메뉴 건너뛰기




Volumn , Issue , 2017, Pages 305-317

Cyber-Physical Systems for Wide-Area Situational Awareness

Author keywords

Control systems; Critical infrastructure protection; Cyber physical systems; Detection; Response; Restoration; Wide area situational awareness

Indexed keywords

CONTROL SYSTEMS; CRITICAL INFRASTRUCTURES; EMBEDDED SYSTEMS; ERROR DETECTION; IMAGE RECONSTRUCTION; PUBLIC WORKS; RESTORATION;

EID: 85024140426     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-0-12-803801-7.00020-1     Document Type: Chapter
Times cited : (7)

References (31)
  • 1
    • 84870372575 scopus 로고    scopus 로고
    • Analysis of requirements for critical control systems
    • Alcaraz C., Lopez J. Analysis of requirements for critical control systems. Int. J. Crit. Infrastruct. Prot. 2012, 2(3-4):137-145.
    • (2012) Int. J. Crit. Infrastruct. Prot. , vol.2 , Issue.3-4 , pp. 137-145
    • Alcaraz, C.1    Lopez, J.2
  • 2
    • 84876124711 scopus 로고    scopus 로고
    • Wide-area situational awareness for critical infrastructure protection
    • Alcaraz C., Lopez J. Wide-area situational awareness for critical infrastructure protection. IEEE Comput. 2013, 46(4):30-37.
    • (2013) IEEE Comput. , vol.46 , Issue.4 , pp. 30-37
    • Alcaraz, C.1    Lopez, J.2
  • 3
    • 84888316290 scopus 로고    scopus 로고
    • WASAM: a dynamic wide-area situational awareness model for critical domains in smart grids
    • Alcaraz C., Lopez J. WASAM: a dynamic wide-area situational awareness model for critical domains in smart grids. Futur. Gener. Comput. Syst. 2014, 30:146-154.
    • (2014) Futur. Gener. Comput. Syst. , vol.30 , pp. 146-154
    • Alcaraz, C.1    Lopez, J.2
  • 4
    • 84908266165 scopus 로고    scopus 로고
    • Recovery of structural controllability for control systems
    • Springer, Virginia, USA
    • Alcaraz C., Wolthusen S. Recovery of structural controllability for control systems 2014, 47-63. Springer, Virginia, USA.
    • (2014) , pp. 47-63
    • Alcaraz, C.1    Wolthusen, S.2
  • 6
    • 34047192955 scopus 로고    scopus 로고
    • NISCC Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks
    • Centre for the Protection of National Infrastructure
    • Byres E., Karsch J., Carter J. NISCC Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks 2005, Centre for the Protection of National Infrastructure.
    • (2005)
    • Byres, E.1    Karsch, J.2    Carter, J.3
  • 9
    • 0029004440 scopus 로고
    • Toward a theory of situation awareness in dynamic systems
    • Endsley R. Toward a theory of situation awareness in dynamic systems. Hum. Factors 1995, 37(33):32-64.
    • (1995) Hum. Factors , vol.37 , Issue.33 , pp. 32-64
    • Endsley, R.1
  • 10
    • 84898541002 scopus 로고    scopus 로고
    • A multi-attribute decision model for intrusion response system
    • Fessi B.A., Benabdallah S., Boudriga N., Hamdi M. A multi-attribute decision model for intrusion response system. Inf. Sci. 2014, 270:237-254.
    • (2014) Inf. Sci. , vol.270 , pp. 237-254
    • Fessi, B.A.1    Benabdallah, S.2    Boudriga, N.3    Hamdi, M.4
  • 11
    • 43049179369 scopus 로고    scopus 로고
    • Securing web applications
    • Gollmann D. Securing web applications. Inf. Secur. Tech. Rep. 2008, 13(1):1-9.
    • (2008) Inf. Secur. Tech. Rep. , vol.13 , Issue.1 , pp. 1-9
    • Gollmann, D.1
  • 12
    • 84906342007 scopus 로고    scopus 로고
    • Taxonomy of anomaly based intrusion detection system: a review
    • Gyanchandani M., Rana J., Yadav R. Taxonomy of anomaly based intrusion detection system: a review. Neural Netw. 2012, 2(43):1-14.
    • (2012) Neural Netw. , vol.2 , Issue.43 , pp. 1-14
    • Gyanchandani, M.1    Rana, J.2    Yadav, R.3
