-
1
-
-
21644440888
-
Security for industrial communication systems
-
D. Dzung, M. Naedele, T. P. vonHoff, and M. Crevatin, "Security for industrial communication systems, " Proceedings of the IEEE, vol. 93, no. 6, pp. 1152-1177, 2005.
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.6
, pp. 1152-1177
-
-
Dzung, D.1
Naedele, M.2
VonHoff, T.P.3
Crevatin, M.4
-
2
-
-
84946693621
-
Towards secure wireless TTEthernet for industrial process automation applications
-
Barcelona, Spain, September
-
E. Lisova, E. Uhlemann, J. Akerberg, and M. Bojrkman, "Towards secure wireless TTEthernet for industrial process automation applications, " in Proceedings of the IEEE Emerging Technology and Factory Automation (ETFA '14), pp. 1-4, Barcelona, Spain, September 2014.
-
(2014)
Proceedings of the IEEE Emerging Technology and Factory Automation (ETFA '14)
, pp. 1-4
-
-
Lisova, E.1
Uhlemann, E.2
Akerberg, J.3
Bojrkman, M.4
-
3
-
-
84964902449
-
A survey of security frameworks suitable for distributed control systems
-
Trivandrum, India, December
-
E. Lisova, E. Uhlemann, W. Steiner, J. Akerberg, and M. Bjorkman, "A survey of security frameworks suitable for distributed control systems, " in Proceedings of the International Conference on Computing and Network Communications (CoCoNet '15), pp. 205-211, Trivandrum, India, December 2015.
-
(2015)
Proceedings of the International Conference on Computing and Network Communications (CoCoNet '15)
, pp. 205-211
-
-
Lisova, E.1
Uhlemann, E.2
Steiner, W.3
Akerberg, J.4
Bjorkman, M.5
-
4
-
-
84974624930
-
Risk evaluation of an ARP poisoning attack on clock synchronization for industrial applications
-
Taipei, Taiwan
-
E. Lisova, E. Uhlemann, W. Steiner, and J. akerberg, "Risk evaluation of an ARP poisoning attack on clock synchronization for industrial applications, " in Proceedings of the IEEE International Conference on Industrial Technology (ICIT '16), Taipei, Taiwan, 2016.
-
(2016)
Proceedings of the IEEE International Conference on Industrial Technology (ICIT '16)
-
-
Lisova, E.1
Uhlemann, E.2
Steiner, W.3
Akerberg, J.4
-
5
-
-
0028430224
-
Network intrusion detection
-
B. Mukherjee, L. T. Heberlein, and K. N. Levitt, "Network intrusion detection, " IEEENetwork, vol. 8, no. 3, pp. 26-41, 1994.
-
(1994)
IEEENetwork
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
6
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
K. Etessami and S. K. Rajamani, Eds. vol. 3576 of Lecture Notes in Computer Science, Springer, Berlin, Germany
-
A. Armando, D. Basin, Y. Boichut et al., "The AVISPA tool for the automated validation of internet security protocols and applications, " in Computer Aided Verification, K. Etessami and S. K. Rajamani, Eds., vol. 3576 of Lecture Notes in Computer Science, pp. 281-285, Springer, Berlin, Germany, 2005.
-
(2005)
Computer Aided Verification
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
-
7
-
-
84973379507
-
-
OMNeT++, January
-
OMNeT++, January 2015, http://www. omnetpp. org/.
-
(2015)
-
-
-
9
-
-
82855169661
-
Validation and verification of IEEE 1588 annex K
-
Munich, Germany, September
-
B. Hirschler and A. Treytl, "Validation and verification of IEEE 1588 annex K, " in Proceedings of the International IEEE Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS '11), pp. 44-49, Munich, Germany, September 2011.
-
(2011)
Proceedings of the International IEEE Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS '11)
, pp. 44-49
-
-
Hirschler, B.1
Treytl, A.2
-
10
-
-
84870313183
-
A game theoretic analysis of delay attacks against time synchronization protocols
-
San Francisco, Calif, USA, September
-
T. Mizrahi, "A game theoretic analysis of delay attacks against time synchronization protocols, " in Proceedings of the International IEEE Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS '12), pp. 1-6, San Francisco, Calif, USA, September 2012.
-
(2012)
Proceedings of the International IEEE Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS '12)
, pp. 1-6
-
-
Mizrahi, T.1
-
11
-
-
84942287873
-
A configuration agent based on the time-triggered paradigm for real-time networks
-
IEEE, Palma, Majorca, Spain, May
-
M. Gutiérrez, W. Steiner, R. Dobrin, and S. Punnekkat, "A configuration agent based on the time-triggered paradigm for real-time networks, " in Proceedings of the IEEE World Conference on Factory Communication Systems (WFCS '15), pp. 1-4, IEEE, Palma, Majorca, Spain, May 2015.
