-
1
-
-
70350600944
-
Adaptive dispatching of incidents based on reputation for SCADA systems
-
in: Proceedings of the Sixth International Conference on Trust, Privacy and Security in Digital Business
-
C. Alcaraz, I. Agudo, C. Fernandez-Gago, R. Roman, G. Fernandez, J. Lopez, Adaptive dispatching of incidents based on reputation for SCADA systems, in: Proceedings of the Sixth International Conference on Trust, Privacy and Security in Digital Business, 2009, pp. 86-94.
-
(2009)
, pp. 86-94
-
-
Alcaraz, C.1
Agudo, I.2
Fernandez-Gago, C.3
Roman, R.4
Fernandez, G.5
Lopez, J.6
-
2
-
-
84857177092
-
Managing incidents in smart grids a la cloud
-
in: Proceedings of the Third IEEE International Conference on Cloud Computing Technology and Science
-
C. Alcaraz, I. Agudo, D. Nunez, J. Lopez, Managing incidents in smart grids a la cloud, in: Proceedings of the Third IEEE International Conference on Cloud Computing Technology and Science, 2011, pp. 527-531.
-
(2011)
, pp. 527-531
-
-
Alcaraz, C.1
Agudo, I.2
Nunez, D.3
Lopez, J.4
-
3
-
-
84857420168
-
Early warning system for cascading effect control in energy control systems
-
in: Proceedings of the Fifth International Conference on Critical Information Infrastructures Security
-
C. Alcaraz, A. Balastegui, J. Lopez, Early warning system for cascading effect control in energy control systems, in: Proceedings of the Fifth International Conference on Critical Information Infrastructures Security, 2010, pp. 55-67.
-
(2010)
, pp. 55-67
-
-
Alcaraz, C.1
Balastegui, A.2
Lopez, J.3
-
4
-
-
84873810390
-
Security aspects of SCADA and DCS environments
-
Springer, Berlin, Heidelberg, Germany, J. Lopez, R. Setola, S. Wolthusen (Eds.)
-
Alcaraz C., Fernandez G., Carvajal F. Security aspects of SCADA and DCS environments. Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis and Defense 2011, 120-149. Springer, Berlin, Heidelberg, Germany. J. Lopez, R. Setola, S. Wolthusen (Eds.).
-
(2011)
Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis and Defense
, pp. 120-149
-
-
Alcaraz, C.1
Fernandez, G.2
Carvajal, F.3
-
5
-
-
82155162319
-
An early warning system based on reputation for energy control systems
-
Alcaraz C., Fernandez-Gago C., Lopez J. An early warning system based on reputation for energy control systems. IEEE Trans. Smart Grid 2011, 2(4):827-834.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 827-834
-
-
Alcaraz, C.1
Fernandez-Gago, C.2
Lopez, J.3
-
6
-
-
77953688880
-
A security analysis for wireless sensor mesh networks in highly critical systems
-
Alcaraz C., Lopez J. A security analysis for wireless sensor mesh networks in highly critical systems. IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev. 2010, 40(4):419-428.
-
(2010)
IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev.
, vol.40
, Issue.4
, pp. 419-428
-
-
Alcaraz, C.1
Lopez, J.2
-
7
-
-
84870372575
-
Analysis of requirements for critical control systems
-
Alcaraz C., Lopez J. Analysis of requirements for critical control systems. Int. J. Crit. Infrastruct. Prot. 2012, 5(3-4):137-145.
-
(2012)
Int. J. Crit. Infrastruct. Prot.
, vol.5
, Issue.3-4
, pp. 137-145
-
-
Alcaraz, C.1
Lopez, J.2
-
8
-
-
84876124711
-
Wide-area situational awareness for critical infrastructure protection
-
Alcaraz C., Lopez J. Wide-area situational awareness for critical infrastructure protection. IEEE Comput. 2013, 46(4):30-37.
-
(2013)
IEEE Comput.
, vol.46
, Issue.4
, pp. 30-37
-
-
Alcaraz, C.1
Lopez, J.2
-
9
-
-
84870299675
-
Selecting key management schemes for WSN applications
-
Alcaraz C., Lopez J., Roman R., Chen H. Selecting key management schemes for WSN applications. Comput. Secur. 2012, 31(8):956-966.
