-
1
-
-
0003529549
-
Dynamic Models for Boiler-Turbine Alternator Units: Data Logs and Parameter Estimation for a 160 MW Unit
-
LUTFDF2/(TFRT-3192)/1-137/(1987), Department of Automatic Control, Lund Institute of Technology, Lund, Sweden.
-
R. Bell, K. Åström, Dynamic Models for Boiler-Turbine Alternator Units: Data Logs and Parameter Estimation for a 160 MW Unit, LUTFDF2/(TFRT-3192)/1-137/(1987), Department of Automatic Control, Lund Institute of Technology, Lund, Sweden, 1987.
-
(1987)
-
-
Bell, R.1
Åström, K.2
-
3
-
-
70349335710
-
SCADA malware: a proof of concept
-
A. Carcano, I. Nai Fovino, M. Masera, A. Trombetta, SCADA malware: a proof of concept, in: Proceedings of the Third International Workshop on Critical Information Infrastructures Security, 2008, pp. 211-222.
-
(2008)
Proceedings of the Third International Workshop on Critical Information Infrastructures Security
, pp. 211-222
-
-
Carcano, A.1
Nai Fovino, I.2
Masera, M.3
Trombetta, A.4
-
4
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection and response
-
A. Cárdenas, S. Amin, Z. Lin, Y. Huang, C. Huang, S. Sastry, Attacks against process control systems: Risk assessment, detection and response, in: Proceedings of the Sixth ACM Symposium on Information, Computer and Communications Security, 2011, pp. 355-366.
-
(2011)
Proceedings of the Sixth ACM Symposium on Information, Computer and Communications Security
, pp. 355-366
-
-
Cárdenas, A.1
Amin, S.2
Lin, Z.3
Huang, Y.4
Huang, C.5
Sastry, S.6
-
5
-
-
0141566630
-
A nonlinear dynamic model of a vinyl acetate process
-
Chen R., Dave K., McAvoy T., Luyben M. A nonlinear dynamic model of a vinyl acetate process. Ind. Eng. Chem. Res. 2003, 42(20):4478-4487.
-
(2003)
Ind. Eng. Chem. Res.
, vol.42
, Issue.20
, pp. 4478-4487
-
-
Chen, R.1
Dave, K.2
McAvoy, T.3
Luyben, M.4
-
6
-
-
84918546083
-
Common Cybersecurity Vulnerabilities in Industrial Control Systems, Department of Homeland Security
-
Washington, DC
-
Control Systems Security Program, Common Cybersecurity Vulnerabilities in Industrial Control Systems, Department of Homeland Security, Washington, DC, 2011.
-
(2011)
-
-
-
7
-
-
84918564112
-
Further Information Regarding the Release of DNP3 Secure Authentication Version 5 (SAv5)
-
Raleigh, North Carolina
-
DNP3 Users Group, Further Information Regarding the Release of DNP3 Secure Authentication Version 5 (SAv5), Raleigh, North Carolina (url: 〈〉. http://www.dnp.org/DNP3Downloads/DNP3.
-
-
-
-
8
-
-
0027561446
-
A plant-wide industrial process control problem
-
Downs J., Vogel E. A plant-wide industrial process control problem. Comput. Chem. Eng. 1993, 17(3):245-255.
-
(1993)
Comput. Chem. Eng.
, vol.17
, Issue.3
, pp. 245-255
-
-
Downs, J.1
Vogel, E.2
-
9
-
-
84972507662
-
Who solved the Secretary Problem
-
Ferguson T. Who solved the Secretary Problem. Stat. Sci. 1989, 4(3):282-296.
-
(1989)
Stat. Sci.
, vol.4
, Issue.3
, pp. 282-296
-
-
Ferguson, T.1
-
10
-
-
0000945144
-
The Secretary Problem and its extensions. A review
-
Freeman P. The Secretary Problem and its extensions. A review. Revue Int. Stat. 1983, 51(2):189-206.
-
(1983)
Revue Int. Stat.
, vol.51
, Issue.2
, pp. 189-206
-
-
Freeman, P.1
-
11
-
-
84861674536
-
An experimental study of the impact of network segmentation on the resilience of physical processes
-
B. Genge, C. Siaterlis, An experimental study of the impact of network segmentation on the resilience of physical processes, in: Proceedings of the Eleventh International IFIP TC 6 Networking Conference, vol. 1, 2012, pp. 121-134.
-
(2012)
Proceedings of the Eleventh International IFIP TC 6 Networking Conference
, vol.1
, pp. 121-134
-
-
Genge, B.1
Siaterlis, C.2
-
12
-
-
84986272600
-
Impact of network infrastructure parameters on the effectiveness of cyber attacks against industrial control systems
-
Genge B., Siaterlis C., Hohenadel M. Impact of network infrastructure parameters on the effectiveness of cyber attacks against industrial control systems. Int. J. Comput. Commun. Control 2012, 7(4):673-686.
