메뉴 건너뛰기




Volumn 8, Issue , 2015, Pages 53-66

Critical infrastructure protection: Requirements and challenges for the 21st century

Author keywords

Challenges; Critical infrastructure protection; Requirements; Risk; SCADA systems; Security

Indexed keywords

COMPUTER SIMULATION; NETWORK ARCHITECTURE; PUBLIC WORKS; RISKS; SCADA SYSTEMS; WIDE AREA NETWORKS;

EID: 84922217316     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2014.12.002     Document Type: Article
Times cited : (222)

References (87)
  • 1
    • 70350600944 scopus 로고    scopus 로고
    • Adaptive dispatching of incidents based on reputation for SCADA systems
    • in: Proceedings of the Sixth International Conference on Trust, Privacy and Security in Digital Business
    • C. Alcaraz, I. Agudo, C. Fernandez-Gago, R. Roman, G. Fernandez, J. Lopez, Adaptive dispatching of incidents based on reputation for SCADA systems, in: Proceedings of the Sixth International Conference on Trust, Privacy and Security in Digital Business, 2009, pp. 86-94.
    • (2009) , pp. 86-94
    • Alcaraz, C.1    Agudo, I.2    Fernandez-Gago, C.3    Roman, R.4    Fernandez, G.5    Lopez, J.6
  • 2
    • 84857177092 scopus 로고    scopus 로고
    • Managing incidents in smart grids a la cloud
    • in: Proceedings of the Third IEEE International Conference on Cloud Computing Technology and Science
    • C. Alcaraz, I. Agudo, D. Nunez, J. Lopez, Managing incidents in smart grids a la cloud, in: Proceedings of the Third IEEE International Conference on Cloud Computing Technology and Science, 2011, pp. 527-531.
    • (2011) , pp. 527-531
    • Alcaraz, C.1    Agudo, I.2    Nunez, D.3    Lopez, J.4
  • 3
    • 84857420168 scopus 로고    scopus 로고
    • Early warning system for cascading effect control in energy control systems
    • in: Proceedings of the Fifth International Conference on Critical Information Infrastructures Security
    • C. Alcaraz, A. Balastegui, J. Lopez, Early warning system for cascading effect control in energy control systems, in: Proceedings of the Fifth International Conference on Critical Information Infrastructures Security, 2010, pp. 55-67.
    • (2010) , pp. 55-67
    • Alcaraz, C.1    Balastegui, A.2    Lopez, J.3
  • 5
    • 82155162319 scopus 로고    scopus 로고
    • An early warning system based on reputation for energy control systems
    • Alcaraz C., Fernandez-Gago C., Lopez J. An early warning system based on reputation for energy control systems. IEEE Trans. Smart Grid 2011, 2(4):827-834.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 827-834
    • Alcaraz, C.1    Fernandez-Gago, C.2    Lopez, J.3
  • 6
    • 77953688880 scopus 로고    scopus 로고
    • A security analysis for wireless sensor mesh networks in highly critical systems
    • Alcaraz C., Lopez J. A security analysis for wireless sensor mesh networks in highly critical systems. IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev. 2010, 40(4):419-428.
    • (2010) IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev. , vol.40 , Issue.4 , pp. 419-428
    • Alcaraz, C.1    Lopez, J.2
  • 7
    • 84870372575 scopus 로고    scopus 로고
    • Analysis of requirements for critical control systems
    • Alcaraz C., Lopez J. Analysis of requirements for critical control systems. Int. J. Crit. Infrastruct. Prot. 2012, 5(3-4):137-145.
    • (2012) Int. J. Crit. Infrastruct. Prot. , vol.5 , Issue.3-4 , pp. 137-145
    • Alcaraz, C.1    Lopez, J.2
  • 8
    • 84876124711 scopus 로고    scopus 로고
    • Wide-area situational awareness for critical infrastructure protection
    • Alcaraz C., Lopez J. Wide-area situational awareness for critical infrastructure protection. IEEE Comput. 2013, 46(4):30-37.
    • (2013) IEEE Comput. , vol.46 , Issue.4 , pp. 30-37
    • Alcaraz, C.1    Lopez, J.2
  • 9
    • 84870299675 scopus 로고    scopus 로고
    • Selecting key management schemes for WSN applications
    • Alcaraz C., Lopez J., Roman R., Chen H. Selecting key management schemes for WSN applications. Comput. Secur. 2012, 31(8):956-966.