-
(2012)
Comput. Secur.
, vol.31
, Issue.8
, pp. 956-966
-
-
Alcaraz, C.1
Lopez, J.2
Roman, R.3
Chen, H.4
-
10
-
-
80051531036
-
Secure SCADA framework for the protection of energy control systems
-
Alcaraz C., Lopez J., Zhou J., Roman R. Secure SCADA framework for the protection of energy control systems. Concurr. Comput. Pract. Exp. 2011, 23(12):1414-1430.
-
(2011)
Concurr. Comput. Pract. Exp.
, vol.23
, Issue.12
, pp. 1414-1430
-
-
Alcaraz, C.1
Lopez, J.2
Zhou, J.3
Roman, R.4
-
11
-
-
84875751668
-
Security of industrial sensor network based remote substations in the context of the Internet of Things
-
Alcaraz C., Roman R., Najera P., Lopez J. Security of industrial sensor network based remote substations in the context of the Internet of Things. Ad Hoc Netw. 2013, 11(3):1091-1104.
-
(2013)
Ad Hoc Netw.
, vol.11
, Issue.3
, pp. 1091-1104
-
-
Alcaraz, C.1
Roman, R.2
Najera, P.3
Lopez, J.4
-
12
-
-
84887937959
-
Critical control system protection in the 21st century
-
Alcaraz C., Zeadally S. Critical control system protection in the 21st century. IEEE Comput. 2013, 46(4):74-83.
-
(2013)
IEEE Comput.
, vol.46
, Issue.4
, pp. 74-83
-
-
Alcaraz, C.1
Zeadally, S.2
-
13
-
-
84898185374
-
-
American Petroleum Institute, American Petroleum Institute, Washington, DC
-
API Standard 1164: Pipeline SCADA Security 2009, American Petroleum Institute, American Petroleum Institute, Washington, DC. 2nd ed.
-
(2009)
API Standard 1164: Pipeline SCADA Security
-
-
-
14
-
-
84922214968
-
-
Internet of Energy for Electric Mobility, SINTEF, Oslo, Norway
-
ARTEMIS Project, Internet of Energy for Electric Mobility, SINTEF, Oslo, Norway, 2011.
-
(2011)
-
-
-
15
-
-
84922247469
-
-
Internet Protocols for the Smart Grid, RFC 6272
-
F. Baker, D. Meyer, Internet Protocols for the Smart Grid, RFC 6272, 2011.
-
(2011)
-
-
Baker, F.1
Meyer, D.2
-
16
-
-
77953719458
-
Towards a European research agenda for CIIP. results from the CI2RCO Project
-
Springer, Heidelberg, Germany, J. Lopez, B. Hammerli (Eds.)
-
Bendisch U., Bologna S., Le Grand G., Luiijf E. Towards a European research agenda for CIIP. results from the CI2RCO Project. Critical Information Infrastructures Security 2008, 1-12. Springer, Heidelberg, Germany. J. Lopez, B. Hammerli (Eds.).
-
(2008)
Critical Information Infrastructures Security
, pp. 1-12
-
-
Bendisch, U.1
Bologna, S.2
Le Grand, G.3
Luiijf, E.4
-
17
-
-
0034592897
-
Characteristics of scalability and their impact on performance
-
in: Proceedings of the Second International Workshop on Software and Performance
-
A. Bondi, Characteristics of scalability and their impact on performance, in: Proceedings of the Second International Workshop on Software and Performance, 2000, pp. 195-203.
-
(2000)
, pp. 195-203
-
-
Bondi, A.1
-
18
-
-
0036994686
-
Self-stabilizing mutual exclusion using tokens in mobile ad hoc networks
-
in: Proceedings of the Sixth International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications
-
Y. Chen, J. Welch, Self-stabilizing mutual exclusion using tokens in mobile ad hoc networks, in: Proceedings of the Sixth International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, 2002, pp. 34-42.
-
(2002)
, pp. 34-42
-
-
Chen, Y.1
Welch, J.2
-
19
-
-
84922254670
-
Testbed Framework to Exercise Critical Infrastructure Protection
-
National Institute of Communication Technologies, Leon, Spain
-
CloudCERT, Testbed Framework to Exercise Critical Infrastructure Protection, National Institute of Communication Technologies, Leon, Spain, 2012.
