-
2
-
-
75149197559
-
Cybercrime against businesses
-
Sep.
-
R. Rantala, "Cybercrime against businesses " , Technical report, U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Statistics, Special Report, Sep. 2008.
-
(2008)
Technical Report, U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Statistics, Special Report
-
-
Rantala, R.1
-
3
-
-
67349092535
-
Vulnerability assessment of cybersecurity for scada systems
-
Nov.
-
C. W. Ten, C. C. Liu and M. Govindarasu, " Vulnerability Assessment of Cybersecurity for SCADA Systems ", , " IEEE Trans. Power Systems, vol. 23, no. 4, pp. 1836-1846, Nov. 2008.
-
(2008)
IEEE Trans. Power Systems
, vol.23
, Issue.4
, pp. 1836-1846
-
-
Ten, C.W.1
Liu, C.C.2
Govindarasu, M.3
-
5
-
-
84882794354
-
A survey of insider attack detection research
-
Springer US
-
M. B. Salem, S. Hershkop, S. J. Stolfo, " A Survey of Insider Attack Detection Research" , Insider Attack and Cyber Security, Advances in Information Security, vol. 39, pp. 69-90, Springer US, 2008.
-
(2008)
Insider Attack and Cyber Security, Advances in Information Security
, vol.39
, pp. 69-90
-
-
Salem, M.B.1
Hershkop, S.2
Stolfo, S.J.3
-
6
-
-
84921030546
-
Malicious insider attacks based colored petri nets approach
-
A. E. Bouchti, A. Haqiq, " Malicious Insider Attacks Based Colored Petri Nets Approach" , Int. Jour. of Engineering & Technology Sciences (IJETS), vol. 1, no. 4, pp. 177-191, 2013.
-
(2013)
Int. Jour. of Engineering & Technology Sciences (IJETS)
, vol.1
, Issue.4
, pp. 177-191
-
-
Bouchti, A.E.1
Haqiq, A.2
-
7
-
-
82155185229
-
Petri net modeling of cyber-physical attacks on smart grid
-
Dec.
-
T. M. Chen, J. C. S. Aarnoutse, and J. Buford, "Petri Net Modeling of Cyber-Physical Attacks on Smart Grid " , IEEE Trans. on Smart Grid, vol. 2, no. 4, pp. 741-749, Dec. 2011.
-
(2011)
IEEE Trans. on Smart Grid
, vol.2
, Issue.4
, pp. 741-749
-
-
Chen, T.M.1
Aarnoutse, J.C.S.2
Buford, J.3
-
8
-
-
70449638991
-
Evaluating the risk of cyber attacks on scada systems via petri net analysis with application to hazardous liquid loading operations
-
M. H. Henry, R. M. Layer, K. Z. Snow, D. R. Zaret, " Evaluating the Risk of Cyber Attacks on SCADA Systems via Petri Net Analysis with Application to Hazardous Liquid Loading Operations ", IEEE Conf. on Technologies for Homeland Security, 2009.
-
(2009)
IEEE Conf. on Technologies for Homeland Security
-
-
Henry, M.H.1
Layer, R.M.2
Snow, K.Z.3
Zaret, D.R.4
-
9
-
-
84874467860
-
Modeling cyber-attack for scada systems using copnet approach
-
Nov.
-
A. E. Bouchti , A. Haqiq, " Modeling Cyber-Attack for SCADA Systems Using CoPNet Approach" , Inter. Conf. on Complex Systems (ICCS), pp. 1-6, Nov. 2012.
-
(2012)
Inter. Conf. on Complex Systems (ICCS)
, pp. 1-6
-
-
Bouchti, A.E.1
Haqiq, A.2
-
10
-
-
84921055570
-
Overview of modelling techniques and tools for SCADA systems under cyber attacks
-
E. Ciancamerla et al., "Overview of modelling techniques and tools for SCADA systems under cyber attacks" , cockpit ci, 2012.
-
(2012)
Cockpit Ci
-
-
Ciancamerla, E.1
-
11
-
-
84888864547
-
An adaptive risk management and access control framework to mitigate insider threats
-
Nov.
-
N. Baracaldo J. Joshi An adaptive risk management and access control framework to mitigate insider threats, Computer & Security, vol.39, part B, 237-254, Nov. 2013.
-
(2013)
Computer & Security
, vol.39
, pp. 237-254
-
-
Baracaldo, N.1
Joshi, J.2
-
12
-
-
84860165830
-
Anomaly detection using model generation for event-based systems without a preexisting formal model
-
L. V. Allen, and D. M. Tilbury, " Anomaly Detection Using Model Generation for Event-Based Systems Without a Preexisting Formal Model" , IEEE Trans. On Systems, Man, and Cybernetircs-Part A: Systems and Humans, vol. 42, no. 3, pp. 654-668, 2012.
-
(2012)
IEEE Trans. on Systems, Man, and Cybernetircs-Part A: Systems and Humans
, vol.42
, Issue.3
, pp. 654-668
-
-
Allen, L.V.1
Tilbury, D.M.2
-
13
-
-
79958813979
-
Assessment of the vulnerabilities of scada, control systems and critical infrastructure systems
-
June
-
R. J. Robles, M. Choi, " Assessment of the Vulnerabilities of SCADA, Control Systems and Critical Infrastructure Systems" , Int. Jour. of Grid and Distributed Computing, vol.2, no.2, June 2009.
-
(2009)
Int. Jour. of Grid and Distributed Computing
, vol.2
, Issue.2
-
-
Robles, R.J.1
Choi, M.2
-
14
-
-
84921054266
-
Scada cyber attacks and security vulnerabilities: Review
-
SERSC
-
J. Fiaidhi, Y. E. Gelogo, " SCADA Cyber Attacks and Security Vulnerabilities: Review" , ACN, ASTL, vol. 14, pp. 202-208, 2012, SERSC.
-
(2012)
ACN, ASTL
, vol.14
, pp. 202-208
-
-
Fiaidhi, J.1
Gelogo, Y.E.2
-
15
-
-
84864415794
-
A log mining approach for process monitoring in scada
-
D. Hadziosmanovic, D. Bolzoni, P.H. Hartel, " A Log Mining Approach for Process Monitoring in SCADA". International Journal of Information Security, vol. 11, no. 4, pp. 231-251, 2012.
-
(2012)
International Journal of Information Security
, vol.11
, Issue.4
, pp. 231-251
-
-
Hadziosmanovic, D.1
Bolzoni, D.2
Hartel, P.H.3
-
17
-
-
84892056298
-
Insider threat assessment: Model, analysis and tool
-
Springer
-
R. Chinchani, D. Ha, A.Iyer, H.Q. Ngo, and S. Upadhyaya, " Insider Threat Assessment: Model, Analysis and Tool" , Network Security, pp. 143-174, Springer, 2010.
-
(2010)
Network Security
, pp. 143-174
-
-
Chinchani, R.1
Ha, D.2
Iyer, A.3
Ngo, H.Q.4
Upadhyaya, S.5
|