-
1
-
-
84906928244
-
Improvement of human-plant interactivity via industrial cloud-based supervisory control and data acquisition system
-
Advances in Production Management Systems. Innovative and Knowledge-Based Production Management in a Global-Local World Berlin, Germany: Springer
-
T. Lojka and I. Zolotová, "Improvement of human-plant interactivity via industrial cloud-based supervisory control and data acquisition system," Advances in Production Management Systems. Innovative and Knowledge-Based Production Management in a Global-Local World (IFIP Advances in Information and Communication Technology). Berlin, Germany: Springer, 2014, pp. 83-90.
-
(2014)
IFIP Advances in Information and Communication Technology
, pp. 83-90
-
-
Lojka, T.1
Zolotová, I.2
-
2
-
-
84979551040
-
Smart monitoring of potato crop: A cyber-physical system architecture model in the field of precision agriculture
-
Sep.
-
C.-R. Rad, O. Hancu, I.-A. Takacs, and G. Olteanu, "Smart monitoring of potato crop: A cyber-physical system architecture model in the field of precision agriculture," Agricult. Agricult. Sci. Procedia, vol. 6, pp. 73-79, Sep. 2015, doi: 10.1016/j.aaspro.2015.08.041.
-
(2015)
Agricult. Agricult. Sci. Procedia
, vol.6
, pp. 73-79
-
-
Rad, C.-R.1
Hancu, O.2
Takacs, I.-A.3
Olteanu, G.4
-
3
-
-
84864195643
-
Agent-oriented smart objects development
-
May
-
G. Fortino, A. Guerrieri, and W. Russo, "Agent-oriented smart objects development," in Proc. IEEE 16th Int. Conf. Comput. Supported Cooperat. Work Design (CSCWD), May 2012, pp. 907-912.
-
(2012)
Proc. IEEE 16th Int. Conf. Comput. Supported Cooperat. Work Design (CSCWD)
, pp. 907-912
-
-
Fortino, G.1
Guerrieri, A.2
Russo, W.3
-
4
-
-
85032339833
-
Imperfect information dynamic stackelberg game based resource allocation using hidden Markov for cloud computing
-
Feb.
-
W. Wei, X. Fan, H. Song, X. Fan, and J. Yang, "Imperfect information dynamic stackelberg game based resource allocation using hidden Markov for cloud computing," IEEE Trans. Services Comput., vol. PP, no. 99, p. 1, Feb. 2016, doi: 10.1109/TSC.2016.2528246.
-
(2016)
IEEE Trans. Services Comput.
, vol.PP
, Issue.99
, pp. 1
-
-
Wei, W.1
Fan, X.2
Song, H.3
Fan, X.4
Yang, J.5
-
5
-
-
84964260924
-
Cloud-centric multi-level authentication as a service for secure public safety device networks
-
I. Butun, M. Erol-Kantarci, B. Kantarci, and H. Song, "Cloud-centric multi-level authentication as a service for secure public safety device networks," IEEE Commun. Mag., vol. 54, no. 4, 2016.
-
(2016)
IEEE Commun. Mag.
, vol.54
, Issue.4
-
-
Butun, I.1
Erol-Kantarci, M.2
Kantarci, B.3
Song, H.4
-
6
-
-
84979826786
-
Cloud computing for transportation cyber-physical systems
-
L. M. Patnaik, Ed. Boca Raton, FL, USA: CRC Press
-
H. Song, Q. Du, P. Ren, W. Li, and A. Mehmood, "Cloud computing for transportation cyber-physical systems," in Cyber-Physical Systems: A Computational Perspective, vol. 15, L. M. Patnaik, Ed. Boca Raton, FL, USA: CRC Press, 2015, pp. 351-369.
-
(2015)
Cyber-Physical Systems: A Computational Perspective
, vol.15
, pp. 351-369
-
-
Song, H.1
Du, Q.2
Ren, P.3
Li, W.4
Mehmood, A.5
-
7
-
-
84979828689
-
Internet of Things and big data analytics for smart and connected communities
-
Mar.
-
Y. Sun, H. Song, A. J. Jara, and R. Bie, "Internet of Things and big data analytics for smart and connected communities," IEEE Access, vol. 4, pp. 766-773, Mar. 2016, doi: 10.1109/ACCESS.2016.2529723.