-
(2012)
Int. J. Comput. Commun. Control
, vol.7
, Issue.4
, pp. 673-686
-
-
Genge, B.1
Siaterlis, C.2
Hohenadel, M.3
-
13
-
-
0002737066
-
Recognizing the maximum of a sequence
-
Gilbert J., Mosteller F. Recognizing the maximum of a sequence. J. Am. Stat. Assoc. 1966, 61(313):35-73.
-
(1966)
J. Am. Stat. Assoc.
, vol.61
, Issue.313
, pp. 35-73
-
-
Gilbert, J.1
Mosteller, F.2
-
16
-
-
84918504933
-
Breakage, presented at Black Hat Federal
-
J. Larsen, Breakage, presented at Black Hat Federal, 2008.
-
(2008)
-
-
Larsen, J.1
-
17
-
-
84918579842
-
Miniaturization, presented at Black Hat USA
-
Larsen J.
-
J. Larsen, Miniaturization, presented at Black Hat USA, 2014.
-
(2014)
-
-
-
18
-
-
0035980388
-
Self-optimizing control of a large-scale plant. The Tennessee Eastman process
-
Larsson T., Hestetun K., Hovland E., Skogestad S. Self-optimizing control of a large-scale plant. The Tennessee Eastman process. Ind. Eng. Chem. Res. 2001, 40(22):4489-4901.
-
(2001)
Ind. Eng. Chem. Res.
, vol.40
, Issue.22
, pp. 4489-4901
-
-
Larsson, T.1
Hestetun, K.2
Hovland, E.3
Skogestad, S.4
-
21
-
-
84890280870
-
Towards timely intelligence in the power grid
-
Y. Li-Baboud, J. Amelot, D. Anand, G. Stenbakken, T. Nelson, J. Moyne, Towards timely intelligence in the power grid, in: Proceedings of the Forty-Fourth Annual Precise Time and Time Interval Systems and Applications Meeting, 2012, pp. 399-412.
-
(2012)
Proceedings of the Forty-Fourth Annual Precise Time and Time Interval Systems and Applications Meeting
, pp. 399-412
-
-
Li-Baboud, Y.1
Amelot, J.2
Anand, D.3
Stenbakken, G.4
Nelsonc, T.5
Moyne, J.6
-
23
-
-
58849099982
-
The Secretary Problem with a hazard rate condition
-
M. Mahdian, R. McAfee, D. Pennock, The Secretary Problem with a hazard rate condition, in: Proceedings of the Fourth International Workshop on Internet and Network Economics, 2008, pp. 708-715.
-
(2008)
Proceedings of the Fourth International Workshop on Internet and Network Economics
, pp. 708-715
-
-
Mahdian, M.1
McAfee, R.2
Pennock, D.3
-
24
-
-
85041156174
-
Lees[U+05F3] Loss Prevention in the Process Industries: Hazard Identification, Assessment and Control
-
Butterworth Heinemann, Oxford, United Kingdom
-
S. Mannan, Lees[U+05F3] Loss Prevention in the Process Industries: Hazard Identification, Assessment and Control, vol. 1, Butterworth Heinemann, Oxford, United Kingdom, 2012.
-
(2012)
, vol.1
-
-
Mannan, S.1
-
25
-
-
0028431355
-
Base control for the Tennessee Eastman problem
-
McAvoy T., Ye N. Base control for the Tennessee Eastman problem. Comput. Chem. Eng. 1994, 18(5):383-413.
-
(1994)
Comput. Chem. Eng.
, vol.18
, Issue.5
, pp. 383-413
-
-
McAvoy, T.1
Ye, N.2
-
26
-
-
78651084507
-
Detecting sensor signal manipulations in non-linear chemical processes
-
Springer, Heidelberg, Germany, T. Moore, S. Shenoi (Eds.)
-
McEvoy T., Wolthusen S. Detecting sensor signal manipulations in non-linear chemical processes. Critical Infrastructure Protection IV 2010, 81-94. Springer, Heidelberg, Germany. T. Moore, S. Shenoi (Eds.).
-
(2010)
Critical Infrastructure Protection IV
, pp. 81-94
-
-
McEvoy, T.1
Wolthusen, S.2
-
27
-
-
84958755281
-
A plant-wide industrial process control security problem
-
Springer, Heidelberg, Germany, J. Butts, S. Shenoi (Eds.)
-
McEvoy T., Wolthusen S. A plant-wide industrial process control security problem. Critical Infrastructure Protection V 2011, 47-56. Springer, Heidelberg, Germany. J. Butts, S. Shenoi (Eds.).
-
(2011)
Critical Infrastructure Protection V
, pp. 47-56
-
-
McEvoy, T.1
Wolthusen, S.2
-
28
-
-
84918531952
-
Using smart instrumentation, Control Engineering
-
April 8
-
C. McIntyre, Using smart instrumentation, Control Engineering (url:〈〉), April 8, 2011. http://www.controleng.com/single-article/using-smart-instrumentation/a0ec350155bb86c8f65377ba66e59df8.html.
