-
2
-
-
84894061097
-
SCADA communication and security issues
-
J. Gao, J. Liu, B. Rajan, R. Nori, B. Fu, Y. Xiao, W. Liang, C. Philip Chen, "SCADA communication and security issues," Security Commun. Netw., vol. 7, no. 1, pp. 175-194, 2014.
-
(2014)
Security Commun. Netw.
, vol.7
, Issue.1
, pp. 175-194
-
-
Gao, J.1
Liu, J.2
Rajan, B.3
Nori, R.4
Fu, B.5
Xiao, Y.6
Liang, W.7
Philip Chen, C.8
-
4
-
-
84963945435
-
Detection of SSH host spoofing in control systems through network telemetry analysis
-
S. Ponomarev, N. Wallace, T. Atkison, "Detection of SSH host spoofing in control systems through network telemetry analysis," in Proc. Cyber Inf. Security Res. Conf., 2014, pp. 1-12.
-
(2014)
Proc. Cyber Inf. Security Res. Conf.
, pp. 1-12
-
-
Ponomarev, S.1
Wallace, N.2
Atkison, T.3
-
5
-
-
78650062267
-
-
White Paper, Symantec Corp., Security Response
-
N. Falliere, L. O. Murchu, E. Chien, "W32. stuxnet dossier," White Paper, Symantec Corp., Security Response, 2011.
-
(2011)
W32. Stuxnet Dossier
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
7
-
-
84929222404
-
Stuxnet under the microscope
-
Sep.
-
A. Matrosov, E. Rodionov, D. Harley, J. Malcho, "Stuxnet under the microscope," ESET LLC, Sep. 2010.
-
(2010)
ESET LLC
-
-
Matrosov, A.1
Rodionov, E.2
Harley, D.3
Malcho, J.4
-
8
-
-
84963992133
-
A dimensional transformation scheme for power grid cyber event detection
-
N. Wallace, S. Ponomarev, T. Atkison, "A dimensional transformation scheme for power grid cyber event detection," in Proc. Cyber Inf. Security Res. Conf., 2014, pp. 1-12.
-
(2014)
Proc. Cyber Inf. Security Res. Conf.
, pp. 1-12
-
-
Wallace, N.1
Ponomarev, S.2
Atkison, T.3
-
9
-
-
79955867639
-
A multidimensional critical state analysis for detecting intrusions in SCADA systems
-
May
-
A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. N. Fovino, A. Trombetta, "A multidimensional critical state analysis for detecting intrusions in SCADA systems," IEEE Trans. Ind. Informat., vol. 7, no. 2, pp. 179-186, May 2011.
-
(2011)
IEEE Trans. Ind. Informat.
, vol.7
, Issue.2
, pp. 179-186
-
-
Carcano, A.1
Coletta, A.2
Guglielmi, M.3
Masera, M.4
Fovino, I.N.5
Trombetta, A.6
-
10
-
-
70350634504
-
Using Model-based intrusion detection for SCADA networks
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, A. Valdes, "Using Model-based intrusion detection for SCADA networks," in Proc. SCADA Security Sci. Symp., 2007, pp. 1-12.
-
(2007)
Proc. SCADA Security Sci. Symp.
, pp. 1-12
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
11
-
-
20344364652
-
Denial of service attacks on network-based control systems: Impact and mitigation
-
May
-
M. Long, C.-H. J. Wu, J. Y. Hung, "Denial of service attacks on network-based control systems: Impact and mitigation," IEEE Trans. Ind. Informat., vol. 1, no. 2, pp. 85-96, May 2005.
-
(2005)
IEEE Trans. Ind. Informat.
, vol.1
, Issue.2
, pp. 85-96
-
-
Long, M.1
Wu, C.-H.J.2
Hung, J.Y.3
-
12
-
-
0004164370
-
-
Englewood Cliffs, NJ, USA: Prentice-Hall
-
G. C. Goodwin, S. F. Graebe, M. E. Salgado, Control System Design, vol. 240. Englewood Cliffs, NJ, USA: Prentice-Hall, 2001.
-
(2001)
Control System Design
, vol.240
-
-
Goodwin, G.C.1
Graebe, S.F.2
Salgado, M.E.3
-
14
-
-
84963936882
-
-
S. Oh, H. Chung, S. Lee, K. Lee, "Advanced protocol to prevent Man-in-the-middle attack in SCADA system," vol. 8, p. 1, 2014.
