-
1
-
-
84922977838
-
A review of architectures and concepts for intelligence in future electric energy systems
-
Apr
-
T. Strasser et al., "A review of architectures and concepts for intelligence in future electric energy systems," IEEE Trans. Ind. Electron., vol. 62, no. 4, pp. 2424-2438, Apr. 2015.
-
(2015)
IEEE Trans. Ind. Electron
, vol.62
, Issue.4
, pp. 2424-2438
-
-
Strasser, T.1
-
2
-
-
84962815812
-
Cyberphysical security and dependability analysis of digital control systems in nuclear power plants
-
Mar
-
C.-S. Cho, W.-H. Chung, and S.-Y. Kuo, "Cyberphysical security and dependability analysis of digital control systems in nuclear power plants," IEEE Trans. Syst., Man, Cybern.: Syst., vol. 46, no. 3, pp. 356-369, Mar. 2016.
-
(2016)
IEEE Trans. Syst., Man, Cybern.: Syst
, vol.46
, Issue.3
, pp. 356-369
-
-
Cho, C.-S.1
Chung, W.-H.2
Kuo, S.-Y.3
-
3
-
-
84901192690
-
A survey of intrusion detection techniques for cyber-physical systems
-
Mar
-
R. Mitchell and I.-R. Chen, "A survey of intrusion detection techniques for cyber-physical systems," ACM Comput. Surv., vol. 46, no. 4, pp. 55:1-55:29, Mar. 2014.
-
(2014)
ACM Comput. Surv
, vol.46
, Issue.4
, pp. 551-5529
-
-
Mitchell, R.1
Chen, I.-R.2
-
4
-
-
84861093550
-
SCADA security in the light of cyber-warfare
-
A. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke, "SCADA security in the light of cyber-warfare," Comput. Secur., vol. 31, no. 4, pp. 418-436, 2012.
-
(2012)
Comput. Secur
, vol.31
, Issue.4
, pp. 418-436
-
-
Nicholson, A.1
Webber, S.2
Dyer, S.3
Patel, T.4
Janicke, H.5
-
5
-
-
84874917979
-
The real story of Stuxnet
-
Mar
-
D. Kushner, "The real story of Stuxnet," IEEE Spectrum, vol. 50, no. 3, pp. 48-53, Mar. 2013.
-
(2013)
IEEE Spectrum
, vol.50
, Issue.3
, pp. 48-53
-
-
Kushner, D.1
-
7
-
-
84857516371
-
A taxonomy of cyber attacks on SCADAsystems
-
B. Zhu, A. Joseph, and S. Sastry, "A taxonomy of cyber attacks on SCADAsystems," in Proc. 4th Int. Conf. Cyber, Phys. Soc. Comput., 2011, pp. 380-388.
-
(2011)
Proc. 4th Int. Conf. Cyber, Phys. Soc. Comput
, pp. 380-388
-
-
Zhu, B.1
Joseph, A.2
Sastry, S.3
-
8
-
-
80052113604
-
Proposal strategies of key management for data encryption in SCADA network of electric power systems
-
D. Kang, J. Lee, B. Kim, and D. Hur, "Proposal strategies of key management for data encryption in SCADA network of electric power systems," Int. J. Electr. Power Energy Syst., vol. 33, no. 9, pp. 1521-1526, 2011.
-
(2011)
Int. J. Electr. Power Energy Syst
, vol.33
, Issue.9
, pp. 1521-1526
-
-
Kang, D.1
Lee, J.2
Kim, B.3
Hur, D.4
-
9
-
-
84879882523
-
Secure SCADA communication by using a modified key management scheme
-
A. Rezai, P. Keshavarzi, and Z. Moravej, "Secure SCADA communication by using a modified key management scheme," ISA Trans., vol. 52, no. 4, pp. 517-524, 2013.
-
(2013)
ISA Trans
, vol.52
, Issue.4
, pp. 517-524
-
-
Rezai, A.1
Keshavarzi, P.2
Moravej, Z.3
-
10
-
-
84865395858
-
Challenges in power system information security
-
Jul./Aug
-
G. Dan, H. Sandberg, M. Ekstedt, and G. Bjorkman, "Challenges in power system information security," IEEE Security Priv., vol. 10, no. 4, pp. 62-70, Jul./Aug. 2012.
-
(2012)
IEEE Security Priv
, vol.10
, Issue.4
, pp. 62-70
-
-
Dan, G.1
Sandberg, H.2
Ekstedt, M.3
Bjorkman, G.4
-
11
-
-
55549116194
-
-
NIST, Gaithersburg, MD, USA, Tech. Rep. 800-82
-
K. Stouffer, S. Lightman, V. Pillitter, M. Abrams, and A. Hahn, "Guide to industrial control system (ICS) security, revision 2 (NIST SP 800-82)," NIST, Gaithersburg, MD, USA, Tech. Rep. 800-82, 2015.
-
(2015)
Guide to Industrial Control System (ICS) Security, Revision 2 (NIST SP 800-82)
-
-
Stouffer, K.1
Lightman, S.2
Pillitter, V.3
Abrams, M.4
Hahn, A.5
-
14
-
-
84913586160
-
Intrusion detection in cyberphysical systems: Techniques and challenges
-
Dec
-
S. Han, M. Xie, H.-H. Chen, and Y. Ling, "Intrusion detection in cyberphysical systems: Techniques and challenges," IEEE Syst. J., vol. 8, no. 4, pp. 1049-1059, Dec. 2014.
