-
1
-
-
84891752381
-
A Taxonomy of Attacks on the DNP3 Protocol
-
S. East, J. Butts, M. Papa, S. Shenoi, A Taxonomy of Attacks on the DNP3 Protocol, in Proceedings of IFIP Advances in Information and Communication Technology, 311:67-81, 2009.
-
(2009)
Proceedings of IFIP Advances in Information and Communication Technology
, vol.311
, pp. 67-81
-
-
East, S.1
Butts, J.2
Papa, M.3
Shenoi, S.4
-
2
-
-
79955162431
-
Enhanced Security Protocol in Wireless Sensor Networks
-
T.C. Aseri, N. Singla, Enhanced Security Protocol in Wireless Sensor Networks, International Journal of Computers Communications & Control, 6(2):214-221, 2011.
-
(2011)
International Journal of Computers Communications & Control
, vol.6
, Issue.2
, pp. 214-221
-
-
Aseri, T.C.1
Singla, N.2
-
3
-
-
84986304231
-
-
The Symantec Stuxnet Dossier, 2010, http://www.wired.com /images_ blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf
-
(2010)
-
-
-
4
-
-
13644252493
-
SCADA vs. the Hackers - Can Freebie Software and a Can of Pringles Bring Down the U.S. Power Grid?
-
A.S. Brown, SCADA vs. the Hackers - Can Freebie Software and a Can of Pringles Bring Down the U.S. Power Grid?, Mechanical Engineering, 124(12), 2002.
-
Mechanical Engineering
, vol.124
, Issue.12
, pp. 2002
-
-
Brown, A.S.1
-
5
-
-
77955698013
-
An Experimental Platform for Assessing SCADA Vulnerabilities and Countermeasures in Power Plants
-
I. Nai Fovino, M. Masera, L. Guidi, G. Carpi, An Experimental Platform for Assessing SCADA Vulnerabilities and Countermeasures in Power Plants, in Proceedings of Human System Interactions, pp. 679-686, 2010.
-
(2010)
Proceedings of Human System Interactions
, pp. 679-686
-
-
Nai Fovino, I.1
Masera, M.2
Guidi, L.3
Carpi, G.4
-
6
-
-
84986250973
-
Distributed Critical State Detection System for Industrial Protocols
-
I. Nai Fovino, A. Carcano, T. De Lacheze Murel, M. Masera, A. Trombetta, Distributed Critical State Detection System for Industrial Protocols, in Proceedings of IFIP International Conference on Critical Infrastructure Protection, pp. 95-110, 2010.
-
(2010)
Proceedings of IFIP International Conference on Critical Infrastructure Protection
, pp. 95-110
-
-
Nai Fovino, I.1
Carcano, A.2
De Lacheze Murel, T.3
Masera, M.4
Trombetta, A.5
-
7
-
-
84866399058
-
A Cyber-Physical Experimentation Environment for the Security Analysis of Networked Industrial Control Systems
-
In Press
-
B. Genge, C. Siaterlis, I. Nai Fovino, M. Masera, A Cyber-Physical Experimentation Environment for the Security Analysis of Networked Industrial Control Systems, Computers & Electrical Engineering, In Press, 2012.
-
(2012)
Computers & Electrical Engineering
-
-
Genge, B.1
Siaterlis, C.2
Nai Fovino, I.3
Masera, M.4
-
8
-
-
84978371883
-
An Integrated Experimental Environment for Distributed Systems and Networks
-
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, A. Joglekar, An Integrated Experimental Environment for Distributed Systems and Networks, in Proceedings of the 5th symposium on Operating systems design and implementation, pp. 255-270, 2002.
-
(2002)
Proceedings of the 5th symposium on Operating systems design and implementation
, pp. 255-270
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Joglekar, A.9
-
9
-
-
84866375520
-
On the Use of Emulab Testbeds for Scientifically Rigorous Experiments
-
C. Siaterlis, A. Garcia, B. Genge, On the Use of Emulab Testbeds for Scientifically Rigorous Experiments, IEEE Communications Surveys & Tutorials, PP(99):1-14, 2012.
