-
1
-
-
84870372575
-
Analysis of requirements for critical control systems
-
Alcaraz C., Lopez J. Analysis of requirements for critical control systems. Int. J. Crit. Infrastruct. Prot. 2012, 2(3-4):137-145.
-
(2012)
Int. J. Crit. Infrastruct. Prot.
, vol.2
, Issue.3-4
, pp. 137-145
-
-
Alcaraz, C.1
Lopez, J.2
-
2
-
-
84876124711
-
Wide-area situational awareness for critical infrastructure protection
-
Alcaraz C., Lopez J. Wide-area situational awareness for critical infrastructure protection. IEEE Comput. 2013, 46(4):30-37.
-
(2013)
IEEE Comput.
, vol.46
, Issue.4
, pp. 30-37
-
-
Alcaraz, C.1
Lopez, J.2
-
3
-
-
84888316290
-
WASAM: a dynamic wide-area situational awareness model for critical domains in smart grids
-
Alcaraz C., Lopez J. WASAM: a dynamic wide-area situational awareness model for critical domains in smart grids. Futur. Gener. Comput. Syst. 2014, 30:146-154.
-
(2014)
Futur. Gener. Comput. Syst.
, vol.30
, pp. 146-154
-
-
Alcaraz, C.1
Lopez, J.2
-
4
-
-
84908266165
-
Recovery of structural controllability for control systems
-
Springer, Virginia, USA
-
Alcaraz C., Wolthusen S. Recovery of structural controllability for control systems 2014, 47-63. Springer, Virginia, USA.
-
(2014)
, pp. 47-63
-
-
Alcaraz, C.1
Wolthusen, S.2
-
6
-
-
34047192955
-
NISCC Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks
-
Centre for the Protection of National Infrastructure
-
Byres E., Karsch J., Carter J. NISCC Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks 2005, Centre for the Protection of National Infrastructure.
-
(2005)
-
-
Byres, E.1
Karsch, J.2
Carter, J.3
-
8
-
-
80052933495
-
High-speed intrusion detection in support of critical infrastructure protection
-
Springer, Berlin, Heidelberg, J. Lopez (Ed.)
-
D'Antonio S., Oliviero F., Setola R. High-speed intrusion detection in support of critical infrastructure protection. Critical Information Infrastructures Security: First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers 2006, 222-234. Springer, Berlin, Heidelberg. 10.1007/11962977_18. J. Lopez (Ed.).
-
(2006)
Critical Information Infrastructures Security: First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers
, pp. 222-234
-
-
D'Antonio, S.1
Oliviero, F.2
Setola, R.3
-
9
-
-
0029004440
-
Toward a theory of situation awareness in dynamic systems
-
Endsley R. Toward a theory of situation awareness in dynamic systems. Hum. Factors 1995, 37(33):32-64.
-
(1995)
Hum. Factors
, vol.37
, Issue.33
, pp. 32-64
-
-
Endsley, R.1
-
10
-
-
84898541002
-
A multi-attribute decision model for intrusion response system
-
Fessi B.A., Benabdallah S., Boudriga N., Hamdi M. A multi-attribute decision model for intrusion response system. Inf. Sci. 2014, 270:237-254.
-
(2014)
Inf. Sci.
, vol.270
, pp. 237-254
-
-
Fessi, B.A.1
Benabdallah, S.2
Boudriga, N.3
Hamdi, M.4
-
11
-
-
43049179369
-
Securing web applications
-
Gollmann D. Securing web applications. Inf. Secur. Tech. Rep. 2008, 13(1):1-9.
-
(2008)
Inf. Secur. Tech. Rep.
, vol.13
, Issue.1
, pp. 1-9
-
-
Gollmann, D.1
-
12
-
-
84906342007
-
Taxonomy of anomaly based intrusion detection system: a review
-
Gyanchandani M., Rana J., Yadav R. Taxonomy of anomaly based intrusion detection system: a review. Neural Netw. 2012, 2(43):1-14.
-
(2012)
Neural Netw.
, vol.2
, Issue.43
, pp. 1-14
-
-
Gyanchandani, M.1
Rana, J.2
Yadav, R.3
-
13
-
-
46749158341
-
Third International Symposium on Information Assurance and Security. DIPS: A framework for distributed intrusion prediction and prevention using hidden markov models and online fuzzy risk assessment
-
Haslum K., Abraham A., Knapskog S. Third International Symposium on Information Assurance and Security. DIPS: A framework for distributed intrusion prediction and prevention using hidden markov models and online fuzzy risk assessment 2007, 183-190. 10.1109/IAS.2007.67.