    • (2012) Comput. Secur. , vol.31 , Issue.8 , pp. 956-966
    • Alcaraz, C.1    Lopez, J.2    Roman, R.3    Chen, H.4
  • 10
    • 80051531036 scopus 로고    scopus 로고
    • Secure SCADA framework for the protection of energy control systems
    • Alcaraz C., Lopez J., Zhou J., Roman R. Secure SCADA framework for the protection of energy control systems. Concurr. Comput. Pract. Exp. 2011, 23(12):1414-1430.
    • (2011) Concurr. Comput. Pract. Exp. , vol.23 , Issue.12 , pp. 1414-1430
    • Alcaraz, C.1    Lopez, J.2    Zhou, J.3    Roman, R.4
  • 11
    • 84875751668 scopus 로고    scopus 로고
    • Security of industrial sensor network based remote substations in the context of the Internet of Things
    • Alcaraz C., Roman R., Najera P., Lopez J. Security of industrial sensor network based remote substations in the context of the Internet of Things. Ad Hoc Netw. 2013, 11(3):1091-1104.
    • (2013) Ad Hoc Netw. , vol.11 , Issue.3 , pp. 1091-1104
    • Alcaraz, C.1    Roman, R.2    Najera, P.3    Lopez, J.4
  • 12
    • 84887937959 scopus 로고    scopus 로고
    • Critical control system protection in the 21st century
    • Alcaraz C., Zeadally S. Critical control system protection in the 21st century. IEEE Comput. 2013, 46(4):74-83.
    • (2013) IEEE Comput. , vol.46 , Issue.4 , pp. 74-83
    • Alcaraz, C.1    Zeadally, S.2
  • 13
    • 84898185374 scopus 로고    scopus 로고
    • American Petroleum Institute, American Petroleum Institute, Washington, DC
    • API Standard 1164: Pipeline SCADA Security 2009, American Petroleum Institute, American Petroleum Institute, Washington, DC. 2nd ed.
    • (2009) API Standard 1164: Pipeline SCADA Security
  • 14
    • 84922214968 scopus 로고    scopus 로고
    • Internet of Energy for Electric Mobility, SINTEF, Oslo, Norway
    • ARTEMIS Project, Internet of Energy for Electric Mobility, SINTEF, Oslo, Norway, 2011.
    • (2011)
  • 15
    • 84922247469 scopus 로고    scopus 로고
    • Internet Protocols for the Smart Grid, RFC 6272
    • F. Baker, D. Meyer, Internet Protocols for the Smart Grid, RFC 6272, 2011.
    • (2011)
    • Baker, F.1    Meyer, D.2
  • 16
    • 77953719458 scopus 로고    scopus 로고
    • Towards a European research agenda for CIIP. results from the CI2RCO Project
    • Springer, Heidelberg, Germany, J. Lopez, B. Hammerli (Eds.)
    • Bendisch U., Bologna S., Le Grand G., Luiijf E. Towards a European research agenda for CIIP. results from the CI2RCO Project. Critical Information Infrastructures Security 2008, 1-12. Springer, Heidelberg, Germany. J. Lopez, B. Hammerli (Eds.).
    • (2008) Critical Information Infrastructures Security , pp. 1-12
    • Bendisch, U.1    Bologna, S.2    Le Grand, G.3    Luiijf, E.4
  • 17
    • 0034592897 scopus 로고    scopus 로고
    • Characteristics of scalability and their impact on performance
    • in: Proceedings of the Second International Workshop on Software and Performance
    • A. Bondi, Characteristics of scalability and their impact on performance, in: Proceedings of the Second International Workshop on Software and Performance, 2000, pp. 195-203.
    • (2000) , pp. 195-203
    • Bondi, A.1
  • 18
    • 0036994686 scopus 로고    scopus 로고
    • Self-stabilizing mutual exclusion using tokens in mobile ad hoc networks
    • in: Proceedings of the Sixth International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications
    • Y. Chen, J. Welch, Self-stabilizing mutual exclusion using tokens in mobile ad hoc networks, in: Proceedings of the Sixth International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, 2002, pp. 34-42.