-
(2012)
-
-
-
20
-
-
84922269042
-
Nations must talk to halt "cyber terrorism
-
Kaspersky, Reuters, June 6
-
T. Cohen, M. Lubell, Nations must talk to halt "cyber terrorism:" Kaspersky, Reuters, June 6, 2012.
-
(2012)
-
-
Cohen, T.1
Lubell, M.2
-
21
-
-
84922238853
-
-
Belleville, Michigan
-
Colloquium for Information Systems Security Education, Belleville, Michigan 〈〉, 2014. http://www.cisse.info.
-
(2014)
-
-
-
22
-
-
0033873163
-
Self-stabilizing mutual exclusion using an unfair distributed scheduler
-
in: Proceedings of the Fourteenth International Parallel and Distributed Processing Symposium
-
A. Datta, M. Gradinariu, S. Tixeuil, Self-stabilizing mutual exclusion using an unfair distributed scheduler, in: Proceedings of the Fourteenth International Parallel and Distributed Processing Symposium, 2000, pp. 465-470.
-
(2000)
, pp. 465-470
-
-
Datta, A.1
Gradinariu, M.2
Tixeuil, S.3
-
23
-
-
84976834622
-
Self-stabilizing systems in spite of distributed control
-
Dijkstra E. Self-stabilizing systems in spite of distributed control. Commun. ACM 1974, 17(11):643-644.
-
(1974)
Commun. ACM
, vol.17
, Issue.11
, pp. 643-644
-
-
Dijkstra, E.1
-
24
-
-
33646239120
-
Critical Infrastructure Protection in the Fight Against Terrorism
-
COM(2004) 702 Final, Brussels, Belgium
-
European Commission, Critical Infrastructure Protection in the Fight Against Terrorism, COM(2004) 702 Final, Brussels, Belgium, 2004.
-
(2004)
-
-
-
25
-
-
33847681369
-
Green Paper on a European Programme for Critical Infrastructure Protection
-
COM(2005) 576 Final, Brussels, Belgium
-
European Commission, Green Paper on a European Programme for Critical Infrastructure Protection, COM(2005) 576 Final, Brussels, Belgium, 2005.
-
(2005)
-
-
-
26
-
-
58049140477
-
Communication from the Commission on a European Programme for Critical Infrastructure Protection
-
COM(2006) 786 Final, Brussels, Belgium
-
European Commission, Communication from the Commission on a European Programme for Critical Infrastructure Protection, COM(2006) 786 Final, Brussels, Belgium, 2006.
-
(2006)
-
-
-
27
-
-
84922258513
-
-
Exemys, Exemys, Buenos Aires, Argentina
-
Exemys, Exemys, Buenos Aires, Argentina 〈〉, 2014. http://www.exemys.com.
-
(2014)
-
-
-
28
-
-
70349619163
-
Industrial wireless sensor networks. challenges, design principles and technical approaches
-
Gungor V., Hancke G. Industrial wireless sensor networks. challenges, design principles and technical approaches. IEEE Trans. Ind. Electron. 2009, 56(10):4258-4265.
-
(2009)
IEEE Trans. Ind. Electron.
, vol.56
, Issue.10
, pp. 4258-4265
-
-
Gungor, V.1
Hancke, G.2
-
29
-
-
84922238513
-
AGA 12, Part 2, Performance Test Plan
-
National SCADA Test Bed, Office of Electricity Delivery and Energy Reliability, U.S. Department of Energy, Washington, DC
-
M. Hadley, K. Huston, AGA 12, Part 2, Performance Test Plan, National SCADA Test Bed, Office of Electricity Delivery and Energy Reliability, U.S. Department of Energy, Washington, DC, 2006.
-
(2006)
-
-
Hadley, M.1
Huston, K.2
-
30
-
-
79952921853
-
A taxonomy of cyber events affecting communities
-
in: Proceedings of the Forty-Fourth Hawaii International Conference on System Sciences
-
K. Harrison and G. White, A taxonomy of cyber events affecting communities, in: Proceedings of the Forty-Fourth Hawaii International Conference on System Sciences, 2011.
