-
1
-
-
81355138521
-
Smart community: An internet of things application
-
Xu Li, Rongxing Lu, Xiaohui Liang, Xuemin Shen, Jiming Chen, and Xiaodong Lin. Smart community: An internet of things application. Communications Magazine, IEEE, 49(11):68-75, 2011.
-
(2011)
Communications Magazine, IEEE
, vol.49
, Issue.11
, pp. 68-75
-
-
Li, X.1
Lu, R.2
Liang, X.3
Shen, X.4
Chen, J.5
Lin, X.6
-
2
-
-
77956217277
-
Cyber-physical systems: The next computing revolution
-
ACM
-
Ragunathan Raj Rajkumar, Insup Lee, Lui Sha, and John Stankovic. Cyber-physical systems: the next computing revolution. In Proceedings of the 47th Design Automation Conference, pages 731-736. ACM, 2010.
-
(2010)
Proceedings of the 47th Design Automation Conference
, pp. 731-736
-
-
Rajkumar, R.R.1
Lee, I.2
Sha, L.3
Stankovic, J.4
-
3
-
-
84861198383
-
Cyber-physical systems: A perspective at the centennial
-
Kyoung-Dae Kim and Panganamala R Kumar. Cyber-physical systems: A perspective at the centennial. Proceedings of the IEEE, 100(Special Centennial Issue):1287-1308, 2012.
-
(2012)
Proceedings of the IEEE
, vol.100
, pp. 1287-1308
-
-
Kim, K.-D.1
Kumar, P.R.2
-
5
-
-
84155167716
-
Challenges and research directions in medical cyber-physical systems
-
Insup Lee, Oleg Sokolsky, Sanjian Chen, John Hatcliff, Eunkyoung Jee, BaekGyu Kim, Andrew King, Margaret Mullen-Fortino, Soojin Park, Alexander Roederer, et al. Challenges and research directions in medical cyber-physical systems. Proceedings of the IEEE, 100(1):75-90, 2012.
-
(2012)
Proceedings of the IEEE
, vol.100
, Issue.1
, pp. 75-90
-
-
Lee, I.1
Sokolsky, O.2
Chen, S.3
Hatcliff, J.4
Jee, E.5
Kim, B.G.6
King, A.7
Mullen-Fortino, M.8
Park, S.9
Roederer, A.10
-
6
-
-
84901474949
-
Secure estimation and control for cyber-physical systems under adversarial attacks
-
Hamza Fawzi, Paulo Tabuada, and Suhas Diggavi. Secure estimation and control for cyber-physical systems under adversarial attacks. Automatic Control, IEEE Transactions on, 59(6):1454-1467, 2014.
-
(2014)
Automatic Control, IEEE Transactions on
, vol.59
, Issue.6
, pp. 1454-1467
-
-
Fawzi, H.1
Tabuada, P.2
Diggavi, S.3
-
7
-
-
84155167232
-
Cyber-physical security of a smart grid infrastructure
-
Yilin Mo, Tiffany Hyun-Jin Kim, Kenneth Brancik, Dona Dickinson, Heejo Lee, Adrian Perrig, and Bruno Sinopoli. Cyber-physical security of a smart grid infrastructure. Proceedings of the IEEE, 100(1):195-209, 2012.
-
(2012)
Proceedings of the IEEE
, vol.100
, Issue.1
, pp. 195-209
-
-
Mo, Y.1
Kim, T.H.-J.2
Brancik, K.3
Dickinson, D.4
Lee, H.5
Perrig, A.6
Sinopoli, B.7
-
8
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
Yao Liu, Peng Ning, and Michael K Reiter. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1):13, 2011.
-
(2011)
ACM Transactions on Information and System Security (TISSEC)
, vol.14
, Issue.1
, pp. 13
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
10
-
-
84887278643
-
Attack detection and identification in cyber-physical systems
-
Fabio Pasqualetti, Florian Dorfler, and Francesco Bullo. Attack detection and identification in cyber-physical systems. Automatic Control, IEEE Transactions on, 58(11):2715-2729, 2013.
