-
8
-
-
84957907732
-
Reference architectures for industrial automation and control systems
-
October
-
Paul Didier, Reference Architectures for Industrial Automation and Control Systems, ODVA Industry Conference & 15th Annual Meeting October 2012
-
(2012)
ODVA Industry Conference & 15th Annual Meeting
-
-
Didier, P.1
-
9
-
-
34548048602
-
Risk assessment: The first step
-
Miller D, Byres E. Risk assessment: The first step. InTech 2005.
-
(2005)
InTech
-
-
Miller, D.1
Byres, E.2
-
11
-
-
0035010847
-
Analysis of the delay and jitter of voice traffic over the Internet
-
M.J. Karam, F.A. Tobagi, Analysis of the delay and jitter of voice traffic over the Internet, in: Proc. of IEEE INFOCOM '01, 2001.
-
(2001)
Proc. of IEEE INFOCOM '01
-
-
Karam, M.J.1
Tobagi, F.A.2
-
12
-
-
34548331345
-
Communication in industrial automation-what is going on
-
Elsevier Ltd
-
P. Neumann, "Communication in industrial automation-what is going on?" in Control Engineering Practice. Elsevier Ltd, 2006, vol. 15, pp.1332-1347.
-
(2006)
Control Engineering Practice
, vol.15
, pp. 1332-1347
-
-
Neumann, P.1
-
13
-
-
0034539419
-
Stability of networked control systems: Explicit analysis of delay
-
AACC, Jun
-
M. S. Branicky, S. M. Phillips, W. Zhang, "Stability of networked control systems: Explicit analysis of delay," in Proceedings of the American Control Conference. AACC, Jun 2000, pp. 2352-2357
-
(2000)
Proceedings of the American Control Conference
, pp. 2352-2357
-
-
Branicky, M.S.1
Phillips, S.M.2
Zhang, W.3
-
14
-
-
21644440888
-
Security for Industrial Communication Systems
-
JUNE
-
Dzung, D, Naedele, M, Von Hoff,T.P. Crevatin,M ,Security for Industrial Communication Systems, Proceedings Of The IEEE, Vol. 93, NO. 6, JUNE 2005.
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.6
-
-
Dzung, D.1
Naedele, M.2
Von Hoff, T.P.3
Crevatin, M.4
-
15
-
-
21644486638
-
Security is harder than you think
-
Jul./Aug.
-
J. Viega and M. Messier, "Security is harder than you think," ACM Queue, vol. 2, pp. 60-65, Jul./Aug. 2004.
-
(2004)
ACM Queue
, vol.2
, pp. 60-65
-
-
Viega, J.1
Messier, M.2
-
19
-
-
84957885743
-
Minimum Security Requirements for Federal Information and Information Systems
-
March Framework for Improving Critical Infrastructure Cybersecurity NIST February 2014
-
Minimum Security Requirements for Federal Information and Information Systems, National Institute for Standards and Technology, FIPS 200, March 2006. Framework for Improving Critical Infrastructure Cybersecurity. NIST February 2014
-
(2006)
National Institute for Standards and Technology, FIPS
, vol.200
-
-
-
23
-
-
84860719241
-
Cyber security challenges in smart grids
-
M. B. Line, I. A. Tondel, M. G. Jaatun, "Cyber security challenges in Smart Grids," in Innovative Smart Grid Technologies (ISGT Europe), 2011 2nd IEEE PES International Conference and Exhibition on, 2011, pp. 1-8.
-
(2011)
Innovative Smart Grid Technologies (ISGT Europe) 2011 2nd IEEE PES International Conference and Exhibition on
, pp. 1-8
-
-
Line, M.B.1
Tondel, I.A.2
Jaatun, M.G.3
-
26
-
-
84883028882
-
Native support for Modbus RTU protocol in Snort intrusion detection system
-
Tylman, Wojciech. "Native support for Modbus RTU protocol in Snort intrusion detection system." New Results in Dependability & Comput. Syst. AISC 224 (2013): 479-487.
-
(2013)
New Results in Dependability & Comput. Syst. AISC
, vol.224
, pp. 479-487
-
-
Tylman, W.1
-
29
-
-
77949276621
-
An efficient key management scheme for secure SCADA communication
-
Sungjin Lee, Donghyun Choi, a. Choonsik Park, S. Kim, "An Efficient Key Management Scheme for Secure SCADA Communication," World Academy of Science, Engineering and Technology, vol. 45, 2008.
-
(2008)
World Academy of Science, Engineering and Technology
, vol.45
-
-
Lee, S.1
Donghyun Choi, A.2
Choonsik Park, S.K.3
-
30
-
-
0033893174
-
Secure group communications using key graphs
-
W. Chung Kei, M. Gouda, S. S. Lam, "Secure group communications using key graphs," Networking, IEEE/ACM Transactions on, vol. 8, pp. 16-30, 2000.
-
(2000)
Networking IEEE/ACM Transactions on
, vol.8
, pp. 16-30
-
-
Chung Kei, W.1
Gouda, M.2
Lam, S.S.3
-
31
-
-
77950187346
-
Efficient secure group communications for SCADA
-
C. Donghyun, L. Sungjin, W. Dongho, K. Seungjoo, "Efficient Secure Group Communications for SCADA," Power Delivery, IEEE Transactions on, vol. 25, pp. 714-722, 2010.
-
(2010)
Power Delivery IEEE Transactions on
, vol.25
, pp. 714-722
-
-
Donghyun, C.1
Sungjin, L.2
Dongho, W.3
Seungjoo, K.4
-
32
-
-
67650661171
-
Advanced key-management architecture for secure SCADA communications
-
C. Donghyun, K. Hakman, W. Dongho, K. Seungjoo, "Advanced Key-Management Architecture for Secure SCADA Communications," Power Delivery, IEEE Transactions on, vol. 24, pp. 1154-1163, 2009.
-
(2009)
Power Delivery IEEE Transactions on
, vol.24
, pp. 1154-1163
-
-
Donghyun, C.1
Hakman, K.2
Dongho, W.3
Seungjoo, K.4
-
34
-
-
84921354433
-
Control systems security from the front lines
-
Peisert, Sean, et al. "Control Systems Security from the Front Lines." Security & Privacy, IEEE 12.6 (2014): 55-58.
-
(2014)
Security & Privacy IEEE
, vol.12
, Issue.6
, pp. 55-58
-
-
Peisert, S.1
|