-
(2016)
IEEE Access
, vol.4
, pp. 766-773
-
-
Sun, Y.1
Song, H.2
Jara, A.J.3
Bie, R.4
-
8
-
-
84959287201
-
Identifying an OpenID anti-phishing scheme for cyberspace
-
H. Abbas, M. Q. Mahmoodzadeh, F. A. Khan, and M. Pasha, "Identifying an OpenID anti-phishing scheme for cyberspace," Secur. Commun. Netw., vol. 9, no. 6, pp. 481-491, 2014.
-
(2014)
Secur. Commun. Netw.
, vol.9
, Issue.6
, pp. 481-491
-
-
Abbas, H.1
Mahmoodzadeh, M.Q.2
Khan, F.A.3
Pasha, M.4
-
9
-
-
79955624015
-
Addressing dynamic issues in information security management
-
H. Abbas, C. Magnusson, L. Yngstrom, and A. Hemani, "Addressing dynamic issues in information security management," Inf. Manage. Comput. Secur., vol. 19, no. 1, pp. 5-24, 2011.
-
(2011)
Inf. Manage. Comput. Secur.
, vol.19
, Issue.1
, pp. 5-24
-
-
Abbas, H.1
Magnusson, C.2
Yngstrom, L.3
Hemani, A.4
-
10
-
-
84955452393
-
Human-oriented design of secure machine-to-machine communication system for e-healthcare society
-
Oct.
-
K. Saleem, A. Derhab, J. Al-Muhtadi, and B. Shahzad, "Human-oriented design of secure machine-to-machine communication system for e-healthcare society," Comput. Human Behavior, vol. 51, pp. 977-985, Oct. 2015.
-
(2015)
Comput. Human Behavior
, vol.51
, pp. 977-985
-
-
Saleem, K.1
Derhab, A.2
Al-Muhtadi, J.3
Shahzad, B.4
-
11
-
-
84966664032
-
Security concerns of cloud-based healthcare systems: A perspective of moving from single-cloud to a multi-cloud infrastructure
-
H. Khattak, H. Abbas, A. Naeem, K. Saleem, and W. Iqbal, "Security concerns of cloud-based healthcare systems: A perspective of moving from single-cloud to a multi-cloud infrastructure," in Proc. 17th Int. Conf. E-Health Netw., Appl. Services (HealthCom), 2015, pp. 50-56.
-
(2015)
Proc. 17th Int. Conf. E-Health Netw., Appl. Services (HealthCom)
, pp. 50-56
-
-
Khattak, H.1
Abbas, H.2
Naeem, A.3
Saleem, K.4
Iqbal, W.5
-
12
-
-
84938574036
-
Mobile-health: A review of current state in 2015
-
Aug.
-
B. M. C. Silva, J. J. P. C. Rodrigues, I. de la Torre Díez, M. López-Coronado, and K. Saleem, "Mobile-health: A review of current state in 2015," J. Biomed. Inform., vol. 56, pp. 265-272, Aug. 2015.
-
(2015)
J. Biomed. Inform.
, vol.56
, pp. 265-272
-
-
Silva, B.M.C.1
Rodrigues, J.J.P.C.2
De La Torre Díez, I.3
López-Coronado, M.4
Saleem, K.5
-
13
-
-
84979803510
-
-
accessed on Feb. 5, 2016. Online
-
(2016). WebSCADA, Web SCADA, Automation Systems, Process Control, Historian, Event Alarm, SCADA Solution, accessed on Feb. 5, 2016. [Online]. Available: http://www.webscada.com/SCADA/SolMedSys.aspx
-
(2016)
WebSCADA, Web SCADA, Automation Systems, Process Control, Historian, Event Alarm, SCADA Solution
-
-
-
14
-
-
79958813979
-
Assessment of the vulnerabilities of SCADA, control systems and critical infrastructure systems
-
R. J. Robles and M.-K. Choi, "Assessment of the vulnerabilities of SCADA, control systems and critical infrastructure systems," Int. J. Grid Distrib. Comput., vol. 2, no. 2, pp. 27-34, 2009.