-
(2013)
Automatic Control, IEEE Transactions on
, vol.58
, Issue.11
, pp. 2715-2729
-
-
Pasqualetti, F.1
Dorfler, F.2
Bullo, F.3
-
11
-
-
84903302626
-
Detecting integrity attacks on scada systems
-
Yilin Mo, Rohan Chabukswar, and Bruno Sinopoli. Detecting integrity attacks on scada systems. Control Systems Technology, IEEE Transactions on, 22(4):1396-1407, 2014.
-
(2014)
Control Systems Technology, IEEE Transactions on
, vol.22
, Issue.4
, pp. 1396-1407
-
-
Mo, Y.1
Chabukswar, R.2
Sinopoli, B.3
-
12
-
-
80053628504
-
The wireless control network: A new approach for control over networks
-
Miroslav Pajic, Shreyas Sundaram, George J Pappas, and Rahul Mangharam. The wireless control network: A new approach for control over networks. Automatic Control, IEEE Transactions on, 56(10):2305-2318, 2011.
-
(2011)
Automatic Control, IEEE Transactions on
, vol.56
, Issue.10
, pp. 2305-2318
-
-
Pajic, M.1
Sundaram, S.2
Pappas, G.J.3
Mangharam, R.4
-
13
-
-
79960124958
-
Distributed function calculation via linear iterative strategies in the presence of malicious agents
-
Shreyas Sundaram and Christoforos N Hadjicostis. Distributed function calculation via linear iterative strategies in the presence of malicious agents. Automatic Control, IEEE Transactions on, 56(7):1495-1508, 2011.
-
(2011)
Automatic Control, IEEE Transactions on
, vol.56
, Issue.7
, pp. 1495-1508
-
-
Sundaram, S.1
Hadjicostis, C.N.2
-
14
-
-
79953146655
-
False data injection attacks against state estimation in wireless sensor networks
-
IEEE
-
Yilin Mo, Emanuele Garone, Alessandro Casavola, and Bruno Sinopoli. False data injection attacks against state estimation in wireless sensor networks. In Decision and Control (CDC), 2010 49th IEEE Conference on, pages 5967-5972. IEEE, 2010.
-
(2010)
Decision and Control (CDC), 2010 49th IEEE Conference on
, pp. 5967-5972
-
-
Mo, Y.1
Garone, E.2
Casavola, A.3
Sinopoli, B.4
-
15
-
-
84920703223
-
A secure control framework for resource-limited adversaries
-
A. Teixeira, I. Shames, H. Sandberg, and K.H. Johansson. A secure control framework for resource-limited adversaries. Automatica, 51:135-148, 2015.
-
(2015)
Automatica
, vol.51
, pp. 135-148
-
-
Teixeira, A.1
Shames, I.2
Sandberg, H.3
Johansson, K.H.4
-
16
-
-
84921456182
-
Physical au thentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs
-
Feb
-
Y. Mo, S. Weerakkody, and B. Sinopoli. Physical au thentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs. Control Systems, IEEE, 35(1):93-109, Feb 2015.
-
(2015)
Control Systems, IEEE
, vol.35
, Issue.1
, pp. 93-109
-
-
Mo, Y.1
Weerakkody, S.2
Sinopoli, B.3
-
19
-
-
34047124637
-
On shaky ground - A study of security vulnerabilities in control protocols
-
Eric J Byres, Dan Hoffman, and Nate Kube. On shaky ground - a study of security vulnerabilities in control protocols. Proc. 5th American Nuclear Society Int. Mtg. on Nuclear Plant Instrumentation, Controls, and HMI Technology, 2006.
-
(2006)
Proc. 5th American Nuclear Society Int. Mtg. on Nuclear Plant Instrumentation, Controls, and HMI Technology
-
-
Byres, E.J.1
Hoffman, D.2
Kube, N.3
-
20
-
-
17744372555
-
Security measures for industrial fieldbus systems-state of the art and solutions for IP-based approaches
-
IEEE
-
Albert Treytl, Thilo Sauter, and Christian Schwaiger. Security measures for industrial fieldbus systems-state of the art and solutions for ip-based approaches. In Factory Communication Systems, 2004. Proceedings. 2004 IEEE International Workshop on, pages 201-209. IEEE, 2004.
