-
1
-
-
58849164843
-
Security for process control systems: An overview
-
M. Brandle and M. Naedele, Security for process control systems: An overview, IEEE Security and Privacy, vol. 6(6), pp. 24-29, 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.6
, pp. 24-29
-
-
Brandle, M.1
Naedele, M.2
-
2
-
-
84908310554
-
-
University of Utah, Salt Lake City, Utah
-
Flux Research Group, Emulab, Total Network Testbed, School of Computing, University of Utah, Salt Lake City, Utah (www.emulab.net), 2014.
-
(2014)
Emulab, Total Network Testbed, School of Computing
-
-
-
3
-
-
0033079461
-
A drum boiler model for long term power system dynamic simulation
-
M. Flynn and M. O'Malley, A drum boiler model for long term power system dynamic simulation, IEEE Transactions on Power Systems, vol. 14(1), pp. 209-217, 1999.
-
(1999)
IEEE Transactions on Power Systems
, vol.14
, Issue.1
, pp. 209-217
-
-
Flynn, M.1
O'Malley, M.2
-
4
-
-
84867171611
-
Development of main boiler simulation system for LNG ship
-
H. Gan, J. Zhang and H. Zeng, Development of main boiler simulation system for LNG ship, International Journal of Advancements in Computing Technology, vol. 4(17), pp. 466-475, 2012.
-
(2012)
International Journal of Advancements in Computing Technology
, vol.4
, Issue.17
, pp. 466-475
-
-
Gan, H.1
Zhang, J.2
Zeng, H.3
-
5
-
-
84860699803
-
-
ANSI/ISA-62443-1-1 (99.01.01)-2007, Research Triangle Park, North Carolina
-
International Society of Automation, Security for Industrial Automation and Control Systems, Part 1: Terminology, Concepts and Models, ANSI/ISA-62443-1-1 (99.01.01)-2007, Research Triangle Park, North Carolina, 2007.
-
(2007)
Security for Industrial Automation and Control Systems, Part 1: Terminology, Concepts and Models
-
-
International Society of Automation1
-
7
-
-
58849119555
-
The CRUTIAL way of critical infrastructure protection
-
A. Neves Bessani, P. Sousa,M. Correia, N. Ferreira Neves and P. Verissimo, The CRUTIAL way of critical infrastructure protection, IEEE Security and Privacy, vol. 6(6), pp. 44-51, 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.6
, pp. 44-51
-
-
Neves Bessani, A.1
Sousa, P.2
Correia, M.3
Ferreira Neves, N.4
Verissimo, P.5
-
8
-
-
84908293373
-
-
Department of Energy, Washington, DC (energy.gov/oe/tech nology-development/ energy-delivery-systems-cybersecurity/nat ional-scada-test-bed)
-
Office of Electricity Delivery and Energy Reliability, National SCADA Test Bed, Department of Energy, Washington, DC (energy.gov/oe/tech nology-development/ energy-delivery-systems-cybersecurity/nat ional-scada-test-bed), 2014.
-
(2014)
National SCADA Test Bed
-
-
Office of Electricity Delivery and Energy Reliability1
-
9
-
-
72849150312
-
Building a SCADA security testbed
-
C. Queiroz, A. Mahmood, J. Hu, Z. Tari and X. Yu, Building a SCADA security testbed, Proceedings of the Third International Conference on Network and System Security, pp. 357-364, 2009.
-
(2009)
Proceedings of the Third International Conference on Network and System Security
, pp. 357-364
-
-
Queiroz, C.1
Mahmood, A.2
Hu, J.3
Tari, Z.4
Yu, X.5
-
11
-
-
84868548177
-
-
Sandia Report SAND2010- 5183, Sandia National Laboratories, Albuquerque, New Mexico
-
M. Schwartz, J. Mulder, J. Trent and W. Atkins, Control System Devices: Architectures and Supply Channels Overview, Sandia Report SAND2010- 5183, Sandia National Laboratories, Albuquerque, New Mexico, 2010.
-
(2010)
Control System Devices: Architectures and Supply Channels Overview
-
-
Schwartz, M.1
Mulder, J.2
Trent, J.3
Atkins, W.4
-
12
-
-
55549116194
-
-
NIST Special Publication 800-82, Revision 1, National Institute of Standards and Technology, Gaithersburg, Maryland
-
K. Stouffer, J. Falco and K. Scarfone, Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82, Revision 1, National Institute of Standards and Technology, Gaithersburg, Maryland, 2013.
-
(2013)
Guide to Industrial Control Systems (ICS) Security
-
-
Stouffer, K.1
Falco, J.2
Scarfone, K.3
-
13
-
-
84904510689
-
Security testing methods and techniques of industrial control devices
-
W. Zhao, Y. Peng, Y. Gao, X. Han, H. Gao and W. Wang, Security testing methods and techniques of industrial control devices, Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 433-436, 2013.
-
(2013)
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 433-436
-
-
Zhao, W.1
Peng, Y.2
Gao, Y.3
Han, X.4
Gao, H.5
Wang, W.6
|