-
(2009)
Int. J. Grid Distrib. Comput.
, vol.2
, Issue.2
, pp. 27-34
-
-
Robles, R.J.1
Choi, M.-K.2
-
15
-
-
31044446079
-
Security of distributed control systems: The concern increases
-
Dec.
-
S. Mustard, "Security of distributed control systems: The concern increases," J. Comput. Control Eng., vol. 16, no. 6, pp. 19-25, Dec. 2005.
-
(2005)
J. Comput. Control Eng.
, vol.16
, Issue.6
, pp. 19-25
-
-
Mustard, S.1
-
16
-
-
79251616434
-
Stuxnet and the future of cyber war
-
J. P. Farwell and R. Rohozinski, "Stuxnet and the future of cyber war," Survival, vol. 53, no. 1, pp. 23-40, 2011.
-
(2011)
Survival
, vol.53
, Issue.1
, pp. 23-40
-
-
Farwell, J.P.1
Rohozinski, R.2
-
18
-
-
34250215846
-
SCADA systems: Vulnerabilities and remediation
-
Apr.
-
J. D. Fernandez and A. E. Fernandez, "SCADA systems: Vulnerabilities and remediation," J. Comput. Sci. Colleges Arch., vol. 20, no. 4, pp. 160-168, Apr. 2005.
-
(2005)
J. Comput. Sci. Colleges Arch.
, vol.20
, Issue.4
, pp. 160-168
-
-
Fernandez, J.D.1
Fernandez, A.E.2
-
19
-
-
84979814404
-
-
Online
-
N. Ulltveit-Moe, H. Nergaard, L. Erdödi, T. Gjøsæter, E. Kolstad, and P. Berg. (2016). "Secure information sharing in an industrial Internet of Things." [Online]. Available: http://arxiv.org/abs/1601.04301
-
(2016)
Secure Information Sharing in an Industrial Internet of Things
-
-
Ulltveit-Moe, N.1
Nergaard, H.2
Erdödi, L.3
Gjøsæter, T.4
Kolstad, E.5
Berg, P.6
-
20
-
-
84957563971
-
Initial investigation of industrial control system (ICS) security using artificial immune system (AIS)
-
M. Bere and H. Muyingi, "Initial investigation of industrial control system (ICS) security using artificial immune system (AIS)," in Proc. Int. Conf. Emerg. Trends Netw. Comput. Commun. (ETNCC), 2015, pp. 79-84.
-
(2015)
Proc. Int. Conf. Emerg. Trends Netw. Comput. Commun. (ETNCC)
, pp. 79-84
-
-
Bere, M.1
Muyingi, H.2
-
21
-
-
77957980228
-
Improving SCADA control systems security with software vulnerability analysis
-
G. Cagalaban, T. Kim, and S. Kim, "Improving SCADA control systems security with software vulnerability analysis," in Proc. 12th WSEAS Int. Conf. Autom. Control, Modeling Simulation, 2008, pp. 409-414.
-
(2008)
Proc. 12th WSEAS Int. Conf. Autom. Control, Modeling Simulation
, pp. 409-414
-
-
Cagalaban, G.1
Kim, T.2
Kim, S.3
-
22
-
-
84871951474
-
sSCADA: Securing SCADA infrastructure communications
-
Y. Wang, "sSCADA: Securing SCADA infrastructure communications," Int. J. Commun. Netw. Distrib. Syst., vol. 6, no. 1, pp. 59-78, 2012.
-
(2012)
Int. J. Commun. Netw. Distrib. Syst.
, vol.6
, Issue.1
, pp. 59-78
-
-
Wang, Y.1
-
23
-
-
48449088699
-
SCADA cyber security testbed development
-
Sep.
-
C. M. Davis, J. E. Tate, H. Okhravl, C. Grier, T. J. Overbye, and D. Nicol, "SCADA cyber security testbed development," in Proc. 38th North Amer. Power Symp., Sep. 2006, pp. 483-488.
-
(2006)
Proc. 38th North Amer. Power Symp.