-
(2011)
-
-
Harrison, K.1
White, G.2
-
31
-
-
84922224046
-
-
WirelessHART Technical Notes
-
HART Communication Foundation, WirelessHART Technical Notes 〈〉, 2014. http://en.hartcomm.org/hcp/tech/articles/wiHART_resources/witech_witechnote.html.
-
(2014)
-
-
-
32
-
-
58049207917
-
Alarm association rules based on a sequential pattern mining algorithm
-
in: Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery
-
S. Hou, X. Zhang, Alarm association rules based on a sequential pattern mining algorithm, in: Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, vol. 2, 2008, pp. 556-560.
-
(2008)
, vol.2
, pp. 556-560
-
-
Hou, S.1
Zhang, X.2
-
33
-
-
84922266276
-
IEEE Standard 610-1990-IEEE Standard Computer Dictionary
-
Piscataway, New Jersey
-
Institute of Electrical and Electronics Engineers, IEEE Standard 610-1990-IEEE Standard Computer Dictionary: A Compilation of IEEE Standard Computer Glossaries, Piscataway, New Jersey, 1990.
-
(1990)
A Compilation of IEEE Standard Computer Glossaries
-
-
-
34
-
-
28444481229
-
IEEE Standard 1402-2000-IEEE Guide for Electric Power Substation Physical and Electronic Security
-
Piscataway, New Jersey
-
Institute of Electrical and Electronics Engineers, IEEE Standard 1402-2000-IEEE Guide for Electric Power Substation Physical and Electronic Security, Piscataway, New Jersey, 2000.
-
(2000)
-
-
-
35
-
-
84922260338
-
IEEE Standard 802.15.4d-200p-IEEE Standard for Information Technology-Local and Metropolitan Area Networks-Specific Requirements-Part 15.4
-
Alternative Physical Layer Extension to Support the Japanese 950MHz Bands, Piscataway, New Jersey
-
Institute of Electrical and Electronics Engineers, IEEE Standard 802.15.4d-200p-IEEE Standard for Information Technology-Local and Metropolitan Area Networks-Specific Requirements-Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), Amendment 3: Alternative Physical Layer Extension to Support the Japanese 950MHz Bands, Piscataway, New Jersey, 2009.
-
Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), Amendment 3
, pp. 2009
-
-
-
36
-
-
84905665259
-
IEC 62351: Power Systems Management and Associated Information Exchange-Data and Communications Security
-
Geneva, Switzerland
-
International Electrotechnical Commission, IEC 62351: Power Systems Management and Associated Information Exchange-Data and Communications Security, Geneva, Switzerland, 2013.
-
(2013)
-
-
-
41
-
-
84922246202
-
ANSI/ISA-100.11a-2011 Wireless Systems for Industrial Automation
-
Research Triangle Park, North Carolina
-
International Society of Automation, ANSI/ISA-100.11a-2011 Wireless Systems for Industrial Automation: Process Control and Related Applications, Research Triangle Park, North Carolina, 2011.
-
(2011)
Process Control and Related Applications
-
-
-
42
-
-
84922250154
-
Security for Industrial Automation and Control Systems, Security Technologies for Industrial Automation and Control Systems
-
Research Triangle Park, North Carolina
-
International Society of Automation, Security for Industrial Automation and Control Systems, Security Technologies for Industrial Automation and Control Systems, ISA-TR62443-3-1 (99.03.01), Research Triangle Park, North Carolina, 2012.
-
(2012)
ISA-TR62443-3-1 (99.03.01)
-
-
-
43
-
-
51849130444
-
A web-based expert system shell for fault diagnosis and control of power system equipment
-
in: Proceedings of the International Conference on Condition Monitoring and Diagnosis
-
M. Jain, A. Jain, M. Srinivas, A web-based expert system shell for fault diagnosis and control of power system equipment, in: Proceedings of the International Conference on Condition Monitoring and Diagnosis, 2008, pp. 1310-1313.
-
(2008)
, pp. 1310-1313
-
-
Jain, M.1
Jain, A.2
Srinivas, M.3
-
44
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Josang A., Ismail R., Boyd C. A survey of trust and reputation systems for online service provision. Decis. Support Syst. 2007, 43(2):618-644.
-
(2007)
Decis. Support Syst.