    • (2002) , pp. 34-42
    • Chen, Y.1    Welch, J.2
  • 19
    • 84922254670 scopus 로고    scopus 로고
    • Testbed Framework to Exercise Critical Infrastructure Protection
    • National Institute of Communication Technologies, Leon, Spain
    • CloudCERT, Testbed Framework to Exercise Critical Infrastructure Protection, National Institute of Communication Technologies, Leon, Spain, 2012.
    • (2012)
  • 20
    • 84922269042 scopus 로고    scopus 로고
    • Nations must talk to halt "cyber terrorism
    • Kaspersky, Reuters, June 6
    • T. Cohen, M. Lubell, Nations must talk to halt "cyber terrorism:" Kaspersky, Reuters, June 6, 2012.
    • (2012)
    • Cohen, T.1    Lubell, M.2
  • 21
    • 84922238853 scopus 로고    scopus 로고
    • Belleville, Michigan
    • Colloquium for Information Systems Security Education, Belleville, Michigan 〈〉, 2014. http://www.cisse.info.
    • (2014)
  • 22
    • 0033873163 scopus 로고    scopus 로고
    • Self-stabilizing mutual exclusion using an unfair distributed scheduler
    • in: Proceedings of the Fourteenth International Parallel and Distributed Processing Symposium
    • A. Datta, M. Gradinariu, S. Tixeuil, Self-stabilizing mutual exclusion using an unfair distributed scheduler, in: Proceedings of the Fourteenth International Parallel and Distributed Processing Symposium, 2000, pp. 465-470.
    • (2000) , pp. 465-470
    • Datta, A.1    Gradinariu, M.2    Tixeuil, S.3
  • 23
    • 84976834622 scopus 로고
    • Self-stabilizing systems in spite of distributed control
    • Dijkstra E. Self-stabilizing systems in spite of distributed control. Commun. ACM 1974, 17(11):643-644.
    • (1974) Commun. ACM , vol.17 , Issue.11 , pp. 643-644
    • Dijkstra, E.1
  • 24
    • 33646239120 scopus 로고    scopus 로고
    • Critical Infrastructure Protection in the Fight Against Terrorism
    • COM(2004) 702 Final, Brussels, Belgium
    • European Commission, Critical Infrastructure Protection in the Fight Against Terrorism, COM(2004) 702 Final, Brussels, Belgium, 2004.
    • (2004)
  • 25
    • 33847681369 scopus 로고    scopus 로고
    • Green Paper on a European Programme for Critical Infrastructure Protection
    • COM(2005) 576 Final, Brussels, Belgium
    • European Commission, Green Paper on a European Programme for Critical Infrastructure Protection, COM(2005) 576 Final, Brussels, Belgium, 2005.
    • (2005)
  • 26
    • 58049140477 scopus 로고    scopus 로고
    • Communication from the Commission on a European Programme for Critical Infrastructure Protection
    • COM(2006) 786 Final, Brussels, Belgium
    • European Commission, Communication from the Commission on a European Programme for Critical Infrastructure Protection, COM(2006) 786 Final, Brussels, Belgium, 2006.
    • (2006)
  • 27
    • 84922258513 scopus 로고    scopus 로고
    • Exemys, Exemys, Buenos Aires, Argentina
    • Exemys, Exemys, Buenos Aires, Argentina 〈〉, 2014. http://www.exemys.com.
    • (2014)
  • 28
    • 70349619163 scopus 로고    scopus 로고
    • Industrial wireless sensor networks. challenges, design principles and technical approaches
    • Gungor V., Hancke G. Industrial wireless sensor networks. challenges, design principles and technical approaches. IEEE Trans. Ind. Electron. 2009, 56(10):4258-4265.
    • (2009) IEEE Trans. Ind. Electron. , vol.56 , Issue.10 , pp. 4258-4265
    • Gungor, V.1    Hancke, G.2
  • 29
    • 84922238513 scopus 로고    scopus 로고
    • AGA 12, Part 2, Performance Test Plan
    • National SCADA Test Bed, Office of Electricity Delivery and Energy Reliability, U.S. Department of Energy, Washington, DC
    • M. Hadley, K. Huston, AGA 12, Part 2, Performance Test Plan, National SCADA Test Bed, Office of Electricity Delivery and Energy Reliability, U.S. Department of Energy, Washington, DC, 2006.
