메뉴 건너뛰기




Volumn 12, Issue 6, 2014, Pages 32-39

Monitoring security of networked control systems: It's the physics

Author keywords

cyber physical system; energy system; intrusion detection; physics; safety engineering; security; specifications

Indexed keywords

EMBEDDED SYSTEMS; INTRUSION DETECTION; PHYSICS; SAFETY ENGINEERING; SPECIFICATIONS;

EID: 84921378651     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2014.122     Document Type: Article
Times cited : (21)

References (17)
  • 1
    • 84874409498 scopus 로고    scopus 로고
    • Networked loads in the distribution grid
    • X. Li et al., "Networked Loads in the Distribution Grid," Proc. APSIPA Ann. Conf., 2012.
    • (2012) Proc. APSIPA Ann. Conf.
    • Li, X.1
  • 3
    • 84902345608 scopus 로고    scopus 로고
    • Lessons learned from the maroochy water breach
    • J. Slay and M. Miller, "Lessons Learned from the Maroochy Water Breach," Critical Infrastructure Protection, vol. 253, 2008, pp. 73-82.
    • (2008) Critical Infrastructure Protection , vol.253 , pp. 73-82
    • Slay, J.1    Miller, M.2
  • 6
    • 80052648896 scopus 로고    scopus 로고
    • Intrusion detection for advanced metering infrastructures: Requirements and architectural directions
    • R. Berthier, W.H. Sanders, and H. Khurana, "Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions," 1st IEEE Int'l Conf. Smart Grid Comm., 2010, pp. 350-355.
    • (2010) 1st IEEE Int'l Conf. Smart Grid Comm. , pp. 350-355
    • Berthier, R.1    Sanders, W.H.2    Khurana, H.3
  • 8
    • 84155167232 scopus 로고    scopus 로고
    • Cyber-physical security of a smart grid infrastructure
    • Y. Mo et al., "Cyber-Physical Security of a Smart Grid Infrastructure," Proc. IEEE, vol. 100, no. 1, 2012, pp. 195-209.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 195-209
    • Mo, Y.1
  • 9
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • C. Ko, M. Ruschitzka, and K. Levitt, "Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach," Proc. IEEE Symp. Security and Privacy, 1997, pp. 175-187.
    • (1997) Proc. IEEE Symp. Security and Privacy , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 11
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Proc. 7th Usenix Security Symp., 1998.
    • (1998) Proc. 7th Usenix Security Symp.
    • Paxson, V.1
  • 12
    • 85080529495 scopus 로고    scopus 로고
    • A hybrid network IDS for protective digital relays in the power transmission grid
    • Nov.
    • G. Koutsandria et al., "A Hybrid Network IDS for Protective Digital Relays in the Power Transmission Grid," Proc. 5th IEEE Int'l Conf. Smart Grid Communications, Nov. 2014.
    • (2014) Proc. 5th IEEE Int'l Conf. Smart Grid Communications
    • Koutsandria, G.1
  • 13
    • 84912084737 scopus 로고    scopus 로고
    • Hybrid control network intrusion detection systems for automated power distribution systems
    • M. Parvania et al., "Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems," Proc. 1st Int'l Workshop Trustworthiness of Smart Grids, 2014, pp. 774-779.
    • (2014) Proc. 1st Int'l Workshop Trustworthiness of Smart Grids , pp. 774-779
    • Parvania, M.1
  • 15
    • 0000600683 scopus 로고
    • A counterexample in stochastic optimum control
    • H.S. Witsenhausen, "A Counterexample in Stochastic Optimum Control," SIAM J. Control, vol. 6, no. 1, 1968, pp. 131-147.
    • (1968) SIAM J. Control , vol.6 , Issue.1 , pp. 131-147
    • Witsenhausen, H.S.1
  • 16
    • 64149120662 scopus 로고    scopus 로고
    • Foundations of control and estimation over lossy networks
    • L. Schenato et al., "Foundations of Control and Estimation over Lossy Networks," Proc. IEEE, vol. 95, no. 1, 2007, pp. 163-187.
    • (2007) Proc. IEEE , vol.95 , Issue.1 , pp. 163-187
    • Schenato, L.1
  • 17
    • 3843074264 scopus 로고    scopus 로고
    • Control under communication constraints
    • S. Tatikonda and S. Mitter, "Control under Communication Constraints," IEEE Trans. Automatic Control, vol. 49, no. 7, 2004, pp. 1056-1068.
    • (2004) IEEE Trans. Automatic Control , vol.49 , Issue.7 , pp. 1056-1068
    • Tatikonda, S.1    Mitter, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.