33749639831 scopus 로고    scopus 로고
    • Quantitative cyber risk reduction estimation methodology for a small SCADA control system. International Conference on System Sciences.
    • McQueen MA, Boyer WF, Flynn MA, Beitel GA. Quantitative cyber risk reduction estimation methodology for a small SCADA control system. International Conference on System Sciences. 2006
    • (2006)
    • McQueen, M.A.1    Boyer, W.F.2    Flynn, M.A.3    Beitel, G.A.4
  • 90
    • 84894101079 scopus 로고    scopus 로고
    • NISCC good practice guide, quot;Firewall Deployment for SCADA and Process Control Networks 1.4" British Columbia Institute of Technology.
    • NISCC good practice guide, "Firewall Deployment for SCADA and Process Control Networks 1.4" British Columbia Institute of Technology. 2005.
    • (2005)
  • 91
    • 84894087711 scopus 로고    scopus 로고
    • quot;Trends in security incidents in the SCADA and process industries: a summary - part I" Eric Byres, David Leversage, Nate Kube, Symantec Corporation.
    • "Trends in security incidents in the SCADA and process industries: a summary - part I" Eric Byres, David Leversage, Nate Kube, Symantec Corporation. 2007.
    • (2007)
  • 93
    • 0035686956 scopus 로고    scopus 로고
    • quot;Migrating from SCADA to automation," in Transmission and Distribution Conference and Exposition, 2001 IEEE/PES.
    • Gacek D, et al. "Migrating from SCADA to automation, " in Transmission and Distribution Conference and Exposition, 2001 IEEE/PES. 2001; 1: 343-348.
    • (2001) , vol.1 , pp. 343-348
    • Gacek, D.1
  • 94
    • 35348812494 scopus 로고    scopus 로고
    • quot;Applying multi-agent system technology in practice: automated management and analysis of SCADA and digital fault recorder data," in Power Engineering Society General Meeting, 2006. IEEE.
    • Davidson EM, et al. "Applying multi-agent system technology in practice: automated management and analysis of SCADA and digital fault recorder data, " in Power Engineering Society General Meeting, 2006. IEEE. 2006; 1.
    • (2006) , pp. 1
    • Davidson, E.M.1
  • 95
    • 0036621791 scopus 로고    scopus 로고
    • SCADA system of DC motor with implementation of fuzzy logic controller on neural network
    • Horng J. SCADA system of DC motor with implementation of fuzzy logic controller on neural network. Advances in Engineering Software 2002; 33:361-364.
    • (2002) Advances in Engineering Software , vol.33 , pp. 361-364
    • Horng, J.1
  • 96
    • 84894060614 scopus 로고    scopus 로고
    • quot;Enabling interoperability and extensibility of future SCADA systems," University Southern California, USC/ISI Technical Report, ISITR-625
    • Ye W, Heidemann J. "Enabling interoperability and extensibility of future SCADA systems, " University Southern California, USC/ISI Technical Report, ISITR-625, 2006.
    • (2006)
    • Ye, W.1    Heidemann, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.