    • (2006)
    • Hadley, M.1    Huston, K.2
  • 30
    • 79952921853 scopus 로고    scopus 로고
    • A taxonomy of cyber events affecting communities
    • in: Proceedings of the Forty-Fourth Hawaii International Conference on System Sciences
    • K. Harrison and G. White, A taxonomy of cyber events affecting communities, in: Proceedings of the Forty-Fourth Hawaii International Conference on System Sciences, 2011.
    • (2011)
    • Harrison, K.1    White, G.2
  • 31
    • 84922224046 scopus 로고    scopus 로고
    • WirelessHART Technical Notes
    • HART Communication Foundation, WirelessHART Technical Notes 〈〉, 2014. http://en.hartcomm.org/hcp/tech/articles/wiHART_resources/witech_witechnote.html.
    • (2014)
  • 32
    • 58049207917 scopus 로고    scopus 로고
    • Alarm association rules based on a sequential pattern mining algorithm
    • in: Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery
    • S. Hou, X. Zhang, Alarm association rules based on a sequential pattern mining algorithm, in: Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, vol. 2, 2008, pp. 556-560.
    • (2008) , vol.2 , pp. 556-560
    • Hou, S.1    Zhang, X.2
  • 33
    • 84922266276 scopus 로고
    • IEEE Standard 610-1990-IEEE Standard Computer Dictionary
    • Piscataway, New Jersey
    • Institute of Electrical and Electronics Engineers, IEEE Standard 610-1990-IEEE Standard Computer Dictionary: A Compilation of IEEE Standard Computer Glossaries, Piscataway, New Jersey, 1990.
    • (1990) A Compilation of IEEE Standard Computer Glossaries
  • 34
    • 28444481229 scopus 로고    scopus 로고
    • IEEE Standard 1402-2000-IEEE Guide for Electric Power Substation Physical and Electronic Security
    • Piscataway, New Jersey
    • Institute of Electrical and Electronics Engineers, IEEE Standard 1402-2000-IEEE Guide for Electric Power Substation Physical and Electronic Security, Piscataway, New Jersey, 2000.
    • (2000)
  • 35
    • 84922260338 scopus 로고    scopus 로고
    • IEEE Standard 802.15.4d-200p-IEEE Standard for Information Technology-Local and Metropolitan Area Networks-Specific Requirements-Part 15.4
    • Alternative Physical Layer Extension to Support the Japanese 950MHz Bands, Piscataway, New Jersey
    • Institute of Electrical and Electronics Engineers, IEEE Standard 802.15.4d-200p-IEEE Standard for Information Technology-Local and Metropolitan Area Networks-Specific Requirements-Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), Amendment 3: Alternative Physical Layer Extension to Support the Japanese 950MHz Bands, Piscataway, New Jersey, 2009.
    • Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), Amendment 3 , pp. 2009
  • 36
    • 84905665259 scopus 로고    scopus 로고
    • IEC 62351: Power Systems Management and Associated Information Exchange-Data and Communications Security
    • Geneva, Switzerland
    • International Electrotechnical Commission, IEC 62351: Power Systems Management and Associated Information Exchange-Data and Communications Security, Geneva, Switzerland, 2013.
    • (2013)
  • 41
    • 84922246202 scopus 로고    scopus 로고
    • ANSI/ISA-100.11a-2011 Wireless Systems for Industrial Automation
    • Research Triangle Park, North Carolina
    • International Society of Automation, ANSI/ISA-100.11a-2011 Wireless Systems for Industrial Automation: Process Control and Related Applications, Research Triangle Park, North Carolina, 2011.
    • (2011) Process Control and Related Applications
  • 42
    • 84922250154 scopus 로고    scopus 로고
    • Security for Industrial Automation and Control Systems, Security Technologies for Industrial Automation and Control Systems
    • Research Triangle Park, North Carolina
    • International Society of Automation, Security for Industrial Automation and Control Systems, Security Technologies for Industrial Automation and Control Systems, ISA-TR62443-3-1 (99.03.01), Research Triangle Park, North Carolina, 2012.