-
(2012)
IEEE Communications Surveys & Tutorials
, Issue.99
, pp. 1-14
-
-
Siaterlis, C.1
Garcia, A.2
Genge, B.3
-
10
-
-
0003529549
-
Dynamic Models for Boiler-Turbine Alternator Units: Data Logs and Parameter Estimation for a 160MW Unit
-
Sweden
-
R.D. Bell, K.J. Åström, Dynamic Models for Boiler-Turbine Alternator Units: Data Logs and Parameter Estimation for a 160MW Unit, Lundt Institute of Technology, Report TFRT- 3192, Sweden, 1987.
-
(1987)
Lundt Institute of Technology, Report TFRT- 3192
-
-
Bell, R.D.1
Åström, K.J.2
-
11
-
-
0030832833
-
Dummynet: A Simple Approach to the Evaluation of Network Protocols
-
L. Rizzo, Dummynet: A Simple Approach to the Evaluation of Network Protocols, ACM Computer Communication Review, 27(1):31-41, 1997.
-
(1997)
ACM Computer Communication Review
, vol.27
, Issue.1
, pp. 31-41
-
-
Rizzo, L.1
-
12
-
-
77956500396
-
Dummynet Revisited
-
M Carbone, L. Rizzo, Dummynet Revisited, ACM SIGCOMM Computer Communication Review, 40(2):12-20, 2010.
-
(2010)
ACM SIGCOMM Computer Communication Review
, vol.40
, Issue.2
, pp. 12-20
-
-
Carbone, M.1
Rizzo, L.2
-
13
-
-
15944371835
-
Iperf: The TCP/UDP Bandwidth Measurement Tool
-
NLANR/DAST, Iperf: The TCP/UDP Bandwidth Measurement Tool, http://sourceforge.net/projects/iperf/
-
-
-
-
14
-
-
22344450523
-
Analysis and Control of a Nonlinear Boiler-Turbine Unit
-
W. Tan, H.J. Marquez, T. Chen, J. Liu, Analysis and Control of a Nonlinear Boiler-Turbine Unit, Journal of Process Control, Elsevier, 15(8):883-891, 2005.
-
(2005)
Journal of Process Control, Elsevier
, vol.15
, Issue.8
, pp. 883-891
-
-
Tan, W.1
Marquez, H.J.2
Chen, T.3
Liu, J.4
-
15
-
-
72849150312
-
Building a SCADA Security Testbed
-
C. Queiroz, A. Mahmood, J. Hu, Z. Tari, X. Yu, Building a SCADA Security Testbed, in Proceedings of the International Conference on Network and System Security, pp. 357-364, 2009.
-
(2009)
Proceedings of the International Conference on Network and System Security
, pp. 357-364
-
-
Queiroz, C.1
Mahmood, A.2
Hu, J.3
Tari, Z.4
Yu, X.5
-
16
-
-
48449088699
-
SCADA Cyber Security Testbed Development
-
C.M. Davis, J.E. Tate, H. Okhravi, C. Grier, T.J. Overbye, D. Nicol, SCADA Cyber Security Testbed Development, in Proceedings of the North American Power Symposium, pp. 483-488, 2006.
-
(2006)
Proceedings of the North American Power Symposium
, pp. 483-488
-
-
Davis, C.M.1
Tate, J.E.2
Okhravi, H.3
Grier, C.4
Overbye, T.J.5
Nicol, D.6
-
17
-
-
84919602498
-
Simulation of Network Attacks on SCADA Systems
-
April
-
R. Chabukswar, B. Sinopoli, G. Karsai, A. Giani, H. Neema, A. Davis, Simulation of Network Attacks on SCADA Systems, First Workshop on Secure Control Systems, April, 2010.
-
(2010)
First Workshop on Secure Control Systems
-
-
Chabukswar, R.1
Sinopoli, B.2
Karsai, G.3
Giani, A.4
Neema, H.5
Davis, A.6
-
18
-
-
79956009493
-
Attacks Against Process Control Systems: Risk Assessment, Detection, and Response
-
A. Cárdenas, S. Amin, Z.S. Lin, Y.L. Huang, Chi-Y. Huang, S. Sastry, Attacks Against Process Control Systems: Risk Assessment, Detection, and Response, in Proceedings of the ACM Symposium on Information, Computer and Communications Security, pp. 355-366, 2011.
-
(2011)
Proceedings of the ACM Symposium on Information, Computer and Communications Security
, pp. 355-366
-
-
Cárdenas, A.1
Amin, S.2
Lin, Z.S.3
Huang, Y.L.4
Huang, C.-Y.5
Sastry, S.6
|