-
(2014)
IEEE Syst. J
, vol.8
, Issue.4
, pp. 1049-1059
-
-
Han, S.1
Xie, M.2
Chen, H.-H.3
Ling, Y.4
-
15
-
-
77958115258
-
Trustworthy hardware: Identifying and classifying hardware trojans
-
R. Karri and J. Rajendran, "Trustworthy hardware: Identifying and classifying hardware trojans," Computer, vol. 43, no. 10, pp. 39-46, 2010.
-
(2010)
Computer
, vol.43
, Issue.10
, pp. 39-46
-
-
Karri, R.1
Rajendran, J.2
-
16
-
-
79952527986
-
On SCADA control system command and response injection and intrusion detection
-
W. Gao, T. Morris, B. Reaves, and D. Richey, "On SCADA control system command and response injection and intrusion detection," in Proc. eCrime Researchers Summit, 2010, pp. 1-9.
-
(2010)
Proc. ECrime Researchers Summit
, pp. 1-9
-
-
Gao, W.1
Morris, T.2
Reaves, B.3
Richey, D.4
-
17
-
-
84901604278
-
Multiattribute SCADA-specific intrusion detection system for power networks
-
Jun
-
Y. Yang et al. "Multiattribute SCADA-specific intrusion detection system for power networks," IEEE Trans. Power Del., vol. 29, no. 3, pp. 1092-1102, Jun. 2014.
-
(2014)
IEEE Trans. Power Del
, vol.29
, Issue.3
, pp. 1092-1102
-
-
Yang, Y.1
-
18
-
-
84928173034
-
Integrated OCSVM mechanism for intrusion detection in SCADA systems
-
L. Maglaras, J. Jiang, and T. Cruz, "Integrated OCSVM mechanism for intrusion detection in SCADA systems," Electron. Lett., vol. 50, no. 25, pp. 1935-1936, 2014.
-
(2014)
Electron. Lett
, vol.50
, Issue.25
, pp. 1935-1936
-
-
Maglaras, L.1
Jiang, J.2
Cruz, T.3
-
19
-
-
84939266661
-
Constructing cost-effective and targetable industrial control system honeypots for production networks
-
M. Winn, M. Rice, S. Dunlap, J. Lopez, and B. Mullins, "Constructing cost-effective and targetable industrial control system honeypots for production networks," Int. J. Crit. Infrastructure Protection, vol. 10, pp. 47-58, 2015.
-
(2015)
Int. J. Crit. Infrastructure Protection
, vol.10
, pp. 47-58
-
-
Winn, M.1
Rice, M.2
Dunlap, S.3
Lopez, J.4
Mullins, B.5
-
20
-
-
84906939980
-
Fault detection based on a robust one class support vector machine
-
S. Yin, X. Zhu, and C. Jing, "Fault detection based on a robust one class support vector machine," Neurocomputing, vol. 145, pp. 263-268, 2014.
-
(2014)
Neurocomputing
, vol.145
, pp. 263-268
-
-
Yin, S.1
Zhu, X.2
Jing, C.3
-
21
-
-
84937401230
-
A novel LS-SVM modeling method for a hydraulic press forging process with multiple localized solutions
-
Jun
-
X. Lu, B. Fan, and M. Huang, "A novel LS-SVM modeling method for a hydraulic press forging process with multiple localized solutions," IEEE Trans. Ind. Informat., vol. 11, no. 3, pp. 663-670, Jun. 2015.
-
(2015)
IEEE Trans. Ind. Informat
, vol.11
, Issue.3
, pp. 663-670
-
-
Lu, X.1
Fan, B.2
Huang, M.3
-
22
-
-
84934878440
-
Specialized honeypots for SCADA systems
-
M. Lehto and P. Neittaanmäki, Eds. New York, NY, USA: Springer
-
P. Simões, T. Cruz, J. Proença, and E. Monteiro, "Specialized honeypots for SCADA systems," in Cyber Security: Analytics, Technology and Automation (ser. Intelligent Systems, Control and Automation: Science and Engineering), vol. 78, M. Lehto and P. Neittaanmäki, Eds. New York, NY, USA: Springer, 2015, pp. 251-269.
-
(2015)
Cyber Security: Analytics, Technology and Automation (Ser. Intelligent Systems, Control and Automation: Science and Engineering)
, vol.78
, pp. 251-269
-
-
Simões, P.1
Cruz, T.2
Proença, J.3
Monteiro, E.4
-
23
-
-
84942683814
-
Improving network security monitoring for industrial control systems
-
May
-
T. Cruz et al. "Improving network security monitoring for industrial control systems," in Proc. IFIP/IEEE Int. Symp. Integr. Netw. Manage., May 2015, pp. 878-881.
-
(2015)
Proc. IFIP/IEEE Int. Symp. Integr. Netw. Manage
, pp. 878-881
-
-
Cruz, T.1
-
24
-
-
85009067795
-
Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
-
L. A. Maglaras, J. Jiang, and T. Cruz, "Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems," J. Inf. Security Appl., 2016. [Online]. Available: http://dx.doi.org/10.1016/j.jisa.2016.04.002.
-
(2016)
J. Inf. Security Appl
-
-
Maglaras, L.A.1
Jiang, J.2
Cruz, T.3
|