    • (2012) ISA-TR62443-3-1 (99.03.01)
  • 43
    • 51849130444 scopus 로고    scopus 로고
    • A web-based expert system shell for fault diagnosis and control of power system equipment
    • in: Proceedings of the International Conference on Condition Monitoring and Diagnosis
    • M. Jain, A. Jain, M. Srinivas, A web-based expert system shell for fault diagnosis and control of power system equipment, in: Proceedings of the International Conference on Condition Monitoring and Diagnosis, 2008, pp. 1310-1313.
    • (2008) , pp. 1310-1313
    • Jain, M.1    Jain, A.2    Srinivas, M.3
  • 44
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Josang A., Ismail R., Boyd C. A survey of trust and reputation systems for online service provision. Decis. Support Syst. 2007, 43(2):618-644.
    • (2007) Decis. Support Syst. , vol.43 , Issue.2 , pp. 618-644
    • Josang, A.1    Ismail, R.2    Boyd, C.3
  • 45
    • 80051651344 scopus 로고    scopus 로고
    • Privacy for smart meters: towards undetectable appliance load signatures
    • in: Proceedings of the First IEEE International Conference on Smart Grid Communications
    • G. Kalogridis, C. Efthymiou, S. Denic, T. Lewis, R. Cepeda, Privacy for smart meters: towards undetectable appliance load signatures, in: Proceedings of the First IEEE International Conference on Smart Grid Communications, 2010, pp. 232-237.
    • (2010) , pp. 232-237
    • Kalogridis, G.1    Efthymiou, C.2    Denic, S.3    Lewis, T.4    Cepeda, R.5
  • 46
    • 84911113717 scopus 로고    scopus 로고
    • The cooperative Internet of Things enabled smart grid
    • in: Proceedings of the Fourteenth IEEE International Symposium on Consumer Electronics
    • S. Karnouskos, The cooperative Internet of Things enabled smart grid, in: Proceedings of the Fourteenth IEEE International Symposium on Consumer Electronics, 2010.
    • (2010)
    • Karnouskos, S.1
  • 48
    • 67650320950 scopus 로고    scopus 로고
    • A survey of computational location privacy
    • Krumm J. A survey of computational location privacy. Pers. Ubiquitous Comput. 2009, 13(6):391-399.
    • (2009) Pers. Ubiquitous Comput. , vol.13 , Issue.6 , pp. 391-399
    • Krumm, J.1
  • 49
    • 0037377597 scopus 로고    scopus 로고
    • SCADA and IP: is network convergence really here?
    • McClanahan R. SCADA and IP: is network convergence really here?. IEEE Ind. Appl. 2003, 9(2):29-36.
    • (2003) IEEE Ind. Appl. , vol.9 , Issue.2 , pp. 29-36
    • McClanahan, R.1
  • 50
    • 33746690237 scopus 로고    scopus 로고
    • Transmission of IPv6 Packets over IEEE 802.15.4 Networks
    • RFC 4944
    • G. Montenegro, N. Kushalnagar, J. Hui, D. Culler, Transmission of IPv6 Packets over IEEE 802.15.4 Networks, RFC 4944, 2007.
    • (2007)
    • Montenegro, G.1    Kushalnagar, N.2    Hui, J.3    Culler, D.4
  • 51
    • 34047192955 scopus 로고    scopus 로고
    • Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks
    • London, United Kingdom
    • National Infrastructure Security Coordination Centre, Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks, London, United Kingdom, 2005.
    • (2005)
  • 52
    • 84922263222 scopus 로고    scopus 로고
    • Guidelines for Smart Grid Cyber Security
    • Smart Grid Cyber Security Strategy, Architecture and High-Level Requirements, NISTIR 7628, Gaithersburg, Maryland
    • National Institute of Standards and Technology, Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture and High-Level Requirements, NISTIR 7628, Gaithersburg, Maryland, 2010.
    • (2010) , vol.1
  • 53
    • 84922263222 scopus 로고    scopus 로고
    • Guidelines for Smart Grid Cyber Security
    • Supportive Analyses and References, NISTIR 7628, Gaithersburg, Maryland
    • National Institute of Standards and Technology, Guidelines for Smart Grid Cyber Security: Vol. 3, Supportive Analyses and References, NISTIR 7628, Gaithersburg, Maryland, 2010.