-
(2011)
-
-
McIntyre, C.1
-
30
-
-
85180621066
-
A trusted safety verifier for process controller code
-
S. McLaughlin, S. Zonouz, D. Pohly, P. McDaniel, A trusted safety verifier for process controller code, in: Proceedings of the Network and Distributed Systems Security Symposium, 2014.
-
(2014)
Proceedings of the Network and Distributed Systems Security Symposium
-
-
McLaughlin, S.1
Zonouz, S.2
Pohly, D.3
McDaniel, P.4
-
32
-
-
84891808534
-
Design and implementation of a secure Modbus protocol
-
Springer, Heidelberg, Germany, C. Palmer, S. Shenoi (Eds.)
-
Nai Fovino I., Carcano A., Masera M., Trombetta A. Design and implementation of a secure Modbus protocol. Critical Infrastructure Protection III 2009, 83-96. Springer, Heidelberg, Germany. C. Palmer, S. Shenoi (Eds.).
-
(2009)
Critical Infrastructure Protection III
, pp. 83-96
-
-
Nai Fovino, I.1
Carcano, A.2
Masera, M.3
Trombetta, A.4
-
33
-
-
78651107078
-
Distributed intrusion detection system for SCADA protocols
-
Springer, Heidelberg, Germany, T. Moore, S. Shenoi (Eds.)
-
Nai Fovino I., Masera M., Guglielmi M., Carcano A., Trombetta A. Distributed intrusion detection system for SCADA protocols. Critical Infrastructure Protection IV 2010, 95-110. Springer, Heidelberg, Germany. T. Moore, S. Shenoi (Eds.).
-
(2010)
Critical Infrastructure Protection IV
, pp. 95-110
-
-
Nai Fovino, I.1
Masera, M.2
Guglielmi, M.3
Carcano, A.4
Trombetta, A.5
-
34
-
-
84918494757
-
Can We Learn from SCADA Security Incidents?
-
Heraklion, Crete, Greece
-
A. Pauna, K. Moulinos, M. Lakka, J. May, T. Tryfonas, Can We Learn from SCADA Security Incidents? White Paper, European Union Agency for Network and Information Security, Heraklion, Crete, Greece, 2013.
-
(2013)
White Paper, European Union Agency for Network and Information Security
-
-
Pauna, A.1
Moulinos, K.2
Lakka, M.3
May, J.4
Tryfonas, T.5
-
35
-
-
84918550880
-
Tennessee Eastman Challenge Archive, Department of Chemical Engineering, University of Washington
-
Seattle, Washington
-
N. Ricker, Tennessee Eastman Challenge Archive, Department of Chemical Engineering, University of Washington, Seattle, Washington (url: 〈〉), 2014. http://depts.washington.edu/control/LARRY/TE/download.html.
-
(2014)
-
-
Ricker, N.1
-
36
-
-
0029378861
-
Nonlinear model predictive control of the Tennessee Eastman challenge process
-
Ricker N., Lee J. Nonlinear model predictive control of the Tennessee Eastman challenge process. Comput. Chem. Eng. 1995, 19(9):961-981.
-
(1995)
Comput. Chem. Eng.
, vol.19
, Issue.9
, pp. 961-981
-
-
Ricker, N.1
Lee, J.2
-
37
-
-
84874480673
-
SCADA protocol vulnerabilities
-
Springer, Heidelberg, Germany, J. Lopez, R. Setola, S. Wolthusen (Eds.)
-
Rrushi J. SCADA protocol vulnerabilities. Critical Infrastructure Protection Information Infrastructure - Models, Analysis and Defense 2012, 150-176. Springer, Heidelberg, Germany. J. Lopez, R. Setola, S. Wolthusen (Eds.).
-
(2012)
Critical Infrastructure Protection Information Infrastructure - Models, Analysis and Defense
, pp. 150-176
-
-
Rrushi, J.1
-
38
-
-
84918595407
-
Here be backdors: A journey into the secrets of industrial firmware
-
R. Santamarta, Here be backdors: A journey into the secrets of industrial firmware, in: presented at Black Hat USA, 2012.
-
(2012)
presented at Black Hat USA
-
-
Santamarta, R.1
-
39
-
-
84897668937
-
An evaluation of modification attacks on programmable logic controllers
-
Schuett C., Butts J., Dunlap S. An evaluation of modification attacks on programmable logic controllers. Int. J. Crit. Infrastruct. Prot. 2014, 7(1):61-68.
-
(2014)
Int. J. Crit. Infrastruct. Prot.
, vol.7
, Issue.1
, pp. 61-68
-
-
Schuett, C.1
Butts, J.2
Dunlap, S.3
-
41
-
-
84861440639
-
BP America Refinery Explosion: Final Investigation Report
-
Washington, DC
-
U.S. Chemical Safety and Hazard Investigation Board, BP America Refinery Explosion: Final Investigation Report, Report No. 2005-04-I-TX, Washington, DC, 2007.
-
(2007)
-
-
|