메뉴 건너뛰기




Volumn , Issue , 2014, Pages 55-60

Petri net model of insider attacks in SCADA system

Author keywords

Colored petri net; Insider attack; SCADA

Indexed keywords

CHROMIUM COMPOUNDS; PETRI NETS; SECURITY OF DATA;

EID: 84921033095     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCISC.2014.6994022     Document Type: Conference Paper
Times cited : (10)

References (18)
  • 3
    • 67349092535 scopus 로고    scopus 로고
    • Vulnerability assessment of cybersecurity for scada systems
    • Nov.
    • C. W. Ten, C. C. Liu and M. Govindarasu, " Vulnerability Assessment of Cybersecurity for SCADA Systems ", , " IEEE Trans. Power Systems, vol. 23, no. 4, pp. 1836-1846, Nov. 2008.
    • (2008) IEEE Trans. Power Systems , vol.23 , Issue.4 , pp. 1836-1846
    • Ten, C.W.1    Liu, C.C.2    Govindarasu, M.3
  • 7
    • 82155185229 scopus 로고    scopus 로고
    • Petri net modeling of cyber-physical attacks on smart grid
    • Dec.
    • T. M. Chen, J. C. S. Aarnoutse, and J. Buford, "Petri Net Modeling of Cyber-Physical Attacks on Smart Grid " , IEEE Trans. on Smart Grid, vol. 2, no. 4, pp. 741-749, Dec. 2011.
    • (2011) IEEE Trans. on Smart Grid , vol.2 , Issue.4 , pp. 741-749
    • Chen, T.M.1    Aarnoutse, J.C.S.2    Buford, J.3
  • 8
    • 70449638991 scopus 로고    scopus 로고
    • Evaluating the risk of cyber attacks on scada systems via petri net analysis with application to hazardous liquid loading operations
    • M. H. Henry, R. M. Layer, K. Z. Snow, D. R. Zaret, " Evaluating the Risk of Cyber Attacks on SCADA Systems via Petri Net Analysis with Application to Hazardous Liquid Loading Operations ", IEEE Conf. on Technologies for Homeland Security, 2009.
    • (2009) IEEE Conf. on Technologies for Homeland Security
    • Henry, M.H.1    Layer, R.M.2    Snow, K.Z.3    Zaret, D.R.4
  • 9
    • 84874467860 scopus 로고    scopus 로고
    • Modeling cyber-attack for scada systems using copnet approach
    • Nov.
    • A. E. Bouchti , A. Haqiq, " Modeling Cyber-Attack for SCADA Systems Using CoPNet Approach" , Inter. Conf. on Complex Systems (ICCS), pp. 1-6, Nov. 2012.
    • (2012) Inter. Conf. on Complex Systems (ICCS) , pp. 1-6
    • Bouchti, A.E.1    Haqiq, A.2
  • 10
    • 84921055570 scopus 로고    scopus 로고
    • Overview of modelling techniques and tools for SCADA systems under cyber attacks
    • E. Ciancamerla et al., "Overview of modelling techniques and tools for SCADA systems under cyber attacks" , cockpit ci, 2012.
    • (2012) Cockpit Ci
    • Ciancamerla, E.1
  • 11
    • 84888864547 scopus 로고    scopus 로고
    • An adaptive risk management and access control framework to mitigate insider threats
    • Nov.
    • N. Baracaldo J. Joshi An adaptive risk management and access control framework to mitigate insider threats, Computer & Security, vol.39, part B, 237-254, Nov. 2013.
    • (2013) Computer & Security , vol.39 , pp. 237-254
    • Baracaldo, N.1    Joshi, J.2
  • 12
    • 84860165830 scopus 로고    scopus 로고
    • Anomaly detection using model generation for event-based systems without a preexisting formal model
    • L. V. Allen, and D. M. Tilbury, " Anomaly Detection Using Model Generation for Event-Based Systems Without a Preexisting Formal Model" , IEEE Trans. On Systems, Man, and Cybernetircs-Part A: Systems and Humans, vol. 42, no. 3, pp. 654-668, 2012.
    • (2012) IEEE Trans. on Systems, Man, and Cybernetircs-Part A: Systems and Humans , vol.42 , Issue.3 , pp. 654-668
    • Allen, L.V.1    Tilbury, D.M.2
  • 13
    • 79958813979 scopus 로고    scopus 로고
    • Assessment of the vulnerabilities of scada, control systems and critical infrastructure systems
    • June
    • R. J. Robles, M. Choi, " Assessment of the Vulnerabilities of SCADA, Control Systems and Critical Infrastructure Systems" , Int. Jour. of Grid and Distributed Computing, vol.2, no.2, June 2009.
    • (2009) Int. Jour. of Grid and Distributed Computing , vol.2 , Issue.2
    • Robles, R.J.1    Choi, M.2
  • 14
    • 84921054266 scopus 로고    scopus 로고
    • Scada cyber attacks and security vulnerabilities: Review
    • SERSC
    • J. Fiaidhi, Y. E. Gelogo, " SCADA Cyber Attacks and Security Vulnerabilities: Review" , ACN, ASTL, vol. 14, pp. 202-208, 2012, SERSC.
    • (2012) ACN, ASTL , vol.14 , pp. 202-208
    • Fiaidhi, J.1    Gelogo, Y.E.2
  • 17


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.