메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Analysis of cyber security for industrial control systems

Author keywords

Cyber security; DCS; ICS; SCADA

Indexed keywords

CONTROL SYSTEM ANALYSIS; CONTROL SYSTEMS; CRITICAL INFRASTRUCTURES; GAS PLANTS; INFORMATION SYSTEMS; INTEGRATED CIRCUITS; OPEN SYSTEMS; PUBLIC WORKS;

EID: 84957927556     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SSIC.2015.7245330     Document Type: Conference Paper
Times cited : (74)

References (34)
  • 8
    • 84957907732 scopus 로고    scopus 로고
    • Reference architectures for industrial automation and control systems
    • October
    • Paul Didier, Reference Architectures for Industrial Automation and Control Systems, ODVA Industry Conference & 15th Annual Meeting October 2012
    • (2012) ODVA Industry Conference & 15th Annual Meeting
    • Didier, P.1
  • 9
    • 34548048602 scopus 로고    scopus 로고
    • Risk assessment: The first step
    • Miller D, Byres E. Risk assessment: The first step. InTech 2005.
    • (2005) InTech
    • Miller, D.1    Byres, E.2
  • 11
    • 0035010847 scopus 로고    scopus 로고
    • Analysis of the delay and jitter of voice traffic over the Internet
    • M.J. Karam, F.A. Tobagi, Analysis of the delay and jitter of voice traffic over the Internet, in: Proc. of IEEE INFOCOM '01, 2001.
    • (2001) Proc. of IEEE INFOCOM '01
    • Karam, M.J.1    Tobagi, F.A.2
  • 12
    • 34548331345 scopus 로고    scopus 로고
    • Communication in industrial automation-what is going on
    • Elsevier Ltd
    • P. Neumann, "Communication in industrial automation-what is going on?" in Control Engineering Practice. Elsevier Ltd, 2006, vol. 15, pp.1332-1347.
    • (2006) Control Engineering Practice , vol.15 , pp. 1332-1347
    • Neumann, P.1
  • 15
    • 21644486638 scopus 로고    scopus 로고
    • Security is harder than you think
    • Jul./Aug.
    • J. Viega and M. Messier, "Security is harder than you think," ACM Queue, vol. 2, pp. 60-65, Jul./Aug. 2004.
    • (2004) ACM Queue , vol.2 , pp. 60-65
    • Viega, J.1    Messier, M.2
  • 19
    • 84957885743 scopus 로고    scopus 로고
    • Minimum Security Requirements for Federal Information and Information Systems
    • March Framework for Improving Critical Infrastructure Cybersecurity NIST February 2014
    • Minimum Security Requirements for Federal Information and Information Systems, National Institute for Standards and Technology, FIPS 200, March 2006. Framework for Improving Critical Infrastructure Cybersecurity. NIST February 2014
    • (2006) National Institute for Standards and Technology, FIPS , vol.200
  • 26
    • 84883028882 scopus 로고    scopus 로고
    • Native support for Modbus RTU protocol in Snort intrusion detection system
    • Tylman, Wojciech. "Native support for Modbus RTU protocol in Snort intrusion detection system." New Results in Dependability & Comput. Syst. AISC 224 (2013): 479-487.
    • (2013) New Results in Dependability & Comput. Syst. AISC , vol.224 , pp. 479-487
    • Tylman, W.1
  • 34
    • 84921354433 scopus 로고    scopus 로고
    • Control systems security from the front lines
    • Peisert, Sean, et al. "Control Systems Security from the Front Lines." Security & Privacy, IEEE 12.6 (2014): 55-58.
    • (2014) Security & Privacy IEEE , vol.12 , Issue.6 , pp. 55-58
    • Peisert, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.