-
3
-
-
79955867639
-
A multidimensional critical state analysis for detecting intrusions in scada systems
-
A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. N. Fovino, and A. Trombetta. A multidimensional critical state analysis for detecting intrusions in scada systems. IEEE Transactions on Industrial Informatics, 7(2):179-186, 2011.
-
(2011)
IEEE Transactions on Industrial Informatics
, vol.7
, Issue.2
, pp. 179-186
-
-
Carcano, A.1
Coletta, A.2
Guglielmi, M.3
Masera, M.4
Fovino, I.N.5
Trombetta, A.6
-
4
-
-
82955186380
-
vpf-ring: Towards wire-speed network monitoring using virtual machines
-
ACM
-
A. Cardigliano, L. Deri, J. Gasparakis, and F. Fusco. vpf-ring: towards wire-speed network monitoring using virtual machines. In Proceedings of conference on Internet measurement conference, pages 533-548. ACM, 2011.
-
(2011)
Proceedings of Conference on Internet Measurement Conference
, pp. 533-548
-
-
Cardigliano, A.1
Deri, L.2
Gasparakis, J.3
Fusco, F.4
-
5
-
-
84947048249
-
A three-stage analysis of ids for critical infrastructures
-
L. Cazorla, C. Alcaraz, and J. Lopez. A three-stage analysis of ids for critical infrastructures. Computers & Security, 55:235-250, 2015.
-
(2015)
Computers & Security
, vol.55
, pp. 235-250
-
-
Cazorla, L.1
Alcaraz, C.2
Lopez, J.3
-
6
-
-
70350634504
-
Using model-based intrusion detection for SCADA networks
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A. Valdes. Using model-based intrusion detection for SCADA networks. In Proceedings of the SCADA security scientific symposium, volume 46, pages 1-12, 2007.
-
(2007)
Proceedings of the SCADA Security Scientific Symposium
, vol.46
, pp. 1-12
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
8
-
-
84893066861
-
-
Elastic Co. Elasticsearch. www.elastic.co/products/elasticsearch.
-
Elasticsearch
-
-
-
9
-
-
84860491228
-
Critical state-based filtering system for securing scada network protocols
-
I. N. Fovino, A. Coletta, A. Carcano, and M. Masera. Critical state-based filtering system for securing scada network protocols. IEEE Transactions on industrial electronics, 59(10):3943-3950, 2012.
-
(2012)
IEEE Transactions on Industrial Electronics
, vol.59
, Issue.10
, pp. 3943-3950
-
-
Fovino, I.N.1
Coletta, A.2
Carcano, A.3
Masera, M.4
-
13
-
-
84875967976
-
Adapting Bro into SCADA: Building a specification-based intrusion detection system for the DNP3 protocol
-
ACM
-
H. Lin, A. Slagell, C. Di Martino, Z. Kalbarczyk, and R. K. Iyer. Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol. In Proceedings of Cyber Security and Information Intelligence Research Workshop, page 5. ACM, 2013.
-
(2013)
Proceedings of Cyber Security and Information Intelligence Research Workshop
, pp. 5
-
-
Lin, H.1
Slagell, A.2
Di Martino, C.3
Kalbarczyk, Z.4
Iyer, R.K.5
-
14
-
-
84889055399
-
Semantic security analysis of scada networks to detect malicious control commands in power grids
-
ACM
-
H. Lin, A. Slagell, Z. Kalbarczyk, P. W. Sauer, and R. K. Iyer. Semantic security analysis of scada networks to detect malicious control commands in power grids. In Proceedings of the workshop on Smart energy grid security, pages 29-34. ACM, 2013.
-
(2013)
Proceedings of the Workshop on Smart Energy Grid Security
, pp. 29-34
-
-
Lin, H.1
Slagell, A.2
Kalbarczyk, Z.3
Sauer, P.W.4
Iyer, R.K.5
-
15
-
-
70449371464
-
Neural network based intrusion detection system for critical infrastructures
-
IEEE
-
O. Linda, T. Vollmer, and M. Manic. Neural network based intrusion detection system for critical infrastructures. In Neural Networks, 2009. IJCNN 2009. International Joint Conference on, pages 1827-1834. IEEE, 2009.
-
(2009)
Neural Networks, 2009. IJCNN 2009. International Joint Conference on
, pp. 1827-1834
-
-
Linda, O.1
Vollmer, T.2
Manic, M.3
-
18
-
-
84977950770
-
The cybersecurity landscape in industrial control systems
-
S. McLaughlin, C. Konstantinou, X. Wang, L. Davi, A.-R. Sadeghi, M. Maniatakos, and R. Karri. The cybersecurity landscape in industrial control systems. Proceedings of the IEEE, 104(5):1039-1057, 2016.
-
(2016)
Proceedings of the IEEE
, vol.104
, Issue.5
, pp. 1039-1057
-
-
McLaughlin, S.1
Konstantinou, C.2
Wang, X.3
Davi, L.4
Sadeghi, A.-R.5
Maniatakos, M.6
Karri, R.7
-
19
-
-
84901192690
-
A survey of intrusion detection techniques for cyber-physical systems
-
R. Mitchell and I.-R. Chen. A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR), 46(4):55, 2014.
-
(2014)
ACM Computing Surveys (CSUR)
, vol.46
, Issue.4
, pp. 55
-
-
Mitchell, R.1
Chen, I.-R.2
-
21
-
-
85001853462
-
-
ODVA. EtherNet/IP. Available at: https://www.odva.org/, 2016.
-
(2016)
EtherNet/IP
-
-
-
22
-
-
0033295259
-
Bro: A System for Detecting Network Intruders in Real-Time
-
V. Paxson. Bro: a System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
23
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Dec
-
V. Paxson. Bro: A system for detecting network intruders in real-time. Comput. Netw., 31(23-24):2435-2463, Dec. 1999.
-
(1999)
Comput. Netw.
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
25
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
M. Roesch et al. Snort: Lightweight intrusion detection for networks. In LISA, volume 99, pages 229-238, 1999.
-
(1999)
LISA
, vol.99
, pp. 229-238
-
-
Roesch, M.1
-
26
-
-
84944088568
-
Security and privacy challenges in industrial internet of things
-
New York, NY, USA, ACM
-
A.-R. Sadeghi, C. Wachsmann, and M. Waidner. Security and privacy challenges in industrial internet of things. In Proceedings of the Annual Design Automation Conference (DAC), pages 54:1-54:6, New York, NY, USA, 2015. ACM.
-
(2015)
Proceedings of the Annual Design Automation Conference (DAC)
, pp. 54:1-54:6
-
-
Sadeghi, A.-R.1
Wachsmann, C.2
Waidner, M.3
-
27
-
-
85001735529
-
-
Security Matters. Silentdefense ics. www.secmatters.com/products-ics.
-
Silentdefense ics
-
-
-
28
-
-
84978924817
-
Exploiting bro for intrusion detection in a SCADA system
-
R. Udd, M. Asplund, S. Nadjm-Tehrani, M. Kazemtabrizi, and M. Ekstedt. Exploiting bro for intrusion detection in a SCADA system. In Proceedings of Cyber-Physical System Security Workshop (CPSS), 2016.
-
(2016)
Proceedings of Cyber-Physical System Security Workshop (CPSS)
-
-
Udd, R.1
Asplund, M.2
Nadjm-Tehrani, S.3
Kazemtabrizi, M.4
Ekstedt, M.5
|