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
45
-
-
80051651344
-
Privacy for smart meters: towards undetectable appliance load signatures
-
in: Proceedings of the First IEEE International Conference on Smart Grid Communications
-
G. Kalogridis, C. Efthymiou, S. Denic, T. Lewis, R. Cepeda, Privacy for smart meters: towards undetectable appliance load signatures, in: Proceedings of the First IEEE International Conference on Smart Grid Communications, 2010, pp. 232-237.
-
(2010)
, pp. 232-237
-
-
Kalogridis, G.1
Efthymiou, C.2
Denic, S.3
Lewis, T.4
Cepeda, R.5
-
46
-
-
84911113717
-
The cooperative Internet of Things enabled smart grid
-
in: Proceedings of the Fourteenth IEEE International Symposium on Consumer Electronics
-
S. Karnouskos, The cooperative Internet of Things enabled smart grid, in: Proceedings of the Fourteenth IEEE International Symposium on Consumer Electronics, 2010.
-
(2010)
-
-
Karnouskos, S.1
-
47
-
-
84987813232
-
-
Syngress, Waltham, Massachusetts
-
Knapp E., Langill J. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA and Other Industrial Control Systems 2011, Syngress, Waltham, Massachusetts.
-
(2011)
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA and Other Industrial Control Systems
-
-
Knapp, E.1
Langill, J.2
-
48
-
-
67650320950
-
A survey of computational location privacy
-
Krumm J. A survey of computational location privacy. Pers. Ubiquitous Comput. 2009, 13(6):391-399.
-
(2009)
Pers. Ubiquitous Comput.
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
49
-
-
0037377597
-
SCADA and IP: is network convergence really here?
-
McClanahan R. SCADA and IP: is network convergence really here?. IEEE Ind. Appl. 2003, 9(2):29-36.
-
(2003)
IEEE Ind. Appl.
, vol.9
, Issue.2
, pp. 29-36
-
-
McClanahan, R.1
-
50
-
-
33746690237
-
Transmission of IPv6 Packets over IEEE 802.15.4 Networks
-
RFC 4944
-
G. Montenegro, N. Kushalnagar, J. Hui, D. Culler, Transmission of IPv6 Packets over IEEE 802.15.4 Networks, RFC 4944, 2007.
-
(2007)
-
-
Montenegro, G.1
Kushalnagar, N.2
Hui, J.3
Culler, D.4
-
51
-
-
34047192955
-
Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks
-
London, United Kingdom
-
National Infrastructure Security Coordination Centre, Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks, London, United Kingdom, 2005.
-
(2005)
-
-
-
52
-
-
84922263222
-
Guidelines for Smart Grid Cyber Security
-
Smart Grid Cyber Security Strategy, Architecture and High-Level Requirements, NISTIR 7628, Gaithersburg, Maryland
-
National Institute of Standards and Technology, Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture and High-Level Requirements, NISTIR 7628, Gaithersburg, Maryland, 2010.
-
(2010)
, vol.1
-
-
-
53
-
-
84922263222
-
Guidelines for Smart Grid Cyber Security
-
Supportive Analyses and References, NISTIR 7628, Gaithersburg, Maryland
-
National Institute of Standards and Technology, Guidelines for Smart Grid Cyber Security: Vol. 3, Supportive Analyses and References, NISTIR 7628, Gaithersburg, Maryland, 2010.
-
(2010)
, vol.3
-
-
-
54
-
-
72449191827
-
NIST Framework and Roadmap for Smart Grid Interoperability Standards
-
Release 2.0, NIST Special Publication 1108 R2, Gaithersburg, Maryland
-
National Institute of Standards and Technology, NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0, NIST Special Publication 1108 R2, Gaithersburg, Maryland, 2012.
-
(2012)
-
-
-
55
-
-
84885817796
-
Security and Privacy Controls for Federal Information Systems and Organizations
-
NIST Special Publication 800-53, Revision 4, Gaithersburg, Maryland
-
National Institute of Standards and Technology, Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Publication 800-53, Revision 4, Gaithersburg, Maryland, 2013.
-
(2013)
-
-
-
56
-
-
84922215066
-
-
CIP-002: Critical Cyber Asset Identification, NERC CIP Standard, Washington, DC
-
North American Electric Reliability Corporation, CIP-002: Critical Cyber Asset Identification, NERC CIP Standard, Washington, DC, 2009.
