메뉴 건너뛰기




Volumn , Issue , 2013, Pages

The dawn of Kinetic Cyber

Author keywords

cyber attacks; cyber conflict; cyber warfare; kinetic cyber

Indexed keywords

CRIME; EMBEDDED SYSTEMS; KINETIC THEORY; KINETICS; PHYSICAL ADDRESSES; SCADA SYSTEMS;

EID: 84904396507     PISSN: 23255366     EISSN: 23255374     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (33)

References (27)
  • 3
    • 84904387140 scopus 로고    scopus 로고
    • Secure plug and play architectures for cyber-physical systems A Position paper for the NSF workshop on cyber-physical systems
    • J. C. (Steve) Liu, "Secure plug and play architectures for cyber-physical systems A Position paper for the NSF workshop on cyber-physical systems," in National Science Foundation on Cyber Physical Systems, 2006.
    • (2006) National Science Foundation on Cyber Physical Systems
    • Liu, J.C.1
  • 5
    • 84904387142 scopus 로고    scopus 로고
    • US Sources : Staged cyber attack reveals vulnerability in power grid
    • 26-Sep-2007. [Accessed: 30-Oct-2012].
    • J. Meserve, "US Sources : Staged cyber attack reveals vulnerability in power grid," Cable News Network, 26-Sep-2007. [Online]. Available: http://www.cnn.com/2007/US/09/26/power.at.risk/index.html. [Accessed: 30-Oct-2012].
    • Cable News Network
    • Meserve, J.1
  • 6
    • 84904387143 scopus 로고    scopus 로고
    • Heart-stopper : Could hackers hit pacemakers, other medical implants?
    • 14-Mar
    • L. Greenemeier, "Heart-Stopper : Could Hackers Hit Pacemakers Other Medical Implants?," Scientific American, 14-Mar-2008.
    • (2008) Scientific American
    • Greenemeier, L.1
  • 8
    • 84904387144 scopus 로고    scopus 로고
    • Fatal risk at heart of lax security
    • Sydney, Australia,06-Nov
    • B. Grubb, "Fatal risk at heart of lax security," The Sydney Morning Herald, Sydney, Australia, 06-Nov-2012.
    • (2012) The Sydney Morning Herald
    • Grubb, B.1
  • 10
    • 85061034567 scopus 로고    scopus 로고
    • Comprehensive experimental analyses of automotive attack surfaces
    • S. Checkoway and D. McCoy, "Comprehensive experimental analyses of automotive attack surfaces," in 20th USENIX Security Symposium, 2011.
    • (2011) 20th USENIX Security Symposium
    • Checkoway, S.1    McCoy, D.2
  • 11
    • 84904391993 scopus 로고    scopus 로고
    • Utility hack led to security overhaul
    • M. Crawford, "Utility hack led to security overhaul," Computerworld, vol. 2006, pp. 1-2, 2006.
    • (2006) Computerworld , vol.2006 , pp. 1-2
    • Crawford, M.1
  • 12
    • 72849108705 scopus 로고    scopus 로고
    • Malicious control system cyber security attack case study-maroochy water services, australia
    • M. Abrams and J. Weiss, "Malicious Control System Cyber Security Attack Case Study-Maroochy Water Services, Australia," in NIST Industrial Process Control System Workshop, 2008.
    • (2008) NIST Industrial Process Control System Workshop
    • Abrams, M.1    Weiss, J.2
  • 13
    • 22444432757 scopus 로고    scopus 로고
    • Hacker jailed for revenge sewage attacks Job rejection caused a bit of a stink
    • 31-Oct
    • T. Smith, "Hacker jailed for revenge sewage attacks Job rejection caused a bit of a stink," The Register, 31-Oct-2001.
    • (2001) The Register
    • Smith, T.1
  • 19
    • 75249095435 scopus 로고    scopus 로고
    • Schoolboy hacks into city's tram system
    • 11-Jan
    • G. Baker, "Schoolboy hacks into city's tram system," The Telegraph, 11-Jan-2008.
    • (2008) The Telegraph
    • Baker, G.1
  • 23
    • 84904387136 scopus 로고    scopus 로고
    • Arson by cyber attack
    • 12-Dec-[Accessed: 18-Dec-2012].
    • K. Coleman, "Arson by Cyber Attack," Fire Engineering, 12-Dec-2012. [Online]. Available: http://www.fireengineering.com/articles/2012/ 12/arson-by-cyber attack. html. [Accessed: 18-Dec-2012].
    • (2012) Fire Engineering
    • Coleman, K.1
  • 26
    • 84904403913 scopus 로고    scopus 로고
    • Security challenges and requirements for control systems in the semiconductor manufacturing sector (extended abstract)
    • M. Ben Salem, "Security Challenges and Requirements for Control Systems in the Semiconductor Manufacturing Sector (Extended Abstract)," in Cybersecurity in Cyber-Physical Systems Workshop, 2012, pp. 1-3.
    • (2012) Cybersecurity in Cyber-Physical Systems Workshop , pp. 1-3
    • Ben Salem, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.