메뉴 건너뛰기




Volumn , Issue , 2010, Pages 187-203

Control systems security

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84899190540     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-61692-805-6.ch010     Document Type: Chapter
Times cited : (15)

References (25)
  • 2
    • 84899161240 scopus 로고    scopus 로고
    • Control Microsystems, Retrieved December 1, 2009, from
    • Control Microsystems. (2009). DNP and IEC 60870-5 Compliance FAQ. Retrieved December 1, 2009, from http://controlmicrosystems.com/resources-2/downloads/dnp3-iec-60870-5-compliance/
    • (2009) DNP and IEC 60870-5 Compliance FAQ
  • 4
    • 84899375930 scopus 로고    scopus 로고
    • DNP Users Group, Retrieved March 20, 2005, from, [REMOVED HYPERLINK FIELD]
    • DNP Users Group. (2005). DNP3 primary. Retrieved March 20, 2005, from [REMOVED HYPERLINK FIELD]http://www.dnp.org/About/DNP3%20Primer%20Rev%20A.pdf
    • (2005) DNP3 Primary
  • 10
    • 84899223235 scopus 로고    scopus 로고
    • Retrieved November 29, 2007, from
    • McMillan, R. (2007). Insider charged with hacking California canal system. Retrieved November 29, 2007, from http://www.computerworld.com/s/article/9050098/Insider_charged_with_hacking_California_canal_system?taxonomyName=storage
    • (2007) Insider Charged with Hacking California Canal System
    • McMillan, R.1
  • 11
    • 20644463278 scopus 로고    scopus 로고
    • Making the nation safer: The role of science and technology in countering terrorism
    • National Research Council, Retrieved 2002 from
    • National Research Council. (2002). Making the nation safer: the role of science and technology in countering terrorism, Report from the Committee on Science and Technology for Countering Terrorism. Retrieved 2002 from http://www.nap.edu/openbook.php?record_id=10415&page=R1
    • (2002) Report from the Committee on Science and Technology for Countering Terrorism
  • 13
    • 79956004912 scopus 로고    scopus 로고
    • Retrieved October 30, 2006, from
    • Ross, B. (2006). Hackers penetrate water system computers. Retrieved October 30, 2006, from http://blogs.abcnews.com/theblotter/2006/10/hackers_penetra.html
    • (2006) Hackers Penetrate Water System Computers
    • Ross, B.1
  • 16
    • 0344559509 scopus 로고    scopus 로고
    • The White House, Retrieved February 2003, from
    • The White House. (2003). The National Strategy to Secure Cyberspace. Retrieved February 2003, from http://georgewbush-whitehouse.archives.gov/pcipb/cyberspace_strategy.pdf
    • (2003) The National Strategy to Secure Cyberspace
  • 18
    • 84899224200 scopus 로고    scopus 로고
    • U.S. Computer Emergency Response Team (USCERT), Retrieved 2008 from
    • U.S. Computer Emergency Response Team (USCERT). (2008). FAQ about the Control Systems Security Program (CSSP). Retrieved 2008 from http://www.us-cert.gov/control_systems/csfaq.html
    • (2008) FAQ About the Control Systems Security Program (CSSP)
  • 25
    • 84899346752 scopus 로고    scopus 로고
    • Utility Consulting International (UCI), Retrieved 2009 from
    • Utility Consulting International (UCI). (2009). Development of security standards for DNP, ICCP and IEC 61850 FAQ. Retrieved 2009 from http://www.uci-usa.com/Projects/pr_List/Systems/CyberSecurity/Standards.html
    • (2009) Development of Security Standards for DNP, ICCP and IEC 61850 FAQ


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.