-
(2014)
Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System
, vol.8
, pp. 1
-
-
Oh, S.1
Chung, H.2
Lee, S.3
Lee, K.4
-
15
-
-
84904153603
-
Scada intrusion detection system based on temporal behavior of frequent patterns
-
N. Sayegh, I. H. Elhajj, A. Kayssi, A. Chehab, "Scada intrusion detection system based on temporal behavior of frequent patterns," in Proc. 17th IEEE Mediterranean Electrotechnical Conf., 2014, pp. 432-438.
-
(2014)
Proc. 17th IEEE Mediterranean Electrotechnical Conf.
, pp. 432-438
-
-
Sayegh, N.1
Elhajj, I.H.2
Kayssi, A.3
Chehab, A.4
-
16
-
-
84857516371
-
A taxonomy of cyber attacks on SCADA systems
-
B. Zhu, A. Joseph, S. Sastry, "A taxonomy of cyber attacks on SCADA systems," in Proc. Int. Conf. Internet Things 4th Int. Conf. Cyber, Phys. Social Comput., 2011, pp. 380-388.
-
(2011)
Proc. Int. Conf. Internet Things 4th Int. Conf. Cyber, Phys. Social Comput.
, pp. 380-388
-
-
Zhu, B.1
Joseph, A.2
Sastry, S.3
-
19
-
-
0038059205
-
IP traceback with deterministic packet marking
-
Apr.
-
A. Belenky and N. Ansari, "IP traceback with deterministic packet marking," IEEE Commun. Lett., vol. 7, no. 4, pp. 162-164, Apr. 2003.
-
(2003)
IEEE Commun. Lett.
, vol.7
, Issue.4
, pp. 162-164
-
-
Belenky, A.1
Ansari, N.2
-
20
-
-
51349133236
-
Detecting 802.11 MAC layer spoofing using received signal strength
-
Y. Sheng, K. Tan, G. Chen, D. Kotz, A. Campbell, "Detecting 802.11 MAC layer spoofing using received signal strength," in Proc. IEEE 27th Conf. Comput. Commun., 2008, pp. 1768-1776.
-
(2008)
Proc. IEEE 27th Conf. Comput. Commun.
, pp. 1768-1776
-
-
Sheng, Y.1
Tan, K.2
Chen, G.3
Kotz, D.4
Campbell, A.5
-
21
-
-
0037673373
-
Authenticated encryption in SSH: Provably fixing the SSH binary packet protocol
-
M. Bellare, T. Kohno, C. Namprempre, "Authenticated encryption in SSH: Provably fixing the SSH binary packet protocol," in Proc. 9th ACM Conf. Comput. Commun. Security, 2002, pp. 1-11.
-
(2002)
Proc. 9th ACM Conf. Comput. Commun. Security
, pp. 1-11
-
-
Bellare, M.1
Kohno, T.2
Namprempre, C.3
-
23
-
-
78650011800
-
The security of modern password expiration: An algorithmic framework and empirical analysis
-
Y. Zhang, F. Monrose, M. K. Reiter, "The security of modern password expiration: An algorithmic framework and empirical analysis," in Proc. 17th ACM Conf. Comput. Commun. Security, 2010, pp. 176-186.
-
(2010)
Proc. 17th ACM Conf. Comput. Commun. Security
, pp. 176-186
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M.K.3
-
24
-
-
68049121093
-
Anomaly detection: A survey
-
V. Chandola, A. Banerjee, V. Kumar, "Anomaly detection: A survey," ACM Comput. Surveys, vol. 41, no. 3, p. 15, 2009.
-
(2009)
ACM Comput. Surveys
, vol.41
, Issue.3
, pp. 15
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
25
-
-
61749086468
-
Characterizing network traffic by means of the NetMine framework
-
D. Apiletti, E. Baralis, T. Cerquitelli, V. DElia, "Characterizing network traffic by means of the NetMine framework," Comput. Netw., vol. 53, no. 6, pp. 774-789, 2009.
-
(2009)
Comput. Netw.
, vol.53
, Issue.6
, pp. 774-789
-
-
Apiletti, D.1
Baralis, E.2
Cerquitelli, T.3
Delia, V.4
-
26
-
-
34248358287
-
Traffic classification using clustering algorithms
-
J. Erman, M. Arlitt, A. Mahanti, "Traffic classification using clustering algorithms," in Proc. SIGCOMM Workshop Mining Netw. Data, 2006, pp. 281-286.
-
(2006)
Proc. SIGCOMM Workshop Mining Netw. Data
, pp. 281-286
-
-
Erman, J.1
Arlitt, M.2
Mahanti, A.3
-
28
-
-
84879779698
-
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
-
N. Goldenberg and A. Wool, "Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems," Int. J. Critical Infrastructure Protection, vol. 6, no. 2, pp. 63-75, 2013.
