메뉴 건너뛰기




Volumn 38, Issue 2, 2005, Pages 158-165

Security considerations for energy automation networks

Author keywords

Access control; Power distribution and automation; Security; Security requirements; Security threats

Indexed keywords

ACCESS CONTROL; AUTOMATION; NUCLEAR FUELS; NUCLEAR POWER PLANTS; OUTAGES;

EID: 85029292359     PISSN: 14746670     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.3182/20051114-2-MX-3901.00023     Document Type: Conference Paper
Times cited : (6)

References (25)
  • 1
    • 21244494114 scopus 로고    scopus 로고
    • Wide-area protection and power system utilization
    • Bertsch, J., et. al. (2005). Wide-Area Protection and Power System Utilization. Proceedings of the IEEE, VOL. 93, NO.5, p. 997-1003.
    • (2005) Proceedings of the IEEE , vol.93 , Issue.5 , pp. 997-1003
    • Bertsch, J.1
  • 2
    • 84884836173 scopus 로고    scopus 로고
    • Simulation for congestion management to avoid blackouts
    • Brauner, G. (2004). Simulation for congestion management to avoid blackouts. Elektrotechnik und Infromationstechnik, Vol 11, p. 425-429.
    • (2004) Elektrotechnik und Infromationstechnik , vol.11 , pp. 425-429
    • Brauner, G.1
  • 3
    • 84884836944 scopus 로고    scopus 로고
    • British Columbia Institute of Technology
    • British Columbia Institute of Technology (2005). Industrial security incident knowledgebase [online]. [available at] http://www.bcit.ca/appliedresearch/security/services.shtml
    • (2005) Industrial Security Incident Knowledgebase
  • 4
    • 84860965823 scopus 로고    scopus 로고
    • Real world cyber security risks for industrial control systems
    • Response, online
    • Byres, E., Lowe J. (2005). Real World Cyber Security Risks For Industrial Control Systems. The Online Industrial Ethernet Book, Response No. i22 35 [online]. [available at] http://ethernet.industrial-networking.com/origarticles/i22cyber.asp
    • (2005) The Online Industrial Ethernet Book , Issue.22 , pp. 35
    • Byres, E.1    Lowe, J.2
  • 6
    • 84884850394 scopus 로고    scopus 로고
    • Nadelöhr für Österreich und Europa?
    • March 2003, in German
    • Fischer-Drapela, B. (2003). Nadelöhr für Österreich und Europa? In: VEOE Journal, March 2003, p. 4-7. (in German)
    • (2003) VEOE Journal , pp. 4-7
    • Fischer-Drapela, B.1
  • 7
    • 84884851912 scopus 로고    scopus 로고
    • Innovative Lösungen für die Informationssicherheit in Automatisierungssystemen
    • Berlin, ISBN: 3-8007-2827-3, in German
    • Naedele, M. (2004). Innovative Lösungen für die Informationssicherheit in Automatisierungssystemen In: Proceedings of VDE Congress 2004, Berlin, ISBN: 3-8007-2827-3, p. 233-238. (in German)
    • (2004) Proceedings of VDE Congress 2004 , pp. 233-238
    • Naedele, M.1
  • 10
    • 33746538379 scopus 로고    scopus 로고
    • The JEVis service platform - Distributed energy data acquisition and management
    • Zurawski, R. ed., CRC Press, Boca Taton, Florida, 2005
    • Palensky, P. (2005). The JEVis Service Platform - Distributed Energy Data Acquisition and Management. In: The Industrial Information Technology Handbook, Zurawski, R. (ed.), CRC Press, Boca Taton, Florida, 2005, p. 111-117.
    • (2005) The Industrial Information Technology Handbook , pp. 111-117
    • Palensky, P.1
  • 11
    • 0037705372 scopus 로고    scopus 로고
    • EbXML and web services
    • May-June 2003
    • Patil, S. and Newcomer, E. (2003). ebXML and Web Services. In: IEEE Internet Computing, Vol. 7, Issue 3, May-June 2003
    • (2003) IEEE Internet Computing , vol.7 , Issue.3
    • Patil, S.1    Newcomer, E.2
  • 13
    • 0037056208 scopus 로고    scopus 로고
    • Achievement of secure Internet access to fieldbus systems
    • Sauter, T., Schwaiger, C. (2002). Achievement of secure Internet access to fieldbus systems. Microprocessors and Microsystems, Vol. 26, p. 331-339.
    • (2002) Microprocessors and Microsystems , vol.26 , pp. 331-339
    • Sauter, T.1    Schwaiger, C.2
  • 17
    • 84860962923 scopus 로고    scopus 로고
    • Secure architecture for embedded web servers
    • online. Response No. Issue 23:32
    • Sikora, A., Brügger, P. (2005). Secure Architecture for Embedded Web Servers. The Online Industrial Ethernet Book [online]. Response No. Issue 23:32. [Available at] http://ethernet. industrialnetworking.com/ieb/articledisplay.asp? id=39
    • (2005) The Online Industrial Ethernet Book
    • Sikora, A.1    Brügger, P.2
  • 18
    • 21244486394 scopus 로고    scopus 로고
    • Designing the next generation of real-time control, communication, and computations for large power systems
    • 965-979
    • Tomsovic, K., et. al. (2005). Designing the Next Generation of Real-Time Control, Communication, and Computations for Large Power Systems. Proceedings of the IEEE, VOL. 93, NO.5, 965-979. p. 393-396.
    • (2005) Proceedings of the IEEE , vol.93 , Issue.5 , pp. 393-396
    • Tomsovic, K.1
  • 22
    • 84860957660 scopus 로고    scopus 로고
    • NRC issues information notice on potential of nuclear power plant network to worm infection
    • U. S. Nuclear Regulatory Commission, 2. September 2003.available under
    • U. S. Nuclear Regulatory Commission (2003). NRC Issues Information Notice on Potential of Nuclear Power Plant Network to Worm Infection. NRC News, No. 03-108, 2. September 2003.[available under] http://www.nrc.gov/reading-rm/doc-collections/gen-comm/infonotices/2003
    • (2003) NRC News , Issue.3-108


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.