-
1
-
-
71649109185
-
An experimental investigation of malware attacks on SCADA systems
-
I. N. Fovino, A. Carcano, M. Masera and A. Trombetta, "An experimental investigation of malware attacks on SCADA systems," Int. J. Critical Infrastruct. Protection, vol. 2, no. 4, pp. 139-145, 2009.
-
(2009)
Int. J. Critical Infrastruct. Protection
, vol.2
, Issue.4
, pp. 139-145
-
-
Fovino, I.N.1
Carcano, A.2
Masera, M.3
Trombetta, A.4
-
2
-
-
84894904843
-
Physical process resilience-aware network design for SCADA systems
-
B. Genge and C. Siaterlis, "Physical process resilience-aware network design for SCADA systems," Computers & Electrical Engineering, Elsevier, vol. 40, no. 1, pp. 142-157, 2014.
-
(2014)
Computers & Electrical Engineering Elsevier
, vol.40
, Issue.1
, pp. 142-157
-
-
Genge, B.1
Siaterlis, C.2
-
3
-
-
84879787411
-
Analysis of the effects of distributed denial-of-service attacks on MPLS Networks
-
B. Genge and C. Siaterlis, "Analysis of the Effects of Distributed Denial-of-Service Attacks on MPLS Networks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 6, no. 2, pp. 87-95, 2013.
-
(2013)
International Journal of Critical Infrastructure Protection Elsevier
, vol.6
, Issue.2
, pp. 87-95
-
-
Genge, B.1
Siaterlis, C.2
-
4
-
-
79953895474
-
Lessons from stuxnet
-
Apr
-
T. Chen and S. Abu-Nimeh, "Lessons from Stuxnet," Computer, vol. 44, no. 4, pp. 91-93, Apr. 2011.
-
(2011)
Computer
, vol.44
, Issue.4
, pp. 91-93
-
-
Chen, T.1
Abu-Nimeh, S.2
-
6
-
-
84913605593
-
Cybersecurity: Authoritative reports and resources, by topic
-
April
-
R. Tehan, "Cybersecurity: Authoritative Reports and Resources, by Topic," in Congressional Research Service, April 3, 2014.
-
(2014)
Congressional Research Service
, vol.3
-
-
Tehan, R.1
-
8
-
-
33947709385
-
Enhanced Internet security by a distributed traffic control service based on traffic ownership
-
August
-
M. Bossardt, T. Dübendorfer and B. Plattner, "Enhanced Internet security by a distributed traffic control service based on traffic ownership," Network and Computer Applications, vol. 30, no. 3, p. 841-857, August 2007.
-
(2007)
Network and Computer Applications
, vol.30
, Issue.3
, pp. 841-857
-
-
Bossardt, M.1
Dübendorfer, T.2
Plattner, B.3
-
9
-
-
84913608280
-
A Review of cyber attack classification technique based on data mining and neural network Approach
-
B. Dharamkar and R. R. Singh, "A Review of Cyber Attack Classification Technique Based on Data Mining and Neural Network Approach," IJCTT, vol. 7, no. 2, pp. 100-105, 2014.
-
(2014)
IJCTT
, vol.7
, Issue.2
, pp. 100-105
-
-
Dharamkar, B.1
Singh, R.R.2
-
10
-
-
84983170554
-
Design of Trust Model for Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques
-
V. Richharya, D. J. Rana, D. R. Jain and D. K. K. Pandey, "Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques," International Journal of Research in Computer and Communication Technology, vol. 2, no. 3, 2013.
-
(2013)
International Journal of Research in Computer and Communication Technology
, vol.2
, Issue.3
-
-
Richharya, V.1
Rana, D.J.2
Jain, D.R.3
Pandey, D.K.K.4
-
11
-
-
0347742772
-
Intrusion Detection Systems & Multisensor Data Fusion: Creating Cyberspace Situational Awareness
-
T. Bass, "Intrusion Detection Systems & Multisensor Data Fusion: Creating Cyberspace Situational Awareness," Communications of the ACM, vol. 43, no. 4, pp. 99-105, 2001.
-
(2001)
Communications of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
12
-
-
0142253852
-
ADAM: A testbed for exploring the use of data mining in intrusion detection
-
D. Barbara, J. Couto, S. Jajodia and N. Wu, "ADAM: A testbed for exploring the use of data mining in intrusion detection," SIGMOD, vol. 130, no. 4, pp. 15-28, 2001.
