-
1
-
-
84940027328
-
-
US ICS-CERT, November/December 2015
-
US ICS-CERT. (2015) ICS CERT Monitor, November/December 2015. https://ics-cert.us-cert.gov/monitors/ICS-MM201512.
-
(2015)
ICS CERT Monitor
-
-
-
3
-
-
85054925077
-
-
J. Klick, S. Lau, D. Marzin, J.-O. Malchow, and V. Roth, "Internet-facing plcs-a new back orifice."
-
Internet-facing Plcs-A New Back Orifice
-
-
Klick, J.1
Lau, S.2
Marzin, D.3
Malchow, J.-O.4
Roth, V.5
-
5
-
-
84921416016
-
Detecting industrial control malware using automated plc code analytics
-
IEEE
-
S. Zonouz, J. Rrushi, and S. McLaughlin, "Detecting industrial control malware using automated plc code analytics, " Security & Privacy, IEEE, vol. 12, no. 6, pp. 40-47, 2014.
-
(2014)
Security & Privacy
, vol.12
, Issue.6
, pp. 40-47
-
-
Zonouz, S.1
Rrushi, J.2
McLaughlin, S.3
-
6
-
-
85001619835
-
Accurate modeling of the siemens s7 scada protocol for intrusion detection and digital forensics
-
A. Kleinman and A. Wool, "Accurate modeling of the siemens s7 scada protocol for intrusion detection and digital forensics, " The Journal of Digital Forensics, Security and Law: JDFSL, vol. 9, no. 2, p. 37, 2014.
-
(2014)
The Journal of Digital Forensics, Security and Law: JDFSL
, vol.9
, Issue.2
, pp. 37
-
-
Kleinman, A.1
Wool, A.2
-
8
-
-
84879779698
-
Accurate modeling of modbus/TCP for intrusion detection in scada systems
-
N. Goldenberg and A. Wool, "Accurate modeling of modbus/tcp for intrusion detection in scada systems, " International Journal of Critical Infrastructure Protection, vol. 6, no. 2, pp. 63-75, 2013.
-
(2013)
International Journal of Critical Infrastructure Protection
, vol.6
, Issue.2
, pp. 63-75
-
-
Goldenberg, N.1
Wool, A.2
-
9
-
-
84991755285
-
-
Wireshark
-
Wireshark. (2016) tshark. https://www.wireshark.org/docs/man-pages/ tshark.html.
-
(2016)
Tshark
-
-
-
11
-
-
84881143298
-
Guide to industrial control systems (ics) security
-
K. Stouffer, J. Falco, and K. Scarfone, "Guide to industrial control systems (ics) security, " NIST special publication, vol. 800, no. 82, pp. 16-16, 2011.
-
(2011)
NIST Special Publication
, vol.800
, Issue.82
, pp. 16
-
-
Stouffer, K.1
Falco, J.2
Scarfone, K.3
-
12
-
-
77649306828
-
-
Department of Energy
-
R. Carlson, J. Dagle, S. Shamsuddin, and R. Evans, "A summary of control system security standards activities in the energy sector, " Department of Energy, p. 48, 2005.
-
(2005)
A Summary of Control System Security Standards Activities in the Energy Sector
, pp. 48
-
-
Carlson, R.1
Dagle, J.2
Shamsuddin, S.3
Evans, R.4
-
13
-
-
84869424159
-
Are the nerc cips making the grid less reliable
-
J. Weiss, "Are the nerc cips making the grid less reliable, " Control Global, 2009.
-
(2009)
Control Global
-
-
Weiss, J.1
-
14
-
-
78650891506
-
Cybersecurity myths on power control systems: 21 misconceptions and false beliefs
-
L. Pietre-Cambacédes, M. Tritschler, and G. N. Ericsson, "Cybersecurity myths on power control systems: 21 misconceptions and false beliefs, " Power Delivery, IEEE Transactions on, vol. 26, no. 1, pp. 161-172, 2011.
-
(2011)
Power Delivery, IEEE Transactions on
, vol.26
, Issue.1
, pp. 161-172
-
-
Pietre-Cambacédes, L.1
Tritschler, M.2
Ericsson, G.N.3
-
15
-
-
84870649954
-
-
arXiv preprint arXiv.1202.5722
-
S. Mohan, S. Bak, E. Betti, H. Yun, L. Sha, and M. Caccamo, "S3a: secure system simplex architecture for enhanced security of cyberphysical systems, " arXiv preprint arXiv:1202.5722, 2012.
-
(2012)
S3a: Secure System Simplex Architecture for Enhanced Security of Cyberphysical Systems
-
-
Mohan, S.1
Bak, S.2
Betti, E.3
Yun, H.4
Sha, L.5
Caccamo, M.6
-
16
-
-
70350634504
-
Using model-based intrusion detection for scada networks
-
Citeseer
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A. Valdes, "Using model-based intrusion detection for scada networks, " in Proceedings of the SCADA security scientific symposium, vol. 46. Citeseer, 2007, pp. 1-12.
-
(2007)
Proceedings of the SCADA Security Scientific Symposium
, vol.46
, pp. 1-12
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
17
-
-
84977858742
-
Avatar: A framework to support dynamic security analysis of embedded systems' firmwares
-
J. Zaddach, L. Bruno, A. Francillon, and D. Balzarotti, "Avatar: A framework to support dynamic security analysis of embedded systems' firmwares." in NDSS, 2014.
-
(2014)
NDSS
-
-
Zaddach, J.1
Bruno, L.2
Francillon, A.3
Balzarotti, D.4
|