, pp. 483-488
-
-
Davis, C.M.1
Tate, J.E.2
Okhravl, H.3
Grier, C.4
Overbye, T.J.5
Nicol, D.6
-
24
-
-
84890569414
-
A novel security scheme for the smart grid and SCADA networks
-
H. M. N. Al Hamadi, C. Y. Yeun, and M. J. Zemerly, "A novel security scheme for the smart grid and SCADA networks," Wireless Pers. Commun., vol. 73, no. 4, pp. 1547-1559, 2013.
-
(2013)
Wireless Pers. Commun.
, vol.73
, Issue.4
, pp. 1547-1559
-
-
Al Hamadi, H.M.N.1
Yeun, C.Y.2
Zemerly, M.J.3
-
25
-
-
26244452473
-
Security & vulnerability in electric power systems
-
Rolla, MO, USA, Oct.
-
D. Watts, "Security & vulnerability in electric power systems," in Proc. 35th North Amer. Power Symp., Rolla, MO, USA, Oct. 2003, pp. 559-566.
-
(2003)
Proc. 35th North Amer. Power Symp.
, pp. 559-566
-
-
Watts, D.1
-
26
-
-
77954796687
-
A testbed for secure and robust SCADA systems
-
A. Giani, G. Karsai, T. Roosta, A. Shah, B. Sinopoli, and J. Wiley, "A testbed for secure and robust SCADA systems," in Proc. 14th IEEE Real-Time Embedded Technol. Appl. Symp., 2008, pp. 1-4.
-
(2008)
Proc. 14th IEEE Real-Time Embedded Technol. Appl. Symp.
, pp. 1-4
-
-
Giani, A.1
Karsai, G.2
Roosta, T.3
Shah, A.4
Sinopoli, B.5
Wiley, J.6
-
27
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, and response
-
A. A. Cárdenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry, "Attacks against process control systems: Risk assessment, detection, and response," in Proc. 6th ACM Symp. Inf., Comput. Commun. Secur. (ASIACCS), 2011, pp. 355-366.
-
(2011)
Proc. 6th ACM Symp. Inf., Comput. Commun. Secur. (ASIACCS)
, pp. 355-366
-
-
Cárdenas, A.A.1
Amin, S.2
Lin, Z.-S.3
Huang, Y.-L.4
Huang, C.-Y.5
Sastry, S.6
-
29
-
-
34047240072
-
The use of attack trees in assessing vulnerabilities in SCADA systems
-
Lisbon, Portugal, Dec.
-
E. Byres, M. Franz, and D. Miller, "The use of attack trees in assessing vulnerabilities in SCADA systems," in Proc. IEEE Int. Infrastruct. Survivability Workshop (IISW), Lisbon, Portugal, Dec. 2004.
-
(2004)
Proc. IEEE Int. Infrastruct. Survivability Workshop (IISW)
-
-
Byres, E.1
Franz, M.2
Miller, D.3
-
30
-
-
54949110261
-
Securing SCADA systems
-
S. Patel and P. Sanyal, "Securing SCADA systems," Inf. Manage. Comput. Secur., vol. 16, no. 4, pp. 398-414, 2008.
-
(2008)
Inf. Manage. Comput. Secur.
, vol.16
, Issue.4
, pp. 398-414
-
-
Patel, S.1
Sanyal, P.2
-
31
-
-
84871397265
-
Security and vulnerability of SCADA systems over IP-based wireless sensor networks
-
Oct.
-
H. Kim, "Security and vulnerability of SCADA systems over IP-based wireless sensor networks," Int. J. Distrib. Sensor Netw., vol. 2012, Oct. 2012, Art. no. 268478, doi: 10.1155/2012/268478.
-
(2012)
Int. J. Distrib. Sensor Netw.
, vol.2012
-
-
Kim, H.1
-
32
-
-
84874470964
-
Protection of SCADA communication channels
-
J. Lopez, R. Setola, and S. D. Wolthusen, Eds. Berlin, Germany: Springer
-
A. Khelil, D. Germanus, and N. Suri, "Protection of SCADA communication channels," in Critical Infrastructure Protection, J. Lopez, R. Setola, and S. D. Wolthusen, Eds. Berlin, Germany: Springer, 2012, pp. 177-196.
