-
1
-
-
72849108705
-
-
Australia; The MITRE Corporation: McLean, VA, USA
-
Abrams, M.; Weiss, J. Malicious Control System Cyber Security Attack Case Study: Maroochy Water Services, Australia; The MITRE Corporation: McLean, VA, USA, 2008.
-
(2008)
Malicious Control System Cyber Security Attack Case Study: Maroochy Water Services
-
-
Abrams, M.1
Weiss, J.2
-
2
-
-
79957616447
-
Stuxnet: Dissecting a cyberwarfare weapon
-
Langner, R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Secur. Priv. 2011, 9, 49–51.
-
(2011)
IEEE Secur. Priv
, vol.9
, pp. 49-51
-
-
Langner, R.1
-
4
-
-
84861093550
-
SCADA security in the light of Cyber-Warfare
-
Nicholson, A.; Webber, S.; Dyer, S.; Patel, T.; Janicke, H. SCADA security in the light of Cyber-Warfare. Comput. Secur. 2012, 31, 418–436.
-
(2012)
Comput. Secur
, vol.31
, pp. 418-436
-
-
Nicholson, A.1
Webber, S.2
Dyer, S.3
Patel, T.4
Janicke, H.5
-
5
-
-
84958193921
-
-
InformationWeek.com
-
Radvanovsky, B.; Brodsky, J. InformationWeek.com. 2013. Available online: http://www.informationweek.co.uk/government/security/thousands-of-industrial-control-systems/240146091 (accessed on 2 May 2013).
-
(2013)
-
-
Radvanovsky, B.1
Brodsky, J.2
-
6
-
-
84901462416
-
Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices
-
Bodenheim, R.; Butts, J.; Dunlap, S.; Mullins, B. Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices. Int. J. Crit. Infrastruct. Prot. 2014, 7, 114–123.
-
(2014)
Int. J. Crit. Infrastruct. Prot
, vol.7
, pp. 114-123
-
-
Bodenheim, R.1
Butts, J.2
Dunlap, S.3
Mullins, B.4
-
7
-
-
84929278091
-
Survey of cyber security management in industrial control systems
-
Knowles, W.; Prince, D.; Hutchison, D.; Disso, J.F.P.; Jones, K. A survey of cyber security management in industrial control systems. Int. J. Crit. Infrastruct. Prot. 2015, 9, 52–80.
-
(2015)
Int. J. Crit. Infrastruct. Prot
, vol.9
, pp. 52-80
-
-
Knowles, W.1
Prince, D.2
Hutchison, D.3
Disso, J.F.P.4
Jones, K.A.5
-
9
-
-
84958193922
-
-
ICS-CERT. ICS-CERT Monitor Newsletter
-
ICS-CERT. ICS-CERT Monitor Newsletter. 2015. Available online: https://ics-cert.us-cert.gov/si tes/default/files/Monitors/ICS-CERT_Monitor_Sep2014-Feb2015.pdf (accessed on 3 September 2015).
-
(2015)
-
-
-
10
-
-
84958193923
-
-
Euractiv. EU, US go separate ways on cybersecurity
-
Euractiv. EU, US go separate ways on cybersecurity; 2013. Available online: http://www.euractiv.com/specialreport-cybersecurity/eu-us-set-different-approach-cyb-news-518252 (accessed on 3 May 2013).
-
(2013)
-
-
-
11
-
-
0040966892
-
-
Her Majesty’s Government. A Strong Britain in an Age of Uncertainty, Her Majesty’s Government: London, UK
-
Her Majesty’s Government. A Strong Britain in an Age of Uncertainty: The National Security Strategy; Her Majesty’s Government: London, UK, 2010.
-
(2010)
The National Security Strategy
-
-
-
12
-
-
84893445259
-
SCADA—Specific intrusion detection/prevention systems: A survey and taxonomy
-
Zhu, B.; Sastry, S. SCADA—Specific intrusion detection/prevention systems: A survey and taxonomy. In Proceedings of the 1st Workshop on Secure Control Systems (SCS), Stockholm, Sweden, 12 April 2010.
