-
1
-
-
84947567130
-
Did Stuxnet Take Out 1000 Centrifuges at the Natanz Enrichment Plant?
-
DC
-
D. Albright, P. Brannan, C. Walrond, Did Stuxnet Take Out 1000 Centrifuges at the Natanz Enrichment Plant? Institute for Science and International Security, Washington, DC (url: 〈〉), 2010. http://isis-online.org/uploads/isis-reports/documents/stuxnet_FEP_22Dec2010.pdf.
-
(2010)
Institute for Science and International Security, Washington
-
-
Albright, D.1
Brannan, P.2
Walrond, C.3
-
2
-
-
84922213051
-
The OVAL Language Specification, MITRE, Bedford, Massachusetts
-
J. Baker, M. Hansbury, D. Haynes, The OVAL Language Specification, MITRE, Bedford, Massachusetts (url: 〈〉), 2011. http://ebookbrowsee.net/oval-language-specification-08-08-2011-pdf-d222972411.
-
(2011)
-
-
Baker, J.1
Hansbury, M.2
Haynes, D.3
-
3
-
-
20944436226
-
The myths and facts behind cyber security risks for industrial control systems
-
in: Proceedings of the VDE Kongress
-
E. Byres, J. Lowe, The myths and facts behind cyber security risks for industrial control systems, in: Proceedings of the VDE Kongress, 2004.
-
(2004)
-
-
Byres, E.1
Lowe, J.2
-
4
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
in: Proceedings of the Twentieth USENIX Conference on Security
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, T. Kohno, Comprehensive experimental analyses of automotive attack surfaces, in: Proceedings of the Twentieth USENIX Conference on Security, 2011.
-
(2011)
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
5
-
-
84922233263
-
-
W32.Stuxnet Dossier, Version 1.4, Symantec, Mountain View, California
-
N. Falliere, L. O'Murchu, E. Chien, W32.Stuxnet Dossier, Version 1.4, Symantec, Mountain View, California, 2011.
-
(2011)
-
-
Falliere, N.1
O'Murchu, L.2
Chien, E.3
-
6
-
-
84904880459
-
SecureCPS: defending a nanosatellite cyber-physical system
-
in: Proceedings of the SPIE, 9085
-
L. Forbes, H. Vu, B. Udrea, H. Hagar, X. Koutsoukos, M. Yampolskiy, SecureCPS: defending a nanosatellite cyber-physical system, in: Proceedings of the SPIE, 9085, 2014.
-
(2014)
-
-
Forbes, L.1
Vu, H.2
Udrea, B.3
Hagar, H.4
Koutsoukos, X.5
Yampolskiy, M.6
-
7
-
-
84922253535
-
Ataxonomy of network and computer attacks Comput
-
S. Hansman, R. Hunt; Ataxonomy of network and computer attacks Comput. Secur. 241 2005, 3143.
-
(2005)
Secur
, vol.241
, pp. 3143
-
-
Hansman, S.1
Hunt, R.2
-
8
-
-
84922248116
-
Understanding the physical and economic consequences of attacks on control systems Int
-
Prot.232009
-
Y. Huang, A. Cardenas, S. Amin, Z. Lin, H. Tsai, S. Sastry; Understanding the physical and economic consequences of attacks on control systems Int. J. Crit. Infrastruct. Prot.232009, 7383.
-
J. Crit. Infrastruct
, pp. 7383
-
-
Huang, Y.1
Cardenas, A.2
Amin, S.3
Lin, Z.4
Tsai, H.5
Sastry, S.6
-
9
-
-
84922261934
-
-
ITU-T Recommendation X.1520, Geneva, Switzerland
-
International Telecommunications Union, ITU-T Recommendation X.1520, Geneva, Switzerland (url: 〈〉), 2014. http://www.itu.int/rec/T-REC-X.1520-201104-I/en.
-
(2014)
-
-
-
10
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, Experimental security analysis of a modern automobile, in: Proceedings of the IEEE Symposium on Security and Privacy, 2010, 447-462.
