-
1
-
-
71649085971
-
Reducing security vulnerabilities for critical infrastructure
-
D.Ryu, H. Kim, and K. Um, "Reducing security vulnerabilities for critical infrastructure," Journal of Loss Prevention in the Process Industries 22:1020-1024, 2009.
-
(2009)
Journal of Loss Prevention in the Process Industries
, vol.22
, pp. 1020-1024
-
-
Ryu, D.1
Kim, H.2
Um, K.3
-
2
-
-
22344444992
-
The myths and facts behind cyber security risks for industrial control systems
-
Berlin, October 2004
-
E. Byres, and J. Lowe, "The Myths and Facts behind Cyber Security Risks for Industrial Control Systems," in VDE 2004 Congress, VDE, Berlin, October 2004.
-
VDE 2004 Congress, VDE
-
-
Byres, E.1
Lowe, J.2
-
4
-
-
79953009623
-
Improving security for scada control systems
-
M. Hentea, "Improving Security for SCADA Control Systems," Interdisciplinary Journal of Information, Knowledge, and Management, Volume 3, 2008.
-
(2008)
Interdisciplinary Journal of Information, Knowledge, and Management
, vol.3
-
-
Hentea, M.1
-
5
-
-
84904159668
-
A survey of scada and critical infrastructure incidents
-
B. Miller, and D. C. Rowe, "A Survey of SCADA and Critical Infrastructure Incidents," in SIGITE 2012, 2012.
-
(2012)
SIGITE 2012
-
-
Miller, B.1
Rowe, D.C.2
-
7
-
-
79957979992
-
A testbed for analyzing security of scada control systems (tasscs)
-
M. Mallouhi, Y. Al-Nashif, D. Cox, T. Chadaga, and S. Hariri, "A testbed for analyzing security of SCADA control systems (TASSCS)," in Proc. 2011 IEEE/PES Innovative Smart Grid Technologies (ISGT), pp. 1-7, 2011.
-
(2011)
Proc. 2011 IEEE/PES Innovative Smart Grid Technologies (ISGT)
, pp. 1-7
-
-
Mallouhi, M.1
Al-Nashif, Y.2
Cox, D.3
Chadaga, T.4
Hariri, S.5
-
8
-
-
70449371464
-
Neural network based intrusion detection system for critical infrastructures
-
June 2009
-
O. Linda, T. Vollmer, and M. Manic, "Neural network based intrusion detection system for critical infrastructures," In International Joint Conference on Neural Networks, 2009., pages 1827-1834, June 2009.
-
(2009)
International Joint Conference on Neural Networks
, pp. 1827-1834
-
-
Linda, O.1
Vollmer, T.2
Manic, M.3
-
9
-
-
79952527986
-
On scada control system command and response injection and intrusion detection
-
Dallas, TX. Oct 18-20
-
W. Gao, T. Morris, B. Reaves, and D. Richey, "On SCADA Control System Command and Response Injection and Intrusion Detection," in the Proceedings of 2010 IEEE eCrime Researchers Summit. Dallas, TX. Oct 18-20, 2010.
-
(2010)
The Proceedings of 2010 IEEE ECrime Researchers Summit
-
-
Gao, W.1
Morris, T.2
Reaves, B.3
Richey, D.4
-
11
-
-
70350634504
-
Using model-based intrusion detection for SCADA networks
-
Miami Beach, FL, USA
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A. Valdes, "Using model-based intrusion detection for SCADA networks," In Proceedings of the SCADA Security Scientific Symposium, Miami Beach, FL, USA, 2007.
-
(2007)
Proceedings of the SCADA Security Scientific Symposium
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
12
-
-
84874453480
-
Detecting attacks in power plant interfacing substations through probabilistic validation of attack-effect bindings
-
J. L. Rrushi, and R. H. Campbell, "Detecting Attacks in Power Plant Interfacing Substations through Probabilistic Validation of Attack-Effect Bindings," in SCADA Security Scientific Symposium, 2008.
-
(2008)
SCADA Security Scientific Symposium
-
-
Rrushi, J.L.1
Campbell, R.H.2
-
13
-
-
33847299487
-
Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
-
ICIT
-
C.H. Tsang, and S. Kwong, "Multi-Agent Intrusion Detection System in Industrial Network using Ant Colony Clustering Approach and Unsupervised Feature Extraction," In Proceeding of IEEE International Conference on Industrial Technology Page 51-56, ICIT 2005.
-
(2005)
Proceeding of IEEE International Conference on Industrial Technology
, pp. 51-56
-
-
Tsang, C.H.1
Kwong, S.2
|