-
(2010)
Proceedings of the 1St Workshop on Secure Control Systems (SCS), Stockholm, Sweden, 12
-
-
Zhu, B.1
Sastry, S.2
-
13
-
-
84928173034
-
Integrated OCSVM Mechanism for intrusion detection in SCADA systems
-
Maglaras, L.A.; Jiang, J.; Cruz, T.J. Integrated OCSVM Mechanism for intrusion detection in SCADA systems. Electron. Lett. 2014, 50, 1935–1936.
-
(2014)
Electron. Lett
, vol.50
, pp. 1935-1936
-
-
Maglaras, L.A.1
Jiang, J.2
Cruz, T.J.3
-
14
-
-
84908249024
-
-
International Computer Science Institute: Berkeley, CA, USA
-
Hadziosmanovic, D.; Sommer, R.; Zambon, E.; Hartel, P. Through the Eye of the PLC: Towards Semantic Security Monitoring for Industrial Control Systems; Technical Report; International Computer Science Institute: Berkeley, CA, USA, 2013.
-
(2013)
Through the Eye of the PLC: Towards Semantic Security Monitoring for Industrial Control Systems; Technical Report
-
-
Hadziosmanovic, D.1
Sommer, R.2
Zambon, E.3
Hartel, P.4
-
17
-
-
84991904281
-
Position Paper: Safety and Security Monitoring in ICS/SCADA Systems
-
St Polten, Austria, 11–12 September
-
Nicholson, A.; Janicke, H.; Cau, A. Position Paper: Safety and Security Monitoring in ICS/SCADA Systems. In Proceedings of the 2nd International Symposium on Industrial Control System and SCADA Cyber Security Research (ICS-CSR’14), St Polten, Austria, 11–12 September 2014.
-
(2014)
Proceedings of the 2Nd International Symposium on Industrial Control System and SCADA Cyber Security Research (ICS-CSR’14)
-
-
Nicholson, A.1
Janicke, H.2
Cau, A.3
-
18
-
-
34047126237
-
Anomaly-based intrusion detection for SCADA systems
-
Albuquerque, NM, USA, 12–16 November
-
Yang, D.; Usynin, A.; Hines, J.W. Anomaly-based intrusion detection for SCADA systems. In Proceedings of the 5th International Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 05), Albuquerque, NM, USA, 12–16 November 2006; pp. 12–16.
-
(2006)
Proceedings of the 5Th International Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (Npic&Hmit 05)
, pp. 12-16
-
-
Yang, D.1
Usynin, A.2
Hines, J.W.3
-
19
-
-
33750405289
-
Security issues in SCADA networks
-
Igure, V.M.; Laughter, S.A.; Williams, R.D. Security issues in SCADA networks. Comput. Secur. 2006, 25, 498–506.
-
(2006)
Comput
, vol.25
, pp. 498-506
-
-
Igure, V.M.1
Laughter, S.A.2
Williams, R.D.3
-
20
-
-
70350634504
-
Using model-based intrusion detection for SCADA networks
-
Miami, FL, USA, 23–25 June
-
Cheung, S.; Dutertre, B.; Fong, M.; Lindqvist, U.; Skinner, K.; Valdes, A. Using model-based intrusion detection for SCADA networks. In Proceedings of the SCADA Security Scientific Symposium, Miami, FL, USA, 23–25 June 2007; pp. 1–12.
-
(2007)
Proceedings of the SCADA Security Scientific Symposium
, pp. 1-12
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
21
-
-
84869463457
-
SABOT: Specification-based payload generation for programmable logic controllers
-
Raleigh, NC, USA, 16–18 October
-
McLaughlin, S.; McDaniel, P. SABOT: specification-based payload generation for programmable logic controllers. In Proceedings of the 2012 ACM Conference on Computer And Communications Security (ACM), Raleigh, NC, USA, 16–18 October 2012; pp. 439–449.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security (ACM)
, pp. 439-449
-
-
McLaughlin, S.1
McDaniel, P.2
-
22
-
-
84870649954
-
-
Cornel University: Ithaca, NY, USA
-
Mohan, S.; Bak, S.; Betti, E.; Yun, H.; Sha, L.; Caccamo, M. S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems; Cornel University: Ithaca, NY, USA, 2012.