-
(2013)
Int. J. Critical Infrastructure Protection
, vol.6
, Issue.2
, pp. 63-75
-
-
Goldenberg, N.1
Wool, A.2
-
29
-
-
84881634307
-
Observing industrial control system attacks launched via metasploit framework
-
N. Wallace and T. Atkison, "Observing industrial control system attacks launched via metasploit framework," in Proc. 51st ACM Southeast Conf., 2013, pp. 22:1-22:4.
-
(2013)
Proc. 51st ACM Southeast Conf.
, pp. 221-224
-
-
Wallace, N.1
Atkison, T.2
-
31
-
-
84893874008
-
-
New York NY USA: Springer
-
G. James, D. Witten, T. Hastie, R. Tibshirani, An Introduction to Statistical Learning. New York, NY, USA: Springer, 2013.
-
(2013)
An Introduction to Statistical Learning
-
-
James, G.1
Witten, D.2
Hastie, T.3
Tibshirani, R.4
-
32
-
-
84957069091
-
Naive (Bayes) at forty: The independence assumption in information retrieval
-
D. D. Lewis, "Naive (Bayes) at forty: The independence assumption in information retrieval," in Proc. 10th Eur. Conf. Mach. Learning, 1998, pp. 4-15.
-
(1998)
Proc. 10th Eur. Conf. Mach. Learning
, pp. 4-15
-
-
Lewis, D.D.1
-
33
-
-
0001673996
-
A comparison of event models for naive Bayes text classification
-
A. McCallum, K. Nigam et al.,"A comparison of event models for naive Bayes text classification," in Proc. AAAI-98 Workshop Learning Text Categorization, 1998, vol. 752, pp. 41-48.
-
(1998)
Proc. AAAI-98 Workshop Learning Text Categorization
, vol.752
, pp. 41-48
-
-
McCallum, A.1
Nigam, K.2
-
34
-
-
0003766792
-
-
New York, NY, USA: Wiley Online Library
-
D. W. Hosmer, S. Lemeshow, R. X. Sturdivant, Introduction to the Logistic Regression Model. New York, NY, USA: Wiley Online Library, 2000.
-
(2000)
Introduction to the Logistic Regression Model
-
-
Hosmer, D.W.1
Lemeshow, S.2
Sturdivant, R.X.3
-
35
-
-
84894460335
-
Effectiveness evaluation of rule based classifiers for the classification of iris data set
-
Inaugural Special Issue
-
C. L. Devasena, T. Sumathi, V. Gomathi, M. Hemalatha, "Effectiveness evaluation of rule based classifiers for the classification of iris data set," Bonfring Int. J. Man Mach. Interface, vol. 1, no. Inaugural Special Issue, pp. 05-09, 2011.
-
(2011)
Bonfring Int. J. Man Mach. Interface
, vol.1
, pp. 05-09
-
-
Devasena, C.L.1
Sumathi, T.2
Gomathi, V.3
Hemalatha, M.4
-
36
-
-
0003957032
-
-
I. H. Witten, E. Frank, L. E. Trigg, M. A. Hall, G. Holmes, S. J. Cunningham, "Weka: Practical machine learning tools and techniques with java implementations," 1999.
-
(1999)
Weka: Practical Machine Learning Tools and Techniques with Java Implementations
-
-
Witten, I.H.1
Frank, E.2
Trigg, L.E.3
Hall, M.A.4
Holmes, G.5
Cunningham, S.J.6
-
38
-
-
0033902426
-
Modeling TCP latency
-
N. Cardwell, S. Savage, T. Anderson, "Modeling TCP latency," in Proc. 19th Annu. Joint Conf. IEEE Comput. Commun. Soc., 2000, vol. 3, pp. 1742-1751.
-
(2000)
Proc. 19th Annu. Joint Conf IEEE Comput. Commun. Soc.
, vol.3
, pp. 1742-1751
-
-
Cardwell, N.1
Savage, S.2
Anderson, T.3
-
39
-
-
84963950708
-
Performance evaluation of TCP flows
-
F. Hisch, "Performance evaluation of TCP flows," Network, vol. 79, pp. 79-88, 2014.
-
(2014)
Network
, vol.79
, pp. 79-88
-
-
Hisch, F.1
-
40
-
-
74349127408
-
Programming with libpcap-sniffing the network from our own application
-
L. M. Garcia, "Programming with libpcap-sniffing the network from our own application," Hakin9-Comput. Security Mag., vol. 9, pp. 2-2008, 2008.
-
(2008)
Hakin9-Comput. Security Mag.
, vol.9
, pp. 2-2008
-
-
Garcia, L.M.1
|