-
1
-
-
84934879114
-
Enterprise-control system integration part 1: Models and terminology
-
ANSI/ISA-95.00.01
-
ANSI/ISA-95.00.01 (2000) Enterprise-control system integration part 1: models and terminology, ISA 2000
-
(2000)
ISA
, pp. 2000
-
-
-
2
-
-
33750376598
-
The nepenthes platform: An efficient approach to collect malware
-
Recent advances in intrusion detection, Springer, Berlin
-
Baecher P, Koetter M, Holz T, Dornseif M, Freiling F (2006) The nepenthes platform: an efficient approach to collect malware. In: Recent advances in intrusion detection. Lecture Notes in Computer Science, vol 4219, pp 165–184. Springer, Berlin
-
(2006)
Lecture Notes in Computer Science
, vol.4219
, pp. 165-184
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
-
4
-
-
0003343295
-
A simple network management protocol (SNMP)
-
May
-
Case J, Fedor M, Schoffstall M, Davin J. (1990) A simple network management protocol (SNMP), IETF RFC 1157, May 1990
-
(1990)
IETF RFC
, vol.1157
-
-
Case, J.1
Fedor, M.2
Schoffstall, M.3
Davin, J.4
-
5
-
-
84934879115
-
-
Project, Accessed 10 Sept 2013
-
Cisco Critical Infrastructure Assurance Group-CIAG (2004) SCADA HoneyNet Project, http://scadahoneynet.sourceforge.net/. Accessed 10 Sept 2013
-
(2004)
SCADA Honeynet
-
-
-
9
-
-
48449088699
-
SCADA cyber security testbed development
-
NAPS
-
Davis CM, Tate JE, Okhravi H, Grier C, Overbye, TJ, Nicol D (2006) SCADA cyber security testbed development. In: NAPS 2006. 38th North American power symposium. IEEE, pp 483–488, doi:10.1109/NAPS.2006.359615
-
(2006)
38Th North American Power Symposium. IEEE
, pp. 483-488
-
-
Davis, C.M.1
Tate, J.E.2
Okhravi, H.3
Grier, C.4
Overbye, T.J.5
Nicol, D.6
-
10
-
-
84934879117
-
-
March, Accessed 10 Sept
-
Debar H, Curry D, Feinstein B (2007) Rfc 4765: The intrusion detection message exchange format (IDMEF), March 2007. http://www.ietf.org/rfc/rfc4765.txt. Accessed 10 Sept 2013
-
(2007)
Rfc 4765
-
-
Debar, H.1
Curry, D.2
Feinstein, B.3
-
11
-
-
84934879118
-
-
Digital Bond, Accessed 10 Sept 2013
-
Digital Bond (2006) SCADA honeynet. http://www.digitalbond.com/tools/scada-honeynet/. Accessed 10 Sept 2013
-
(2006)
SCADA Honeynet
-
-
-
16
-
-
33750405289
-
Security issues in SCADA networks
-
Igure V, Laughter S, Williams R (2006) Security issues in SCADA networks. Comput Secur 25 (7):498–506. doi:10.1016/j.cose.2006.03.001
-
(2006)
Comput Secur
, vol.25
, Issue.7
, pp. 498-506
-
-
Igure, V.1
Laughter, S.2
Williams, R.3
-
17
-
-
84934879119
-
Security for industrial automation and control systems—part 1: Terminology, concepts
-
ISA-99.00.01
-
ISA-99.00.01 (2007) Security for industrial automation and control systems—part 1: terminology, concepts, and models. American National Standard, Research Triangle Park
-
(2007)
American National Standard, Research Triangle Park
-
-
-
18
-
-
80052113604
-
Proposal strategies of key management for data encryption in SCADA network of electric power systems
-
Kang DJ, Lee JJ, Kim BH, Hur D (2011) Proposal strategies of key management for data encryption in SCADA network of electric power systems. Int J Electr Power Energy Syst 33 (9):1521–1526
-
(2011)
Int J Electr Power Energy Syst