-
(2012)
S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems
-
-
Mohan, S.1
Bak, S.2
Betti, E.3
Yun, H.4
Sha, L.5
Caccamo, M.6
-
23
-
-
0142152297
-
Executing the Formal Semantics of the Accellera Property Specification Language by Mechanised Theorem Proving
-
Springer: Berlin, Germany
-
Gordon, M.; Hurd, J.; Slind, K. Executing the Formal Semantics of the Accellera Property Specification Language by Mechanised Theorem Proving. In Correct Hardware Design and Verification Methods; Lecture Notes in Computer Science; Springer: Berlin, Germany, 2003; Volume 2860; pp. 200–215.
-
(2003)
Correct Hardware Design and Verification Methods; Lecture Notes in Computer Science;
, vol.2860
, pp. 200-215
-
-
Gordon, M.1
Hurd, J.2
Slind, K.3
-
24
-
-
40049095637
-
Constructing checkers from PSL properties
-
In
-
Gheorghita, S.V.; Grigore, R. Constructing checkers from PSL properties. In Proceedings of the 15th International Conference on Control Systems and Computer Science, Bucharest, Romania, 15 May 2005; pp. 757–762.
-
(2005)
Proceedings of the 15Th International Conference on Control Systems and Computer Science, Bucharest, Romania
, vol.15
, pp. 757-762
-
-
Gheorghita, S.V.1
Grigore, R.2
-
25
-
-
35648949009
-
Efficient Automata-Based Assertion-Checker Synthesis of SEREs for Hardware Emulation
-
Pacifico Yokohama, Japan, 23–26 January 2007; IEEE Computer Society: Washington, DC, USA
-
Boule, M.; Zilic, Z. Efficient Automata-Based Assertion-Checker Synthesis of SEREs for Hardware Emulation. In Proceedings of the 2007 Asia and South Pacific Design Automation Conference (ASP-DAC’07), Pacifico Yokohama, Japan, 23–26 January 2007; IEEE Computer Society: Washington, DC, USA, 2007; pp. 324–329.
-
(2007)
Proceedings of the 2007 Asia and South Pacific Design Automation Conference (ASP-DAC’07)
, pp. 324-329
-
-
Boule, M.1
Zilic, Z.2
-
26
-
-
1842789901
-
Checking Finite Traces Using Alternating Automata. Form. Methods Syst
-
Finkbeiner, B.; Sipma, H. Checking Finite Traces Using Alternating Automata. Form. Methods Syst. Des. 2004, 24, 101–127.
-
(2004)
Des
, vol.24
, pp. 101-127
-
-
Finkbeiner, B.1
Sipma, H.2
-
27
-
-
41849151734
-
Engineering of An Assertion-based PSLSimple-Verilog Dynamic Verifier by Alternating Automata. Electron. Notes Theor. Comput
-
Jin, N.; Shen, C.; Chen, J.; Ni, T. Engineering of An Assertion-based PSLSimple-Verilog Dynamic Verifier by Alternating Automata. Electron. Notes Theor. Comput. Sci. 2008, 207, 153–169.
-
(2008)
Sci
, vol.207
, pp. 153-169
-
-
Jin, N.1
Shen, C.2
Chen, J.3
Ni, T.4
-
28
-
-
78650108677
-
Optimized temporal monitors for SystemC
-
St. Julians, Malta, 1–4 November 2010; Springer-Verlag: Berlin, Germany
-
Tabakov, D.; Vardi, M.Y. Optimized temporal monitors for SystemC. In Proceedings of the First International Conference on Runtime Verification (RV’10), St. Julians, Malta, 1–4 November 2010; Springer-Verlag: Berlin, Germany, 2010; pp. 436–451.
-
(2010)
Proceedings of the First International Conference on Runtime Verification (RV’10)
, pp. 436-451
-
-
Tabakov, D.1
Vardi, M.Y.2
-
29
-
-
17644397342
-
Run-time analysis of time-critical systems
-
Zhou, S.; Zedan, H.; Cau, A. Run-time analysis of time-critical systems. J. Syst. Arch. 2005, 51, 331–345.
-
(2005)
J. Syst. Arch
, vol.51
, pp. 331-345
-
-
Zhou, S.1
Zedan, H.2
Cau, A.3
-
31
-
-
17444417374
-
Rewriting-Based Techniques for Runtime Verification
-
Rosu, G.; Havelund, K. Rewriting-Based Techniques for Runtime Verification. Autom. Softw. Eng. 2005, 12, 151–197.