  • 13
    • 46749158341 scopus 로고    scopus 로고
    • Third International Symposium on Information Assurance and Security. DIPS: A framework for distributed intrusion prediction and prevention using hidden markov models and online fuzzy risk assessment
    • Haslum K., Abraham A., Knapskog S. Third International Symposium on Information Assurance and Security. DIPS: A framework for distributed intrusion prediction and prevention using hidden markov models and online fuzzy risk assessment 2007, 183-190. 10.1109/IAS.2007.67.
    • (2007) , pp. 183-190
    • Haslum, K.1    Abraham, A.2    Knapskog, S.3
  • 14
    • 85080702920 scopus 로고    scopus 로고
    • Years in review 2009-2014
    • (accessed 24.06.15)
    • ICS-CERT, 2015. Years in review 2009-2014. (accessed 24.06.15). https://ics-cert.us-cert.gov/Other-Reports.
    • (2015)
  • 15
    • 77950793246 scopus 로고    scopus 로고
    • Modeling modern network attacks and countermeasures using attack graphs
    • ISSN 1063-9527
    • Ingols K., Chu M., Lippmann R., Webster S., Boyer S. Modeling modern network attacks and countermeasures using attack graphs 2009, 117-126. ISSN 1063-9527. 10.1109/ACSAC.2009.21.
    • (2009) , pp. 117-126
    • Ingols, K.1    Chu, M.2    Lippmann, R.3    Webster, S.4    Boyer, S.5
  • 16
    • 84882958075 scopus 로고    scopus 로고
    • Model-Based Intrusion Detection for Home Area Networks in Smart Grids
    • University of Bristol, Bristol
    • Jokar P. Model-Based Intrusion Detection for Home Area Networks in Smart Grids 2012, 1-19. University of Bristol, Bristol.
    • (2012) , pp. 1-19
    • Jokar, P.1
  • 17
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: attacks and countermeasures
    • Karlof C., Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 2003, 1(2):293-315.
    • (2003) Ad Hoc Netw. , vol.1 , Issue.2 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 18
    • 84881159962 scopus 로고    scopus 로고
    • Rollback-recovery without checkpoints in distributed event processing systems
    • ACM, New York, NY
    • Koldehofe B., Mayer R., Ramachandran U., Rothermel K., Völz M. Rollback-recovery without checkpoints in distributed event processing systems 2013, 27-38. ACM, New York, NY. 10.1145/2488222.2488259.
    • (2013) , pp. 27-38
    • Koldehofe, B.1    Mayer, R.2    Ramachandran, U.3    Rothermel, K.4    Völz, M.5
  • 19
    • 79955076643 scopus 로고    scopus 로고
    • Supervised machine learning: A review of classification techniques
    • IOS Press, Amsterdam, The Netherlands
    • Kotsiantis S.B. Supervised machine learning: A review of classification techniques 2007, 3-24. IOS Press, Amsterdam, The Netherlands. http://dl.acm.org/citation.cfm?id=1566770.1566773.
    • (2007) , pp. 3-24
    • Kotsiantis, S.B.1
  • 20
    • 79953777183 scopus 로고    scopus 로고
    • A survey of wormhole-based attacks and their countermeasures in wireless sensor networks
    • Meghdadi M., Ozdemir S., Güler I. A survey of wormhole-based attacks and their countermeasures in wireless sensor networks. IETE Tech. Rev 2011, 28(2).
    • (2011) IETE Tech. Rev , vol.28 , Issue.2
    • Meghdadi, M.1    Ozdemir, S.2    Güler, I.3
  • 21
    • 85019623176 scopus 로고    scopus 로고
    • Guidelines for Smart Grid Cybersecurity-Volume 1-Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements
    • The Smart Grid Interoperability Panel Cyber Security Working Group (SGIP), National Institute of Standards and Technology, NISTIR 7628 Rev 1
    • NIST, 2014. Guidelines for Smart Grid Cybersecurity-Volume 1-Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements. The Smart Grid Interoperability Panel Cyber Security Working Group (SGIP), National Institute of Standards and Technology, NISTIR 7628 Rev 1.