-
(2009)
-
-
-
57
-
-
49249085644
-
Transactional confidentiality in sensor networks
-
Pai S., Bermudez S., Wicker S., Meingast M., Roosta T., Sastry S., Mulligan D. Transactional confidentiality in sensor networks. IEEE Secur. Priv. 2008, 6(4):28-35.
-
(2008)
IEEE Secur. Priv.
, vol.6
, Issue.4
, pp. 28-35
-
-
Pai, S.1
Bermudez, S.2
Wicker, S.3
Meingast, M.4
Roosta, T.5
Sastry, S.6
Mulligan, D.7
-
58
-
-
78649673610
-
Opportunities and challenges of wireless communications technologies for smart grid applications
-
in: Proceedings of the IEEE Power and Energy Society General Meeting
-
P. Parikh, M. Kanabar, T. Sidhu, Opportunities and challenges of wireless communications technologies for smart grid applications, in: Proceedings of the IEEE Power and Energy Society General Meeting, 2010.
-
(2010)
-
-
Parikh, P.1
Kanabar, M.2
Sidhu, T.3
-
59
-
-
79751478211
-
A survey on self-healing systems. approaches and systems
-
Psaier H., Dustdar S. A survey on self-healing systems. approaches and systems. Computing 2011, 91(1):43-73.
-
(2011)
Computing
, vol.91
, Issue.1
, pp. 43-73
-
-
Psaier, H.1
Dustdar, S.2
-
60
-
-
84922255410
-
A survey on modeling and simulation of interdependent critical infrastructures
-
in: Proceedings of the Third IEEE Benelux Young Researchers Symposium in Electrical Power Engineering, paper 44
-
T. Rigole, G. Deconinck, A survey on modeling and simulation of interdependent critical infrastructures, in: Proceedings of the Third IEEE Benelux Young Researchers Symposium in Electrical Power Engineering, paper 44, 2006.
-
(2006)
-
-
Rigole, T.1
Deconinck, G.2
-
61
-
-
73549113094
-
A taxonomy and survey of cloud computing systems
-
in: Proceedings of the Fifth International Joint Conference on INC, IMS and IDC
-
B. Rimal, C. Eunmi, I. Lumb, A taxonomy and survey of cloud computing systems, in: Proceedings of the Fifth International Joint Conference on INC, IMS and IDC, 2009, pp. 44-51.
-
(2009)
, pp. 44-51
-
-
Rimal, B.1
Eunmi, C.2
Lumb, I.3
-
62
-
-
12344298391
-
Modeling and simulating critical infrastructures and their interdependencies
-
in: Proceedings of the Thirty-Seventh Annual Conference on Hawaii International System Sciences
-
S. Rinaldi, Modeling and simulating critical infrastructures and their interdependencies, in: Proceedings of the Thirty-Seventh Annual Conference on Hawaii International System Sciences, 2004.
-
(2004)
-
-
Rinaldi, S.1
-
63
-
-
0035696915
-
Identifying, understanding and analyzing critical infrastructure interdependencies
-
Rinaldi S., Peerenboom J., Kelly T. Identifying, understanding and analyzing critical infrastructure interdependencies. IEEE Control Syst. 2001, 21(6):11-25.
-
(2001)
IEEE Control Syst.
, vol.21
, Issue.6
, pp. 11-25
-
-
Rinaldi, S.1
Peerenboom, J.2
Kelly, T.3
-
64
-
-
34249727108
-
The role of wireless sensor networks in the area of critical information infrastructure protection
-
Roman R., Alcaraz C., Lopez J. The role of wireless sensor networks in the area of critical information infrastructure protection. Inf. Secur. Tech. Rep. 2007, 12(1):24-31.
-
(2007)
Inf. Secur. Tech. Rep.
, vol.12
, Issue.1
, pp. 24-31
-
-
Roman, R.1
Alcaraz, C.2
Lopez, J.3
-
65
-
-
80052854156
-
Securing the Internet of Things
-
Roman R., Najera P., Lopez J. Securing the Internet of Things. IEEE Comput. 2011, 44(9):51-58.
-
(2011)
IEEE Comput.
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
66
-
-
77957220418
-
T-patterns revisited. mining for temporal patterns in sensor data
-
Salah A., Pauwels E., Tavenard R., Gevers T. T-patterns revisited. mining for temporal patterns in sensor data. Sensors 2010, 10(8):7496-7513.