-
(2005)
Autom. Softw. Eng
, vol.12
, pp. 151-197
-
-
Rosu, G.1
Havelund, K.2
-
32
-
-
77952939028
-
Rule Systems for Run-time Monitoring: From Eagle to RuleR
-
Barringer, H.; Rydeheard, D.E.; Havelund, K. Rule Systems for Run-time Monitoring: From Eagle to RuleR. J. Logic. Comput. 2010, 20, 675–706.
-
(2010)
J. Logic. Comput
, vol.20
, pp. 675-706
-
-
Barringer, H.1
Rydeheard, D.E.2
Havelund, K.3
-
33
-
-
18244404714
-
Runtime Verification of Timed LTL using Disjunctive Normalized Equation Systems
-
Kristoffersen, K.J.; Pedersen, C.; Andersen, H.R. Runtime Verification of Timed LTL using Disjunctive Normalized Equation Systems. Electronic Notes Theor. Comput. Sci. 2003, 89, 210–225.
-
(2003)
Electronic Notes Theor. Comput. Sci
, vol.89
, pp. 210-225
-
-
Kristoffersen, K.J.1
Pedersen, C.2
Andersen, H.R.3
-
34
-
-
0242444344
-
-
Technical Report; Automated Software Engineering Group, NASA Ames Research Center: Mountain View, CA, USA
-
Rosu, G.; Havelund, K. Synthesizing Dynamic Programming Algorithms From Linear Temporal Logic Formulae; Technical Report; Automated Software Engineering Group, NASA Ames Research Center: Mountain View, CA, USA, 2001.
-
(2001)
Synthesizing Dynamic Programming Algorithms from Linear Temporal Logic Formulae
-
-
Rosu, G.1
Havelund, K.2
-
35
-
-
0028510891
-
The Purdue enterprise reference architectur
-
Williams, T. The Purdue enterprise reference architectur. Comput. Ind. 1994, 24, 141–158.
-
(1994)
Comput. Ind
, vol.24
, pp. 141-158
-
-
Williams, T.1
-
36
-
-
84958164197
-
-
United States Department of Homeland Security, U.D. Recommended Practice:,; United States Department of Homeland Security: Washington, DC, USA
-
United States Department of Homeland Security, U.D. Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategie; United States Department of Homeland Security: Washington, DC, USA, 2009.
-
Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategie
-
-
-
38
-
-
84958193926
-
-
CPNI. Security for Industrial Control systems, Good practice guide
-
CPNI. Security for Industrial Control systems, Good practice guide. 2015. Available online: https://www.cpni.gov.uk/Documents/Publications/2015/12-May-2015-SICS%20-%20Framework %20Overview%20Final%20v1%202.pdf (accessed on 15 July 2015)
-
(2015)
-
-
-
39
-
-
84958193927
-
Using ITL and Tempura for large scale specification and simulation
-
Braga, Portugues, 24–26 January
-
Cau, A.; Zedan, H.; Coleman, N.; Moszkowski, B.C. Using ITL and Tempura for large scale specification and simulation. In Proceedings of the 4th Euromicro Workshop on Parallel and Distributed Processing, Braga, Portugues, 24–26 January 1996.
-
(1996)
Proceedings of the 4Th Euromicro Workshop on Parallel and Distributed Processing
-
-
Cau, A.1
Zedan, H.2
Coleman, N.3
Moszkowski, B.C.4
-
41
-
-
0004325322
-
-
Ph.D. Thesis, The Trinity College, University of Cambridge: Cambridge, UK
-
Hale, R.W.S. Programming in Temporal Logic. Ph.D. Thesis, The Trinity College, University of Cambridge: Cambridge, UK, 1988.
-
(1988)
Programming in Temporal Logic.
-
-
Hale, R.W.S.1
-
42
-
-
84949221392
-
Compositional Reasoning Using Interval Temporal Logic and Tempura
-
The Significant Difference; Roever, W.P.D., Langmaack, H., Pnueli, A., Eds.; Springer Verlag: Berlin, Germany
-
Moszkowski, B. Compositional Reasoning Using Interval Temporal Logic and Tempura. In Compositionality: The Significant Difference; Roever, W.P.D., Langmaack, H., Pnueli, A., Eds.; Springer Verlag: Berlin, Germany, 1998; Volume 1486, pp. 439–464.
-
(1998)
Compositionality
, vol.1486
, pp. 439-464
-
-
Moszkowski, B.1
|