    • (2014)
  • 22
    • 85024136833 scopus 로고    scopus 로고
    • Towards a Self-adaptive Deployment and Configuration Infrastructure for Cyber-Physical Systems
    • Institute for Software Integrated Systems, Nashville, Technical Report, ISIS-14-102
    • Pradhan S., Otte W., Dubey A., Szabo C., Gokhale A., Karsai G. Towards a Self-adaptive Deployment and Configuration Infrastructure for Cyber-Physical Systems 2014, Institute for Software Integrated Systems, Nashville, Technical Report, ISIS-14-102. http://www.isis.vanderbilt.edu/sites/default/files/Pradhan_SEAMS_TechReport.pdf.
    • (2014)
    • Pradhan, S.1    Otte, W.2    Dubey, A.3    Szabo, C.4    Gokhale, A.5    Karsai, G.6
  • 23
    • 35348832896 scopus 로고    scopus 로고
    • A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes
    • Roman R., Alcaraz C., Lopez J. A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes. Mobile Netw. Appl. 2007, 12(4):231-244.
    • (2007) Mobile Netw. Appl. , vol.12 , Issue.4 , pp. 231-244
    • Roman, R.1    Alcaraz, C.2    Lopez, J.3
  • 24
    • 85015993693 scopus 로고    scopus 로고
    • Schemes for surviving advanced persistent threats
    • Faculty of the Graduate School of the University at Buffalo, State University of New York.
    • Ruchika, M., 2013. Schemes for surviving advanced persistent threats. Diss. Faculty of the Graduate School of the University at Buffalo, State University of New York.
    • (2013)
    • Ruchika, M.1
  • 26
    • 42449117164 scopus 로고    scopus 로고
    • Guide to Intrusion Detection and Prevention Systems
    • Institute of Standards and Technology, Computer Security Division. NIST, Special Publication (800-94), Gaithersburg
    • Scarfone K., Mell P. Guide to Intrusion Detection and Prevention Systems 2007, Institute of Standards and Technology, Computer Security Division. NIST, Special Publication (800-94), Gaithersburg.
    • (2007)
    • Scarfone, K.1    Mell, P.2
  • 27
    • 85132972574 scopus 로고    scopus 로고
    • Distributed denial of service: Taxonomies of attacks, tools, and countermeasures
    • Specht S.M., Lee R.B. Distributed denial of service: Taxonomies of attacks, tools, and countermeasures 2004, 543-550.
    • (2004) , pp. 543-550
    • Specht, S.M.1    Lee, R.B.2
  • 29
    • 34548347085 scopus 로고    scopus 로고
    • A survey of fault-tolerance and fault-recovery techniques in parallel systems
    • 501002
    • Treaster M. A survey of fault-tolerance and fault-recovery techniques in parallel systems. ACM Comput Res. Repos. 2005, 501002:1-11.
    • (2005) ACM Comput Res. Repos. , pp. 1-11
    • Treaster, M.1
  • 30
    • 85080787426 scopus 로고    scopus 로고
    • Highly-resilient services for critical infrastructures
    • Veronese G.S., Correia M., Bessani A.N., Lung L.C. Highly-resilient services for critical infrastructures 2009, http://citeseerx.ist.psu.edu/viewdoc/citations;jsessionid=47C8AD961F92582ECAC5A48317DF5839?.
    • (2009)
    • Veronese, G.S.1    Correia, M.2    Bessani, A.N.3    Lung, L.C.4
  • 31
    • 84868328245 scopus 로고    scopus 로고
    • Attacks and countermeasures in sensor networks: A survey
    • Springer US, Boston, MA, C.-H.S. Huang, D. MacCallum, D.-Z. Du (Eds.)
    • Xing K., Srinivasan S.S.R., Rivera M.J.M., Li J., Cheng X. Attacks and countermeasures in sensor networks: A survey. Network Security 2010, 251-272. Springer US, Boston, MA. 10.1007/978-0-387-73821-5_11. C.-H.S. Huang, D. MacCallum, D.-Z. Du (Eds.).
    • (2010) Network Security , pp. 251-272
    • Xing, K.1    Srinivasan, S.S.R.2    Rivera, M.J.M.3    Li, J.4    Cheng, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.