-
(2010)
Sensors
, vol.10
, Issue.8
, pp. 7496-7513
-
-
Salah, A.1
Pauwels, E.2
Tavenard, R.3
Gevers, T.4
-
67
-
-
59049089787
-
Web based multilayered distributed SCADA/HMI system in refinery application
-
Salihbegovic A., Marinkovic V., Cico Z., Karavdic E., Delic N. Web based multilayered distributed SCADA/HMI system in refinery application. Comput. Stand. Interfaces 2009, 31(3):599-612.
-
(2009)
Comput. Stand. Interfaces
, vol.31
, Issue.3
, pp. 599-612
-
-
Salihbegovic, A.1
Marinkovic, V.2
Cico, Z.3
Karavdic, E.4
Delic, N.5
-
68
-
-
84922254413
-
Self-Management for Large-Scale Distributed Systems based on Structured Overlay Networks and Components
-
Catholic University of Louvain, Louvain-la-Neuve, Belgium
-
SELFMAN Project, Self-Management for Large-Scale Distributed Systems based on Structured Overlay Networks and Components, Catholic University of Louvain, Louvain-la-Neuve, Belgium, 2010.
-
(2010)
-
-
-
69
-
-
84922229443
-
Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD), Menlo Park, California
-
SRI International, Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD), Menlo Park, California 〈〉, 2014. http://www.csl.sri.com/projects/emerald.
-
(2014)
-
-
-
70
-
-
80052200676
-
Research of Internet based supervisory control and information system
-
in: Proceedings of the International Conference on Recent Trends in Information Technology
-
K. Suresh, R. Kirubashankar, K. Krishnamurthy, Research of Internet based supervisory control and information system, in: Proceedings of the International Conference on Recent Trends in Information Technology, 2011, pp. 1180-1185.
-
(2011)
, pp. 1180-1185
-
-
Suresh, K.1
Kirubashankar, R.2
Krishnamurthy, K.3
-
71
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Takabi H., Joshi J., Ahn G. Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 2010, 8(6):24-31.
-
(2010)
IEEE Secur. Priv.
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.2
Ahn, G.3
-
72
-
-
84922238922
-
-
The White House, President Obama announces $3.4 billion investment to spur transition to smart energy grid, Washington, DC, October 27
-
The White House, President Obama announces $3.4 billion investment to spur transition to smart energy grid, Washington, DC, October 27, 2009.
-
(2009)
-
-
-
73
-
-
84922247976
-
-
National Infrastructure Protection Plan (NIPP), Washington, DC
-
U.S. Department of Homeland Security, National Infrastructure Protection Plan (NIPP), Washington, DC, 2009.
-
(2009)
-
-
-
74
-
-
84922227142
-
Catalog of Control Systems Security
-
Recommendations for Standards Developers, Washington, DC
-
U.S. Department of Homeland Security, Catalog of Control Systems Security: Recommendations for Standards Developers, Washington, DC, 2011.
-
-
-
-
75
-
-
84922225245
-
Critical Infrastructure Protection, Challenges in Securing Control Systems, Robert F. Dacey, Testimony before the Subcommittee on Technology
-
Information Policy, Intergovernmental Relations and the Census, House Committee on Government Reform, GAO-04-140T, Washington, DC
-
U.S. General Accounting Office, Critical Infrastructure Protection, Challenges in Securing Control Systems, Robert F. Dacey, Testimony before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, House Committee on Government Reform, GAO-04-140T, Washington, DC, 2003.
-
(2003)
-
-
-
76
-
-
84922224634
-
Critical Infrastructure Protection
-
Cybersecurity Guidance is Available, but More can be Done to Promote its Use, Report to Congressional Requesters, GAO-12-92, Washington, DC
-
U.S. General Accounting Office, Critical Infrastructure Protection, Cybersecurity Guidance is Available, but More can be Done to Promote its Use, Report to Congressional Requesters, GAO-12-92, Washington, DC, 2011.
-
(2011)
-
-
-
77
-
-
84922237474
-
Homeland Security Act 2002-Public Law 107-296
-
Washington, DC
-
U.S. Government, Homeland Security Act 2002-Public Law 107-296, Washington, DC, 2002.