-
(2015)
Proceedings of the IEEE World Conference on Factory Communication Systems (WFCS '15)
, pp. 1-4
-
-
Gutiérrez, M.1
Steiner, W.2
Dobrin, R.3
Punnekkat, S.4
-
12
-
-
84966340207
-
Learning the parameters of periodic traffic based on network measurements
-
October
-
M. Gutiérrez, W. Steiner, R. Dobrin, and S. Punnekkat, "Learning the parameters of periodic traffic based on network measurements, " in Proceedings of the IEEE International Workshop on Measurements & Networking (M&N '15), pp. 1-6, October 2015.
-
(2015)
Proceedings of the IEEE International Workshop on Measurements & Networking (M&N '15)
, pp. 1-6
-
-
Gutiérrez, M.1
Steiner, W.2
Dobrin, R.3
Punnekkat, S.4
-
13
-
-
0024984013
-
A network security monitor
-
IEEE, Oakland, Calif, USA, May
-
L. Heberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood, and D. Wolber, "A network security monitor, " in Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 296-304, IEEE, Oakland, Calif, USA, May 1990.
-
(1990)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 296-304
-
-
Heberlein, L.1
Dias, G.2
Levitt, K.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
14
-
-
84959056190
-
Periodicity classification of HTTP traffic to detect HTTP Botnets
-
Langkawi, Malaysia, April
-
M. Eslahi, M. S. Rohmad, H. Nilsaz, M. V. Naseri, N. Tahir, and H. Hashim, "Periodicity classification of HTTP traffic to detect HTTP Botnets, " in Proceedings of the IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE '15), pp. 119-123, Langkawi, Malaysia, April 2015.
-
(2015)
Proceedings of the IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE '15)
, pp. 119-123
-
-
Eslahi, M.1
Rohmad, M.S.2
Nilsaz, H.3
Naseri, M.V.4
Tahir, N.5
Hashim, H.6
-
15
-
-
44149118912
-
Intrusion techniques: Comparative study of network intrusion detection systems
-
Las Vegas, Nev, USA, April
-
M. Garuba, C. Liu, and D. Fraites, "Intrusion techniques: comparative study of network intrusion detection systems, " in Proceedings of the 5th International Conference on Information Technology: New Generations (ITNG '08), pp. 592-598, Las Vegas, Nev, USA, April 2008.
-
(2008)
Proceedings of the 5th International Conference on Information Technology: New Generations (ITNG '08)
, pp. 592-598
-
-
Garuba, M.1
Liu, C.2
Fraites, D.3
-
16
-
-
84966521149
-
A metricsbased approach to intrusion detection system evaluation for distributed real-time systems
-
Ft. Lauderdale, Fla, USA, April
-
G. Fink, B. Chappell, T. Turner, and K. O'Donoghue, "A metricsbased approach to intrusion detection system evaluation for distributed real-time systems, " in Proceedings 16th the International Parallel and Distributed Processing Symposium (IPDPS '02), Abstracts and CD-ROM, 8 pages, Ft. Lauderdale, Fla, USA, April 2002.
-
(2002)
Proceedings 16th the International Parallel and Distributed Processing Symposium (IPDPS '02), Abstracts and CD-ROM
-
-
Fink, G.1
Chappell, B.2
Turner, T.3
O'Donoghue, K.4
-
18
-
-
84952888996
-
Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations
-
Luxembourg City, Luxembourg
-
B. Kang, P. Maynard, K. McLaughlin et al., "Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations, " in Proceedings of the IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA '15), pp. 1-8, Luxembourg City, Luxembourg, 2015.
-
(2015)
Proceedings of the IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA '15)
, pp. 1-8
-
-
Kang, B.1
Maynard, P.2
McLaughlin, K.3
-
20
-
-
19744367735
-
OFMC: A symbolic model checker for security protocols
-
D. Basin, S. Modersheim, and L. Vigano, "OFMC: a symbolic model checker for security protocols, " International Journal of Information Security, vol. 4, no. 3, pp. 181-208, 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Modersheim, S.2
Vigano, L.3
-
21
-
-
37049030912
-
A security protocol animator tool for AVISPA
-
Pisa, Italy, May
-
Y. Glouche, T. Genet, O. Heen, and O. Courtay, "A security protocol animator tool for AVISPA, " in Proceedings of the ARTIST2Workshop on Security Specification and Verification of Embedded Systems, Pisa, Italy, May 2006.
-
(2006)
Proceedings of the ARTIST2Workshop on Security Specification and Verification of Embedded Systems
-
-
Glouche, Y.1
Genet, T.2
Heen, O.3
Courtay, O.4
-
22
-
-
84964447933
-
-
June
-
INET Framework, June 2015, https://inet. omnetpp. org/.
-
(2015)
INET Framework
-
-
|