-
(2010)
in: Proceedings of the IEEE Symposium on Security and Privacy
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
11
-
-
84922253417
-
-
Stuxnet 0.5: The Missing Link, Symantec, Mountain View, California
-
G. McDonald, L.O Murchu, S. Doherty, E. Chien, Stuxnet 0.5: The Missing Link, Symantec, Mountain View, California, 2013.
-
(2013)
-
-
McDonald, G.1
Murchu, L.O2
Doherty, S.3
Chien, E.4
-
12
-
-
84922256555
-
-
Common Vulnerabilities and Exposures, Bedford, Massachusetts
-
MITRE, Common Vulnerabilities and Exposures, Bedford, Massachusetts (url: 〈〉). http://cve.mitre.org.
-
-
-
-
13
-
-
84922223637
-
-
OVAL Language, Bedford, Massachusetts
-
MITRE, OVAL Language, Bedford, Massachusetts (url: 〈〉). http://oval.mitre.org/language.
-
-
-
-
14
-
-
84922245995
-
-
CVE XML Schema, Gaithersburg, Maryland
-
National Institute of Standards and Technology, CVE XML Schema, Gaithersburg, Maryland (url: 〈〉). http://nvd.nist.gov/schema/nvd-cve-feed_2.0.xsd.
-
-
-
-
15
-
-
84922247382
-
-
National Vulnerability Database, Gaithersburg, Maryland
-
National Institute of Standards and Technology, National Vulnerability Database, Gaithersburg, Maryland (url: 〈〉). http://nvd.nist.gov.
-
-
-
-
16
-
-
0035696915
-
Identifying, understanding and analyzing critical infrastructure interdependencies
-
S. Rinaldi, J. Peerenboom, T. Kelly, Identifying, understanding and analyzing critical infrastructure interdependencies, IEEE Control Systems 21(6), pp. 11-25.
-
IEEE Control Systems
, vol.21
, Issue.6
, pp. 11-25
-
-
Rinaldi, S.1
Peerenboom, J.2
Kelly, T.3
-
17
-
-
84922258861
-
Lessons learned from the Maroochy water breach E
-
Shenoi Critical Infrastructure Protection, Springer, Boston, Massachusetts 7382.
-
J. Slay, M. Miller; Lessons learned from the Maroochy water breach E. GoetzS. Shenoi Critical Infrastructure Protection 2007,Springer, Boston, Massachusetts 7382.
-
(2007)
GoetzS
-
-
Slay, J.1
Miller, M.2
-
18
-
-
84922217169
-
-
2014 Alerts, Washington, DC
-
United States Computer Emergency Readiness Team, 2014 Alerts, Washington, DC (url: 〈〉), 2014. http://www.us-cert.gov/ncas/alerts.
-
(2014)
-
-
-
19
-
-
84868596713
-
Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach
-
in: Proceedings of the Fifth International Symposium on Resilient Control Systems
-
M. Yampolskiy, P. Horvath, X. Koutsoukos, Y. Xue, J. Sztipanovits, Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach, in: Proceedings of the Fifth International Symposium on Resilient Control Systems, 2012, pp. 55-62.
-
(2012)
, pp. 55-62
-
-
Yampolskiy, M.1
Horvath, P.2
Koutsoukos, X.3
Xue, Y.4
Sztipanovits, J.5
-
20
-
-
84877598718
-
Taxonomy for descriptions of cross-domain attacks on CPSs
-
in: Proceedings of the Second ACM International Conference on High Confidence Networked Systems
-
M. Yampolskiy, P. Horvath, X. Koutsoukos, Y. Xue, J. Sztipanovits, Taxonomy for descriptions of cross-domain attacks on CPSs, in: Proceedings of the Second ACM International Conference on High Confidence Networked Systems, 2013, pp. 135-142.
-
(2013)
, pp. 135-142
-
-
Yampolskiy, M.1
Horvath, P.2
Koutsoukos, X.3
Xue, Y.4
Sztipanovits, J.5
|