-
-
-
-
78
-
-
84922213384
-
-
WebSCADA, Irvine, California
-
WebSCADA Corporation, WebSCADA, Irvine, California 〈〉, 2014. http://www.webscada.com.
-
(2014)
-
-
-
79
-
-
84922266104
-
-
Microchip MiWi P2P Wireless Protocol, AN1204, Microchip Technology, Chandler, Arizona
-
Y. Yang, Microchip MiWi P2P Wireless Protocol, AN1204, Microchip Technology, Chandler, Arizona, 2010.
-
(2010)
-
-
Yang, Y.1
-
80
-
-
84922251121
-
-
Yokogawa, Yokogawa Electric Corporation, Tokyo, Japan
-
Yokogawa, Yokogawa Electric Corporation, Tokyo, Japan 〈〉, 2014. http://www.yokogawa.com.
-
(2014)
-
-
-
81
-
-
2442526701
-
Unsupervised learning techniques for an intrusion detection system
-
in: Proceedings of the ACM Symposium on Applied Computing
-
S. Zanero, S. Savaresi, Unsupervised learning techniques for an intrusion detection system, in: Proceedings of the ACM Symposium on Applied Computing, 2004, pp. 412-419.
-
(2004)
, pp. 412-419
-
-
Zanero, S.1
Savaresi, S.2
-
82
-
-
84922220427
-
Securing cyberspace in the 21st century
-
Zeadally S., Martinez G., Chao H. Securing cyberspace in the 21st century. IEEE Comput. 2013, 46(4):22-23.
-
(2013)
IEEE Comput.
, vol.46
, Issue.4
, pp. 22-23
-
-
Zeadally, S.1
Martinez, G.2
Chao, H.3
-
83
-
-
84886601284
-
Towards privacy protection in the smart grid
-
Zeadally S., Pathan A., Alcaraz C., Badra M. Towards privacy protection in the smart grid. Wirel. Pers. Commun. 2013, 73(1):23-50.
-
(2013)
Wirel. Pers. Commun.
, vol.73
, Issue.1
, pp. 23-50
-
-
Zeadally, S.1
Pathan, A.2
Alcaraz, C.3
Badra, M.4
-
84
-
-
77954761754
-
An adaptive QoS-aware fault-tolerance strategy for web services
-
Zheng Z., Lyu M. An adaptive QoS-aware fault-tolerance strategy for web services. Empir. Softw. Eng. 2010, 15(4):323-345.
-
(2010)
Empir. Softw. Eng.
, vol.15
, Issue.4
, pp. 323-345
-
-
Zheng, Z.1
Lyu, M.2
-
85
-
-
84857516371
-
A taxonomy of cyber attacks on SCADA systems
-
in: Proceedings of the International Conference on the Internet of Things and the Fourth International Conference on Cyber, Physical and Social Computing
-
B. Zhu, A. Joseph, S. Sastry, A taxonomy of cyber attacks on SCADA systems, in: Proceedings of the International Conference on the Internet of Things and the Fourth International Conference on Cyber, Physical and Social Computing, 2011, pp. 380-388.
-
(2011)
, pp. 380-388
-
-
Zhu, B.1
Joseph, A.2
Sastry, S.3
-
86
-
-
67650257654
-
Optimizing extensibility in hard real-time distributed systems
-
in: Proceedings of the Fifteenth IEEE Real-Time and Embedded Technology and Applications Symposium
-
Q. Zhu, Y. Yang, E. Scholte, M. Natale, A. Sangiovanni-Vicentelli, Optimizing extensibility in hard real-time distributed systems, in: Proceedings of the Fifteenth IEEE Real-Time and Embedded Technology and Applications Symposium, 2009, pp. 275-284.
-
(2009)
, pp. 275-284
-
-
Zhu, Q.1
Yang, Y.2
Scholte, E.3
Natale, M.4
Sangiovanni-Vicentelli, A.5
-
87
-
-
84922268368
-
-
ZigBee-2007 Layer PICS and Stack Profiles, Revision 3, ZigBee Document 08006r03, San Ramon, California
-
ZigBee Alliance, ZigBee-2007 Layer PICS and Stack Profiles, Revision 3, ZigBee Document 08006r03, San Ramon, California, 2008.
-
(2008)
-
-
Alliance, Z.1
|