-
(2004)
Factory Communication Systems, 2004. Proceedings. 2004 IEEE International Workshop on
, pp. 201-209
-
-
Treytl, A.1
Sauter, T.2
Schwaiger, C.3
-
21
-
-
70350634504
-
Using model-based intrusion detection for scada networks
-
Citeseer
-
Steven Cheung, Bruno Dutertre, Martin Fong, Ulf Lindqvist, Keith Skinner, and Alfonso Valdes. Using model-based intrusion detection for scada networks. In Proceedings of the SCADA security scientific symposium, volume 46, pages 1-12. Citeseer, 2007.
-
(2007)
Proceedings of the SCADA Security Scientific Symposium
, vol.46
, pp. 1-12
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
26
-
-
84958150271
-
Runtime-monitoring for industrial control systems
-
Helge Janicke, Andrew Nicholson, Stuart Webber, and Antonio Cau. Runtime-monitoring for industrial control systems. Electronics, 4(4):995-1017, 2015.
-
(2015)
Electronics
, vol.4
, Issue.4
, pp. 995-1017
-
-
Janicke, H.1
Nicholson, A.2
Webber, S.3
Cau, A.4
-
27
-
-
84921416016
-
Detecting industrial control malware using automated plc code analytics
-
Saman Zonouz, Julian Rrushi, and Steve McLaughlin. Detecting industrial control malware using automated plc code analytics. Security & Privacy, IEEE, 12(6):40-47, 2014.
-
(2014)
Security & Privacy, IEEE
, vol.12
, Issue.6
, pp. 40-47
-
-
Zonouz, S.1
Rrushi, J.2
McLaughlin, S.3
-
28
-
-
84966457261
-
Plc guard: A practical defense against attacks on cyber-physical systems
-
IEEE
-
Jan-Ole Malchow, Daniel Marzin, Johannes Klick, Robert Kovacs, and Volker Roth. Plc guard: A practical defense against attacks on cyber-physical systems. In Communications and Network Security (CNS), 2015 IEEE Conference on, pages 326-334. IEEE, 2015.
-
(2015)
Communications and Network Security (CNS), 2015 IEEE Conference on
, pp. 326-334
-
-
Malchow, J.-O.1
Marzin, D.2
Klick, J.3
Kovacs, R.4
Roth, V.5
-
29
-
-
84954527190
-
Through the eye of the plc: Semantic security monitoring for industrial processes
-
ACM
-
Dina Hadžiosmanović et al. Through the eye of the plc: semantic security monitoring for industrial processes. In Proceedings of the 30th ACSAC, pages 126-135. ACM, 2014.
-
(2014)
Proceedings of the 30th ACSAC
, pp. 126-135
-
-
Hadžiosmanović, D.1
-
30
-
-
84951871136
-
Modeling message sequences for intrusion detection in industrial control systems
-
Springer
-
Marco Caselli, Emmanuele Zambon, Jonathan Petit, and Frank Kargl. Modeling message sequences for intrusion detection in industrial control systems. In Critical Infrastructure Protection IX, pages 49-71. Springer, 2015.
-
(2015)
Critical Infrastructure Protection IX
, pp. 49-71
-
-
Caselli, M.1
Zambon, E.2
Petit, J.3
Kargl, F.4
-
31
-
-
84869391514
-
On dynamic malware payloads aimed at programmable logic controllers
-
Stephen E McLaughlin. On dynamic malware payloads aimed at programmable logic controllers. In HotSec, 2011.
-
(2011)
HotSec
-
-
McLaughlin, S.E.1
-
33
-
-
85011255167
-
Cyber-critical infrastructure protection using real-time payload-based anomaly detection
-
Springer
-
Düssel et al. Cyber-critical infrastructure protection using real-time payload-based anomaly detection. In Critical Information Infrastructures Security, pages 85-97. Springer, 2009.
-
(2009)
Critical Information Infrastructures Security
, pp. 85-97
-
-
Düssel1
-
34
-
-
84906094761
-
An unsupervised anomalybased detection approach for integrity attacks on scada systems
-
Abdulmohsen Almalawi, Xinghuo Yu, Zahir Tari, Adil Fahad, and Ibrahim Khalil. An unsupervised anomalybased detection approach for integrity attacks on scada systems. Computers & Security, 46:94-110, 2014.