, vol.33
, Issue.9
, pp. 1521-1526
-
-
Kang, D.J.1
Lee, J.J.2
Kim, B.H.3
Hur, D.4
-
20
-
-
70649112112
-
-
Libpcap, Accessed 10 Sept 2013
-
Libpcap (2010) TCPDUMP/LIBPCAP public repository. http://www.tcpdump.org/. Accessed 10 Sept 2013
-
(2010)
TCPDUMP/LIBPCAP Public Repository
-
-
-
25
-
-
84934879121
-
-
Net-SNMP, Accessed 10 Sept 2013
-
Net-SNMP (2000) Net-SNMP. http://www.net-snmp.org/. Accessed 10 Sept 2013
-
(2000)
Net-Snmp
-
-
-
26
-
-
85084163190
-
-
Proceedings of the 13th conference on USENIX security symposium—(SSYM’04), USENIX Association, Berkeley
-
Provos N (2004) A virtual honeypot framework. In: Proceedings of the 13th conference on USENIX security symposium—(SSYM’04), vol 13. USENIX Association, Berkeley, p 1
-
(2004)
A Virtual Honeypot Framework
, vol.13
, pp. 1
-
-
Provos, N.1
-
27
-
-
84934879122
-
-
Pymodbus, Accessed 10 Sept 2013
-
Pymodbus (2011) A Modbus protocol stack in python. http://code.google.com/p/pymodbus/.Accessed 10 Sept 2013
-
(2011)
A Modbus Protocol Stack in Python
-
-
-
28
-
-
84934875744
-
-
Raspberry Pi Foundation, Accessed 10 Sept 2013
-
Raspberry Pi Foundation (2012) What is Raspberry Pi? http://www.raspberrypi.org/. Accessed 10 Sept 2013
-
(2012)
What is Raspberry Pi
-
-
-
31
-
-
67349092535
-
Vulnerability assessment of cybersecurity for SCADA systems
-
Ten C, Liu C, Manimaran G (2008) Vulnerability assessment of cybersecurity for SCADA systems. IEEE Trans Power Syst 23(4):1836–1846. doi:10.1109/TPWRS.2008.2002298
-
(2008)
IEEE Trans Power Syst
, vol.23
, Issue.4
, pp. 1836-1846
-
-
Ten, C.1
Liu, C.2
Manimaran, G.3
-
32
-
-
84934873712
-
-
Triangle MicroWorks Inc, Raleigh, North Carolina, Accessed 10 Sept 2013
-
Triangle MicroWorks Inc (2002) DNP3 overview, Raleigh, North Carolina. http://www.trianglemicroworks.com/documents/DNP3_Overview.pdf. Accessed 10 Sept 2013
-
(2002)
DNP3 Overview
-
-
-
35
-
-
33750356750
-
-
NDSS
-
Wang Y, Beck D, Jiang X, Roussev R, Verbowski C, Chen S, King ST (2006) Automated web patrol with strider honeymonkeys: finding web sites that exploit browser vulnerabilities. In: NDSS
-
(2006)
Automated Web Patrol with Strider Honeymonkeys: Finding Web Sites that Exploit Browser Vulnerabilities
-
-
Wang, Y.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.T.7
-
36
-
-
84934879125
-
-
Waterfall Security Solutions Ltd, Accessed 10 Sept 2013
-
Waterfall Security Solutions Ltd. (2013) Waterfall one-way. http://www.waterfall-security.com/category/products/scada-protocols/. Accessed 10 Sept 2013
-
(2013)
Waterfall One-Way
-
-
-
37
-
-
84857516371
-
-
Proceedings of the 2011 international conference on internet of things and 4th international conference on cyber, physical and social computing (ITHINGSCPSCOM ‘11). IEEE Computer Society, Washington
-
Zhu B, Joseph A, Sastry S. (2011) A taxonomy of cyber attacks on SCADA systems. In: Proceedings of the 2011 international conference on internet of things and 4th international conference on cyber, physical and social computing (ITHINGSCPSCOM ‘11). IEEE Computer Society, Washington, pp 380–388
-
(2011)
A Taxonomy of Cyber Attacks on SCADA Systems
, pp. 380-388
-
-
Zhu, B.1
Joseph, A.2
Sastry, S.3
|