    • (2010) , vol.3
  • 54
    • 72449191827 scopus 로고    scopus 로고
    • NIST Framework and Roadmap for Smart Grid Interoperability Standards
    • Release 2.0, NIST Special Publication 1108 R2, Gaithersburg, Maryland
    • National Institute of Standards and Technology, NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0, NIST Special Publication 1108 R2, Gaithersburg, Maryland, 2012.
    • (2012)
  • 55
    • 84885817796 scopus 로고    scopus 로고
    • Security and Privacy Controls for Federal Information Systems and Organizations
    • NIST Special Publication 800-53, Revision 4, Gaithersburg, Maryland
    • National Institute of Standards and Technology, Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Publication 800-53, Revision 4, Gaithersburg, Maryland, 2013.
    • (2013)
  • 56
    • 84922215066 scopus 로고    scopus 로고
    • CIP-002: Critical Cyber Asset Identification, NERC CIP Standard, Washington, DC
    • North American Electric Reliability Corporation, CIP-002: Critical Cyber Asset Identification, NERC CIP Standard, Washington, DC, 2009.
    • (2009)
  • 58
    • 78649673610 scopus 로고    scopus 로고
    • Opportunities and challenges of wireless communications technologies for smart grid applications
    • in: Proceedings of the IEEE Power and Energy Society General Meeting
    • P. Parikh, M. Kanabar, T. Sidhu, Opportunities and challenges of wireless communications technologies for smart grid applications, in: Proceedings of the IEEE Power and Energy Society General Meeting, 2010.
    • (2010)
    • Parikh, P.1    Kanabar, M.2    Sidhu, T.3
  • 59
    • 79751478211 scopus 로고    scopus 로고
    • A survey on self-healing systems. approaches and systems
    • Psaier H., Dustdar S. A survey on self-healing systems. approaches and systems. Computing 2011, 91(1):43-73.
    • (2011) Computing , vol.91 , Issue.1 , pp. 43-73
    • Psaier, H.1    Dustdar, S.2
  • 60
    • 84922255410 scopus 로고    scopus 로고
    • A survey on modeling and simulation of interdependent critical infrastructures
    • in: Proceedings of the Third IEEE Benelux Young Researchers Symposium in Electrical Power Engineering, paper 44
    • T. Rigole, G. Deconinck, A survey on modeling and simulation of interdependent critical infrastructures, in: Proceedings of the Third IEEE Benelux Young Researchers Symposium in Electrical Power Engineering, paper 44, 2006.
    • (2006)
    • Rigole, T.1    Deconinck, G.2
  • 61
    • 73549113094 scopus 로고    scopus 로고
    • A taxonomy and survey of cloud computing systems
    • in: Proceedings of the Fifth International Joint Conference on INC, IMS and IDC
    • B. Rimal, C. Eunmi, I. Lumb, A taxonomy and survey of cloud computing systems, in: Proceedings of the Fifth International Joint Conference on INC, IMS and IDC, 2009, pp. 44-51.
    • (2009) , pp. 44-51
    • Rimal, B.1    Eunmi, C.2    Lumb, I.3
  • 62
    • 12344298391 scopus 로고    scopus 로고
    • Modeling and simulating critical infrastructures and their interdependencies
    • in: Proceedings of the Thirty-Seventh Annual Conference on Hawaii International System Sciences
    • S. Rinaldi, Modeling and simulating critical infrastructures and their interdependencies, in: Proceedings of the Thirty-Seventh Annual Conference on Hawaii International System Sciences, 2004.
    • (2004)
    • Rinaldi, S.1
  • 63
    • 0035696915 scopus 로고    scopus 로고
    • Identifying, understanding and analyzing critical infrastructure interdependencies
    • Rinaldi S., Peerenboom J., Kelly T. Identifying, understanding and analyzing critical infrastructure interdependencies. IEEE Control Syst. 2001, 21(6):11-25.
    • (2001) IEEE Control Syst. , vol.21 , Issue.6 , pp. 11-25
    • Rinaldi, S.1    Peerenboom, J.2    Kelly, T.3
  • 64
    • 34249727108 scopus 로고    scopus 로고
    • The role of wireless sensor networks in the area of critical information infrastructure protection
    • Roman R., Alcaraz C., Lopez J. The role of wireless sensor networks in the area of critical information infrastructure protection. Inf. Secur. Tech. Rep. 2007, 12(1):24-31.
