-
1
-
-
84888056011
-
Flow whitelisting in scada networks
-
R. R. R. Barbosa, R. Sadre, and A. Pras. Flow whitelisting in scada networks. International journal of critical infrastructure protection, 6(3):150-158, 2013.
-
(2013)
International Journal of Critical Infrastructure Protection
, vol.6
, Issue.3
, pp. 150-158
-
-
Barbosa, R.R.R.1
Sadre, R.2
Pras, A.3
-
3
-
-
84951871136
-
Modeling message sequences for intrusion detection in industrial control systems
-
Springer,. To appear
-
M. Caselli, E. Zambon, J. Petit, and F. Kargl. Modeling message sequences for intrusion detection in industrial control systems. In Critical Infrastructure Protection IX. Springer, 2015. To appear.
-
(2015)
Critical Infrastructure Protection
, vol.9
-
-
Caselli, M.1
Zambon, E.2
Petit, J.3
Kargl, F.4
-
4
-
-
84859722266
-
Anomaly detection for discrete sequences: A survey
-
V. Chandola, A. Banerjee, and V. Kumar. Anomaly detection for discrete sequences: A survey. Knowledge and Data Engineering, IEEE Transactions on, 24(5):823-839, 2012.
-
(2012)
Knowledge and Data Engineering IEEE Transactions on
, vol.24
, Issue.5
, pp. 823-839
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
5
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
H. Debar, M. Dacier, and A. Wespi. Towards a taxonomy of intrusion-detection systems. Elsevier Computer Networks, 31(8):805-822, 1999.
-
(1999)
Elsevier Computer Networks
, vol.31
, Issue.8
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
6
-
-
82855183442
-
Systems-part 5-104: Transmission protocols-network access for iec 60870-5-101 using standard transport profiles
-
60870
-
Equipment, IEC Telecontrol. Systems-part 5-104: Transmission protocols-network access for iec 60870-5-101 using standard transport profiles. IEC Standard, 60870, 2006.
-
(2006)
IEC Standard
-
-
Iec Telecontrol, E.1
-
7
-
-
78650062267
-
-
White paper, Symantec Corp., Security Response
-
N. Falliere, L. O. Murchu, and E. Chien. W32. stuxnet dossier. White paper, Symantec Corp., Security Response, 2011.
-
(2011)
W32. Stuxnet Dossier
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
8
-
-
77954330725
-
Modbus/DNP3 state-based intrusion detection system
-
I. N. Fovino, A. Carcano, T. D. L. Murel, A. Trombetta, and M. Masera. Modbus/DNP3 State-Based Intrusion Detection System. IEEE Advanced Information Networking and Applications, International Conference on, 0:729-736, 2010.
-
(2010)
IEEE Advanced Information Networking and Applications, International Conference on
, pp. 729-736
-
-
Fovino, I.N.1
Carcano, A.2
Murel, T.D.L.3
Trombetta, A.4
Masera, M.5
-
10
-
-
84867893847
-
N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols
-
Springer
-
D. Hadžiosmanović, L. Simionato, D. Bolzoni, E. Zambon, and S. Etalle. N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols. In RAID, pages 354-373. Springer, 2012.
-
(2012)
RAID
, pp. 354-373
-
-
Hadžiosmanović, D.1
Simionato, L.2
Bolzoni, D.3
Zambon, E.4
Etalle, S.5
-
11
-
-
84954527190
-
Through the eye of the plc: Semantic security monitoring for industrial processes
-
ACM
-
D. Hadžiosmanović, R. Sommer, E. Zambon, and P. H. Hartel. Through the eye of the plc: semantic security monitoring for industrial processes. In Proceedings of the 30th Annual Computer Security Applications Conference, pages 126-135. ACM, 2014.
-
(2014)
Proceedings of the 30th Annual Computer Security Applications Conference
, pp. 126-135
-
-
Hadžiosmanović, D.1
Sommer, R.2
Zambon, E.3
Hartel, P.H.4
-
12
-
-
84888878530
-
Anomaly detection of IP header threats
-
S. Haris, G. M. W. Al-Saadoon, A. P. D. R. Ahmad, and M. Ghani. Anomaly detection of IP header threats. CSC International Journal of Computer Science and Security, 4(6):497, 2011.
-
(2011)
CSC International Journal of Computer Science and Security
, vol.4
, Issue.6
, pp. 497
-
-
Haris, S.1
Al-Saadoon, G.M.W.2
Ahmad, A.P.D.R.3
Ghani, M.4
-
13
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. Journal of computer security, 6(3):151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
15
-
-
4544268957
-
A ow-based method for abnormal network traffic detection
-
IEEE
-
M.-S. Kim, H.-J. Kong, S.-C. Hong, S.-H. Chung, and J. W. Hong. A ow-based method for abnormal network traffic detection. In Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP, volume 1, pages 599-612. IEEE, 2004.
-
(2004)
Network Operations and Management Symposium, 2004. NOMS 2004 IEEE/IFIP
, vol.1
, pp. 599-612
-
-
Kim, M.-S.1
Kong, H.-J.2
Hong, S.-C.3
Chung, S.-H.4
Hong, J.W.5
-
16
-
-
84869823115
-
Learning stateful models for network honeypots
-
ACM
-
T. Krueger, H. Gascon, N. Krämer, and K. Rieck. Learning stateful models for network honeypots. In Proceedings of the 5th ACM workshop on Security and artificial intelligence, pages 37-48. ACM, 2012.
-
(2012)
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence
, pp. 37-48
-
-
Krueger, T.1
Gascon, H.2
Krämer, N.3
Rieck, K.4
-
22
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, and S. Zhou. Specification-based anomaly detection: a new approach for detecting network intrusions. In 9th ACM conference on Computer and communications security, pages 265-274, 2002.
-
(2002)
9th ACM Conference on Computer and Communications Security
, pp. 265-274
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
23
-
-
84881143298
-
Guide to industrial control systems (ICS) security
-
K. Stouffer, J. Falco, and K. Scarfone. Guide to industrial control systems (ICS) security. NIST Special Publication, 800(82):16-16, 2008.
-
(2008)
NIST Special Publication
, vol.800
, Issue.82
, pp. 16-16
-
-
Stouffer, K.1
Falco, J.2
Scarfone, K.3
-
25
-
-
35048885009
-
Anomalous payload-based network intrusion detection
-
Springer
-
K. Wang and S. J. Stolfo. Anomalous payload-based network intrusion detection. In Recent Advances in Intrusion Detection, pages 203-222. Springer, 2004.
-
(2004)
Recent Advances in Intrusion Detection
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
|