-
(2007)
, pp. 183-190
-
-
Haslum, K.1
Abraham, A.2
Knapskog, S.3
-
14
-
-
85080702920
-
Years in review 2009-2014
-
(accessed 24.06.15)
-
ICS-CERT, 2015. Years in review 2009-2014. (accessed 24.06.15). https://ics-cert.us-cert.gov/Other-Reports.
-
(2015)
-
-
-
15
-
-
77950793246
-
Modeling modern network attacks and countermeasures using attack graphs
-
ISSN 1063-9527
-
Ingols K., Chu M., Lippmann R., Webster S., Boyer S. Modeling modern network attacks and countermeasures using attack graphs 2009, 117-126. ISSN 1063-9527. 10.1109/ACSAC.2009.21.
-
(2009)
, pp. 117-126
-
-
Ingols, K.1
Chu, M.2
Lippmann, R.3
Webster, S.4
Boyer, S.5
-
16
-
-
84882958075
-
Model-Based Intrusion Detection for Home Area Networks in Smart Grids
-
University of Bristol, Bristol
-
Jokar P. Model-Based Intrusion Detection for Home Area Networks in Smart Grids 2012, 1-19. University of Bristol, Bristol.
-
(2012)
, pp. 1-19
-
-
Jokar, P.1
-
17
-
-
2942656255
-
Secure routing in wireless sensor networks: attacks and countermeasures
-
Karlof C., Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 2003, 1(2):293-315.
-
(2003)
Ad Hoc Netw.
, vol.1
, Issue.2
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
18
-
-
84881159962
-
Rollback-recovery without checkpoints in distributed event processing systems
-
ACM, New York, NY
-
Koldehofe B., Mayer R., Ramachandran U., Rothermel K., Völz M. Rollback-recovery without checkpoints in distributed event processing systems 2013, 27-38. ACM, New York, NY. 10.1145/2488222.2488259.
-
(2013)
, pp. 27-38
-
-
Koldehofe, B.1
Mayer, R.2
Ramachandran, U.3
Rothermel, K.4
Völz, M.5
-
19
-
-
79955076643
-
Supervised machine learning: A review of classification techniques
-
IOS Press, Amsterdam, The Netherlands
-
Kotsiantis S.B. Supervised machine learning: A review of classification techniques 2007, 3-24. IOS Press, Amsterdam, The Netherlands. http://dl.acm.org/citation.cfm?id=1566770.1566773.
-
(2007)
, pp. 3-24
-
-
Kotsiantis, S.B.1
-
20
-
-
79953777183
-
A survey of wormhole-based attacks and their countermeasures in wireless sensor networks
-
Meghdadi M., Ozdemir S., Güler I. A survey of wormhole-based attacks and their countermeasures in wireless sensor networks. IETE Tech. Rev 2011, 28(2).
-
(2011)
IETE Tech. Rev
, vol.28
, Issue.2
-
-
Meghdadi, M.1
Ozdemir, S.2
Güler, I.3
-
21
-
-
85019623176
-
Guidelines for Smart Grid Cybersecurity-Volume 1-Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements
-
The Smart Grid Interoperability Panel Cyber Security Working Group (SGIP), National Institute of Standards and Technology, NISTIR 7628 Rev 1
-
NIST, 2014. Guidelines for Smart Grid Cybersecurity-Volume 1-Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements. The Smart Grid Interoperability Panel Cyber Security Working Group (SGIP), National Institute of Standards and Technology, NISTIR 7628 Rev 1.
-
(2014)
-
-
-
22
-
-
85024136833
-
Towards a Self-adaptive Deployment and Configuration Infrastructure for Cyber-Physical Systems
-
Institute for Software Integrated Systems, Nashville, Technical Report, ISIS-14-102
-
Pradhan S., Otte W., Dubey A., Szabo C., Gokhale A., Karsai G. Towards a Self-adaptive Deployment and Configuration Infrastructure for Cyber-Physical Systems 2014, Institute for Software Integrated Systems, Nashville, Technical Report, ISIS-14-102. http://www.isis.vanderbilt.edu/sites/default/files/Pradhan_SEAMS_TechReport.pdf.