    • (2007) Inf. Secur. Tech. Rep. , vol.12 , Issue.1 , pp. 24-31
    • Roman, R.1    Alcaraz, C.2    Lopez, J.3
  • 65
    • 80052854156 scopus 로고    scopus 로고
    • Securing the Internet of Things
    • Roman R., Najera P., Lopez J. Securing the Internet of Things. IEEE Comput. 2011, 44(9):51-58.
    • (2011) IEEE Comput. , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 66
    • 77957220418 scopus 로고    scopus 로고
    • T-patterns revisited. mining for temporal patterns in sensor data
    • Salah A., Pauwels E., Tavenard R., Gevers T. T-patterns revisited. mining for temporal patterns in sensor data. Sensors 2010, 10(8):7496-7513.
    • (2010) Sensors , vol.10 , Issue.8 , pp. 7496-7513
    • Salah, A.1    Pauwels, E.2    Tavenard, R.3    Gevers, T.4
  • 68
    • 84922254413 scopus 로고    scopus 로고
    • Self-Management for Large-Scale Distributed Systems based on Structured Overlay Networks and Components
    • Catholic University of Louvain, Louvain-la-Neuve, Belgium
    • SELFMAN Project, Self-Management for Large-Scale Distributed Systems based on Structured Overlay Networks and Components, Catholic University of Louvain, Louvain-la-Neuve, Belgium, 2010.
    • (2010)
  • 69
    • 84922229443 scopus 로고    scopus 로고
    • Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD), Menlo Park, California
    • SRI International, Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD), Menlo Park, California 〈〉, 2014. http://www.csl.sri.com/projects/emerald.
    • (2014)
  • 70
    • 80052200676 scopus 로고    scopus 로고
    • Research of Internet based supervisory control and information system
    • in: Proceedings of the International Conference on Recent Trends in Information Technology
    • K. Suresh, R. Kirubashankar, K. Krishnamurthy, Research of Internet based supervisory control and information system, in: Proceedings of the International Conference on Recent Trends in Information Technology, 2011, pp. 1180-1185.
    • (2011) , pp. 1180-1185
    • Suresh, K.1    Kirubashankar, R.2    Krishnamurthy, K.3
  • 71
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Takabi H., Joshi J., Ahn G. Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 2010, 8(6):24-31.
    • (2010) IEEE Secur. Priv. , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.2    Ahn, G.3
  • 72
    • 84922238922 scopus 로고    scopus 로고
    • The White House, President Obama announces $3.4 billion investment to spur transition to smart energy grid, Washington, DC, October 27
    • The White House, President Obama announces $3.4 billion investment to spur transition to smart energy grid, Washington, DC, October 27, 2009.
    • (2009)
  • 73
    • 84922247976 scopus 로고    scopus 로고
    • National Infrastructure Protection Plan (NIPP), Washington, DC
    • U.S. Department of Homeland Security, National Infrastructure Protection Plan (NIPP), Washington, DC, 2009.
    • (2009)
  • 74
    • 84922227142 scopus 로고    scopus 로고
    • Catalog of Control Systems Security
    • Recommendations for Standards Developers, Washington, DC
    • U.S. Department of Homeland Security, Catalog of Control Systems Security: Recommendations for Standards Developers, Washington, DC, 2011.
  • 75
    • 84922225245 scopus 로고    scopus 로고
    • Critical Infrastructure Protection, Challenges in Securing Control Systems, Robert F. Dacey, Testimony before the Subcommittee on Technology
    • Information Policy, Intergovernmental Relations and the Census, House Committee on Government Reform, GAO-04-140T, Washington, DC
    • U.S. General Accounting Office, Critical Infrastructure Protection, Challenges in Securing Control Systems, Robert F. Dacey, Testimony before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, House Committee on Government Reform, GAO-04-140T, Washington, DC, 2003.
    • (2003)
  • 76
    • 84922224634 scopus 로고    scopus 로고
    • Critical Infrastructure Protection
    • Cybersecurity Guidance is Available, but More can be Done to Promote its Use, Report to Congressional Requesters, GAO-12-92, Washington, DC
    • U.S. General Accounting Office, Critical Infrastructure Protection, Cybersecurity Guidance is Available, but More can be Done to Promote its Use, Report to Congressional Requesters, GAO-12-92, Washington, DC, 2011.