-
(2001)
SIGMOD
, vol.130
, Issue.4
, pp. 15-28
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Wu, N.4
-
13
-
-
79961184981
-
Fuzzy logic based anomaly detection for embedded network security cyber sensor
-
April
-
O. Linda, M. Manic, T. Vollmer and J. Wright, "Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor," Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, pp. 202-209, April 2011.
-
(2011)
Computational Intelligence in Cyber Security (CICS 2011 IEEE Symposium on
, pp. 202-209
-
-
Linda, O.1
Manic, M.2
Vollmer, T.3
Wright, J.4
-
14
-
-
84860632284
-
Attack models and scenarios for networked control systems
-
A. Teixeira, D. Pérez, H. Sandberg and K. H. Johansson, "Attack Models and Scenarios for Networked Control Systems," High Confidence Networked Systems, pp. 55-64, 2012.
-
(2012)
High Confidence Networked Systems
, pp. 55-64
-
-
Teixeira, A.1
Pérez, D.2
Sandberg, H.3
Johansson, K.H.4
-
15
-
-
84913609374
-
EPIC: A testbed for scientifically rigorous cyber-physical security experimentation
-
Dec
-
C. Siaterlis, B. Genge and M. Hohenadel, "EPIC: A Testbed for Scientifically Rigorous Cyber-Physical Security Experimentation," Emerging Topics in Computing, IEEE Transactions on, vol. 1, pp. 319,330, Dec. 2013.
-
(2013)
Emerging Topics in Computing IEEE Transactions on
, vol.1
, pp. 319-330
-
-
Siaterlis, C.1
Genge, B.2
Hohenadel, M.3
-
16
-
-
84886020779
-
Data fusion-base anomaly detection in networked critical infrastructures
-
1-8, June
-
B. Genge, C. Siaterlis and G. Karopoulos, "Data fusion-base anomaly detection in networked critical infrastructures," Dependable Systems and Networks Workshop (DSN-W), 2013 43rd Annual IEEE/IFIP Conference on, pp. 1-8, June 2013.
-
(2013)
Dependable Systems and Networks Workshop (DSN-W 2013 43rd Annual IEEE/IFIP Conference on
-
-
Genge, B.1
Siaterlis, C.2
Karopoulos, G.3
-
17
-
-
84900397521
-
A Connection pattern-based approach to detect network traffic anomalies in critical infrastructures
-
Amsterdam, The Netherlands
-
B. Genge, D. Rusu and P. Haller, "A Connection Pattern-based Approach to Detect Network Traffic Anomalies in Critical Infrastructures," 2014 ACM European Workshop on System Security (EuroSec2014), Amsterdam, The Netherlands, pp. 1-6, 2014.
-
(2014)
2014 ACM European Workshop on System Security (EuroSec2014)
, pp. 1-6
-
-
Genge, B.1
Rusu, D.2
Haller, P.3
-
18
-
-
84913612099
-
Abnormal behavior detection technique based on big data
-
Springer Netherlands
-
H. Kim, I. Kim and T.-M. Chung, "Abnormal Behavior Detection Technique Based on Big Data," in Frontier and Innovation in Future Computing and Communications, vol. 301, Springer Netherlands, 2014, pp. 553-563.
-
(2014)
Frontier and Innovation in Future Computing and Communications
, vol.301
, pp. 553-563
-
-
Kim, H.1
Kim, I.2
Chung, T.-M.3
-
19
-
-
84913606234
-
Big data in critical infrastructures security monitoring: Challenges and opportunities
-
May
-
L. Aniello, A. Bondavalli, A. Ceccarelli, C. Ciccotelli, M. Cinque, F. Frattini, A. Guzzo, A. Pecchia, A. Pugliese, L. Querzoni and S. Russo, "Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities," in BIG4CIP-2014, May 2014.
-
(2014)
BIG4CIP
-
-
Aniello, L.1
Bondavalli, A.2
Ceccarelli, A.3
Ciccotelli, C.4
Cinque, M.5
Frattini, F.6
Guzzo, A.7
Pecchia, A.8
Pugliese, A.9
Querzoni, L.10
Russo, S.11
|