-
(2014)
-
-
Pradhan, S.1
Otte, W.2
Dubey, A.3
Szabo, C.4
Gokhale, A.5
Karsai, G.6
-
23
-
-
35348832896
-
A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes
-
Roman R., Alcaraz C., Lopez J. A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes. Mobile Netw. Appl. 2007, 12(4):231-244.
-
(2007)
Mobile Netw. Appl.
, vol.12
, Issue.4
, pp. 231-244
-
-
Roman, R.1
Alcaraz, C.2
Lopez, J.3
-
24
-
-
85015993693
-
Schemes for surviving advanced persistent threats
-
Faculty of the Graduate School of the University at Buffalo, State University of New York.
-
Ruchika, M., 2013. Schemes for surviving advanced persistent threats. Diss. Faculty of the Graduate School of the University at Buffalo, State University of New York.
-
(2013)
-
-
Ruchika, M.1
-
25
-
-
37249023319
-
A comparative study of unsupervised machine learning and data mining techniques for intrusion detection
-
Springer, Berlin, Heidelberg, P. Perner (Ed.)
-
Sadoddin R., Ghorbani A.A. A comparative study of unsupervised machine learning and data mining techniques for intrusion detection. Machine Learning and Data Mining in Pattern Recognition: 5th International Conference, MLDM 2007, Leipzig, Germany, July 18-20, 2007. Proceedings 2007, 404-418. Springer, Berlin, Heidelberg. 10.1007/978-3-540-73499-4_31. P. Perner (Ed.).
-
(2007)
Machine Learning and Data Mining in Pattern Recognition: 5th International Conference, MLDM 2007, Leipzig, Germany, July 18-20, 2007. Proceedings
, pp. 404-418
-
-
Sadoddin, R.1
Ghorbani, A.A.2
-
26
-
-
42449117164
-
Guide to Intrusion Detection and Prevention Systems
-
Institute of Standards and Technology, Computer Security Division. NIST, Special Publication (800-94), Gaithersburg
-
Scarfone K., Mell P. Guide to Intrusion Detection and Prevention Systems 2007, Institute of Standards and Technology, Computer Security Division. NIST, Special Publication (800-94), Gaithersburg.
-
(2007)
-
-
Scarfone, K.1
Mell, P.2
-
27
-
-
85132972574
-
Distributed denial of service: Taxonomies of attacks, tools, and countermeasures
-
Specht S.M., Lee R.B. Distributed denial of service: Taxonomies of attacks, tools, and countermeasures 2004, 543-550.
-
(2004)
, pp. 543-550
-
-
Specht, S.M.1
Lee, R.B.2
-
29
-
-
34548347085
-
A survey of fault-tolerance and fault-recovery techniques in parallel systems
-
501002
-
Treaster M. A survey of fault-tolerance and fault-recovery techniques in parallel systems. ACM Comput Res. Repos. 2005, 501002:1-11.
-
(2005)
ACM Comput Res. Repos.
, pp. 1-11
-
-
Treaster, M.1
-
30
-
-
85080787426
-
Highly-resilient services for critical infrastructures
-
Veronese G.S., Correia M., Bessani A.N., Lung L.C. Highly-resilient services for critical infrastructures 2009, http://citeseerx.ist.psu.edu/viewdoc/citations;jsessionid=47C8AD961F92582ECAC5A48317DF5839?.
-
(2009)
-
-
Veronese, G.S.1
Correia, M.2
Bessani, A.N.3
Lung, L.C.4
-
31
-
-
84868328245
-
Attacks and countermeasures in sensor networks: A survey
-
Springer US, Boston, MA, C.-H.S. Huang, D. MacCallum, D.-Z. Du (Eds.)
-
Xing K., Srinivasan S.S.R., Rivera M.J.M., Li J., Cheng X. Attacks and countermeasures in sensor networks: A survey. Network Security 2010, 251-272. Springer US, Boston, MA. 10.1007/978-0-387-73821-5_11. C.-H.S. Huang, D. MacCallum, D.-Z. Du (Eds.).
-
(2010)
Network Security
, pp. 251-272
-
-
Xing, K.1
Srinivasan, S.S.R.2
Rivera, M.J.M.3
Li, J.4
Cheng, X.5
|