    • (2011)
  • 77
    • 84922237474 scopus 로고    scopus 로고
    • Homeland Security Act 2002-Public Law 107-296
    • Washington, DC
    • U.S. Government, Homeland Security Act 2002-Public Law 107-296, Washington, DC, 2002.
  • 78
    • 84922213384 scopus 로고    scopus 로고
    • WebSCADA, Irvine, California
    • WebSCADA Corporation, WebSCADA, Irvine, California 〈〉, 2014. http://www.webscada.com.
    • (2014)
  • 79
    • 84922266104 scopus 로고    scopus 로고
    • Microchip MiWi P2P Wireless Protocol, AN1204, Microchip Technology, Chandler, Arizona
    • Y. Yang, Microchip MiWi P2P Wireless Protocol, AN1204, Microchip Technology, Chandler, Arizona, 2010.
    • (2010)
    • Yang, Y.1
  • 80
    • 84922251121 scopus 로고    scopus 로고
    • Yokogawa, Yokogawa Electric Corporation, Tokyo, Japan
    • Yokogawa, Yokogawa Electric Corporation, Tokyo, Japan 〈〉, 2014. http://www.yokogawa.com.
    • (2014)
  • 81
    • 2442526701 scopus 로고    scopus 로고
    • Unsupervised learning techniques for an intrusion detection system
    • in: Proceedings of the ACM Symposium on Applied Computing
    • S. Zanero, S. Savaresi, Unsupervised learning techniques for an intrusion detection system, in: Proceedings of the ACM Symposium on Applied Computing, 2004, pp. 412-419.
    • (2004) , pp. 412-419
    • Zanero, S.1    Savaresi, S.2
  • 82
    • 84922220427 scopus 로고    scopus 로고
    • Securing cyberspace in the 21st century
    • Zeadally S., Martinez G., Chao H. Securing cyberspace in the 21st century. IEEE Comput. 2013, 46(4):22-23.
    • (2013) IEEE Comput. , vol.46 , Issue.4 , pp. 22-23
    • Zeadally, S.1    Martinez, G.2    Chao, H.3
  • 84
    • 77954761754 scopus 로고    scopus 로고
    • An adaptive QoS-aware fault-tolerance strategy for web services
    • Zheng Z., Lyu M. An adaptive QoS-aware fault-tolerance strategy for web services. Empir. Softw. Eng. 2010, 15(4):323-345.
    • (2010) Empir. Softw. Eng. , vol.15 , Issue.4 , pp. 323-345
    • Zheng, Z.1    Lyu, M.2
  • 85
    • 84857516371 scopus 로고    scopus 로고
    • A taxonomy of cyber attacks on SCADA systems
    • in: Proceedings of the International Conference on the Internet of Things and the Fourth International Conference on Cyber, Physical and Social Computing
    • B. Zhu, A. Joseph, S. Sastry, A taxonomy of cyber attacks on SCADA systems, in: Proceedings of the International Conference on the Internet of Things and the Fourth International Conference on Cyber, Physical and Social Computing, 2011, pp. 380-388.
    • (2011) , pp. 380-388
    • Zhu, B.1    Joseph, A.2    Sastry, S.3
  • 86
    • 67650257654 scopus 로고    scopus 로고
    • Optimizing extensibility in hard real-time distributed systems
    • in: Proceedings of the Fifteenth IEEE Real-Time and Embedded Technology and Applications Symposium
    • Q. Zhu, Y. Yang, E. Scholte, M. Natale, A. Sangiovanni-Vicentelli, Optimizing extensibility in hard real-time distributed systems, in: Proceedings of the Fifteenth IEEE Real-Time and Embedded Technology and Applications Symposium, 2009, pp. 275-284.
    • (2009) , pp. 275-284
    • Zhu, Q.1    Yang, Y.2    Scholte, E.3    Natale, M.4    Sangiovanni-Vicentelli, A.5
  • 87
    • 84922268368 scopus 로고    scopus 로고
    • ZigBee-2007 Layer PICS and Stack Profiles, Revision 3, ZigBee Document 08006r03, San Ramon, California
    • ZigBee Alliance, ZigBee-2007 Layer PICS and Stack Profiles, Revision 3, ZigBee Document 08006r03, San Ramon, California, 2008.
    • (2008)
    • Alliance, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.