-
(2012)
Critical Infrastructure Protection
, pp. 177-196
-
-
Khelil, A.1
Germanus, D.2
Suri, N.3
-
33
-
-
84931062279
-
Security challenges in building automation and SCADA
-
A. Antonini, A. Barenghi, G. Pelosi, and S. Zonouz, "Security challenges in building automation and SCADA," in Proc. Int. Carnahan Conf. Secur. Technol. (ICCST), 2014, pp. 1-6.
-
(2014)
Proc. Int. Carnahan Conf. Secur. Technol. (ICCST)
, pp. 1-6
-
-
Antonini, A.1
Barenghi, A.2
Pelosi, G.3
Zonouz, S.4
-
34
-
-
84941197296
-
Security-oriented cloud platform for SOA-based SCADA
-
May
-
T. Baker, M. Mackay, A. Shaheed, and B. Aldawsari, "Security-oriented cloud platform for SOA-based SCADA," in Proc. 15th IEEE/ACM Int. Symp. Cluster, Cloud Grid Comput., May 2015, pp. 961-970.
-
(2015)
Proc. 15th IEEE/ACM Int. Symp. Cluster, Cloud Grid Comput.
, pp. 961-970
-
-
Baker, T.1
Mackay, M.2
Shaheed, A.3
Aldawsari, B.4
-
35
-
-
84956967462
-
Cyber security in smart grid SCADA automation systems
-
Mar.
-
R. Tawde, A. Nivangune, and M. Sankhe, "Cyber security in smart grid SCADA automation systems," in Proc. Int. Conf. Innov. Inf., Embedded Commun. Syst. (ICIIECS), Mar. 2015, pp. 1-5.
-
(2015)
Proc. Int. Conf. Innov. Inf., Embedded Commun. Syst. (ICIIECS)
, pp. 1-5
-
-
Tawde, R.1
Nivangune, A.2
Sankhe, M.3
-
36
-
-
84861093550
-
SCADA security in the light of cyber-warfare
-
A. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke, "SCADA security in the light of cyber-warfare," Comput. Secur., vol. 31, no. 4, pp. 418-436, 2012.
-
(2012)
Comput. Secur.
, vol.31
, Issue.4
, pp. 418-436
-
-
Nicholson, A.1
Webber, S.2
Dyer, S.3
Patel, T.4
Janicke, H.5
-
37
-
-
84946126337
-
A review of cyber security risk assessment methods for SCADA systems
-
Feb.
-
Y. Cherdantseva et al., "A review of cyber security risk assessment methods for SCADA systems," Comput. Secur., vol. 56, pp. 1-27, Feb. 2015.
-
(2015)
Comput. Secur.
, vol.56
, pp. 1-27
-
-
Cherdantseva, Y.1
-
38
-
-
84929278091
-
A survey of cyber security management in industrial control systems
-
Jun.
-
W. Knowles, D. Prince, D. Hutchison, J. F. P. Disso, and K. Jones, "A survey of cyber security management in industrial control systems," Int. J. Crit. Infrastruct. Protect., vol. 9, pp. 52-80, Jun. 2015.
-
(2015)
Int. J. Crit. Infrastruct. Protect.
, vol.9
, pp. 52-80
-
-
Knowles, W.1
Prince, D.2
Hutchison, D.3
Disso, J.F.P.4
Jones, K.5
-
40
-
-
84903828205
-
-
Ph.D. dissertation, Dept. Elect. Eng. Comput. Sci., Univ. California, Berkeley, CA, USA
-
B. Zhu, A. Joseph, and S. Sastry, "A taxonomy of cyber attacks on SCADA systems," Ph.D. dissertation, Dept. Elect. Eng. Comput. Sci., Univ. California, Berkeley, CA, USA, 2012.
-
(2012)
A Taxonomy of Cyber Attacks on SCADA Systems
-
-
Zhu, B.1
Joseph, A.2
Sastry, S.3
-
41
-
-
84971348067
-
Security and Privacy Controls for Federal Information Systems and Organizations
-
800-53 Revision 4, National Institute of Standards and Technology
-
Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Pub. 800-53 Revision 4, National Institute of Standards and Technology, 2013.
-
(2013)
NIST Special Pub.
-
-
|