-
(2014)
Computers & Security
, vol.46
, pp. 94-110
-
-
Almalawi, A.1
Yu, X.2
Tari, Z.3
Fahad, A.4
Khalil, I.5
-
35
-
-
79952527986
-
On scada control system command and response injection and intrusion detection
-
IEEE, 2010
-
Wei Gao, Thomas Morris, Bradley Reaves, and Drew Richey. On scada control system command and response injection and intrusion detection. In eCrime Researchers Summit (eCrime), 2010, pages 1-9. IEEE, 2010.
-
(2010)
ECrime Researchers Summit (ECrime)
, pp. 1-9
-
-
Gao, W.1
Morris, T.2
Reaves, B.3
Richey, D.4
-
36
-
-
84876382615
-
-
Quickdraw SCADA IDS. http://www.digitalbond.com/tools/quickdraw/.
-
Quickdraw SCADA IDS
-
-
-
37
-
-
84881188775
-
Towards the protection of industrial control systems-conclusions of a vulnerability analysis of profinet io
-
Springer
-
Andreas Paul, Franka Schuster, and Hartmut König. Towards the protection of industrial control systems-conclusions of a vulnerability analysis of profinet io. In Detection of Intrusions and Malware, and Vulnerability Assessment, pages 160-176. Springer, 2013.
-
(2013)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 160-176
-
-
Paul, A.1
Schuster, F.2
König, H.3
-
38
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
Martin Roesch et al. Snort: Lightweight intrusion detection for networks. In LISA, volume 99, pages 229-238, 1999.
-
(1999)
LISA
, vol.99
, pp. 229-238
-
-
Roesch, M.1
-
40
-
-
84879190317
-
On survivability of mobile cyber physical systems with intrusion detection
-
Robert Mitchell and Ray Chen. On survivability of mobile cyber physical systems with intrusion detection. Wireless personal communications, 68(4):1377-1391, 2013.
-
(2013)
Wireless Personal Communications
, vol.68
, Issue.4
, pp. 1377-1391
-
-
Mitchell, R.1
Chen, R.2
-
42
-
-
78149468870
-
An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
-
Sooyeon Shin, Taekyoung Kwon, Gil-Yong Jo, Youngman Park, and Haekyu Rhy. An experimental study of hierarchical intrusion detection for wireless industrial sensor networks. Industrial Informatics, IEEE Transactions on, 6(4):744-757, 2010.
-
(2010)
Industrial Informatics, IEEE Transactions on
, vol.6
, Issue.4
, pp. 744-757
-
-
Shin, S.1
Kwon, T.2
Jo, G.-Y.3
Park, Y.4
Rhy, H.5
-
43
-
-
77956987558
-
An intrusion detection system for iec61850 automated substations
-
Upeka Kanchana Premaratne, Jagath Samarabandu, Tarlochan S Sidhu, Robert Beresh, and Jian-Cheng Tan. An intrusion detection system for iec61850 automated substations. Power Delivery, IEEE Transactions on, 25(4):2376-2383, 2010.
-
(2010)
Power Delivery, IEEE Transactions on
, vol.25
, Issue.4
, pp. 2376-2383
-
-
Premaratne, U.K.1
Samarabandu, J.2
Sidhu, T.S.3
Beresh, R.4
Tan, J.-C.5
-
44
-
-
50649107305
-
Idaho national laboratory supervisory control and data acquisition intrusion detection system (scada ids)
-
IEEE
-
Jared Verba and Michael Milvich. Idaho national laboratory supervisory control and data acquisition intrusion detection system (scada ids). In Technologies for Homeland Security, 2008 IEEE Conference on, pages 469-473. IEEE, 2008.
-
(2008)
Technologies for Homeland Security, 2008 IEEE Conference on
, pp. 469-473
-
-
Verba, J.1
Milvich, M.2
-
45
-
-
84555177840
-
A survey of cyber-physical systems
-
IEEE
-
Jianhua Shi, Jiafu Wan, Hehua Yan, and Hui Suo. A survey of cyber-physical systems. In Wireless Communications and Signal Processing (WCSP), 2011 International Conference on, pages 1-6. IEEE, 2011.
-
(2011)
Wireless Communications and Signal Processing (WCSP), 2011 International Conference on
, pp. 1-6
-
-
Shi, J.1
Wan, J.2
Yan, H.3
Suo, H.4
|