-
1
-
-
84887937959
-
Critical control system protection in the 21st century: Threats and solutions
-
Oct.
-
C. Alcaraz and S. Zeadally, "Critical control system protection in the 21st century: Threats and solutions," Computer, vol. 46, no. 10, pp. 74-83, Oct. 2013.
-
(2013)
Computer
, vol.46
, Issue.10
, pp. 74-83
-
-
Alcaraz, C.1
Zeadally, S.2
-
2
-
-
84873293533
-
In quest of benchmarking security risks to cyber-physical systems
-
Jan./Feb.
-
S. Amin, G. A. Schwartz, and A. Hussain, "In quest of benchmarking security risks to cyber-physical systems," IEEE Netw., vol. 27, no. 1, pp. 19-24, Jan./Feb. 2013.
-
(2013)
IEEE Netw.
, vol.27
, Issue.1
, pp. 19-24
-
-
Amin, S.1
Schwartz, G.A.2
Hussain, A.3
-
3
-
-
77953044026
-
Stealthy deception attacks on water SCADA systems
-
Stockholm, Sweden
-
S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen, "Stealthy deception attacks on water SCADA systems," in Proc. 13th ACM Int. Conf. Hybrid Syst. Comput. Control, Stockholm, Sweden, 2010, pp. 161-170.
-
(2010)
Proc. 13th ACM Int. Conf. Hybrid Syst. Comput. Control
, pp. 161-170
-
-
Amin, S.1
Litrico, X.2
Sastry, S.S.3
Bayen, A.M.4
-
4
-
-
80052187622
-
Who controls the off switch?
-
Gaithersburg, MD, USA
-
R. Anderson and S. Fuloria, "Who controls the off switch?" in Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Gaithersburg, MD, USA, 2010, pp. 96-101.
-
(2010)
Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm)
, pp. 96-101
-
-
Anderson, R.1
Fuloria, S.2
-
5
-
-
84925359289
-
A comparative review on the wireless implantable medical devices privacy and security
-
Athens, Greece
-
Z. E. Ankarali et al., "A comparative review on the wireless implantable medical devices privacy and security," in Proc. EAI 4th Int. Conf. Wireless Mobile Commun. Healthcare (Mobihealth), Athens, Greece, 2014, pp. 246-249.
-
(2014)
Proc. EAI 4th Int. Conf. Wireless Mobile Commun. Healthcare (Mobihealth)
, pp. 246-249
-
-
Ankarali, Z.E.1
-
7
-
-
84961752361
-
Privacy and security in Internet of Things and wearable devices
-
Apr./Jun.
-
O. Arias, J. Wurm, K. Hoang, and Y. Jin, "Privacy and security in Internet of Things and wearable devices," IEEE Trans. Multi-Scale Comput. Syst., vol. 1, no. 2, pp. 99-109, Apr./Jun. 2015.
-
(2015)
IEEE Trans. Multi-Scale Comput. Syst.
, vol.1
, Issue.2
, pp. 99-109
-
-
Arias, O.1
Wurm, J.2
Hoang, K.3
Jin, Y.4
-
8
-
-
84908243764
-
-
Ph.D. dissertation, Centre Telematics Inf. Technol., Univ. Twente, Enschede, The Netherlands
-
R. R. R. Barbosa, "Anomaly detection in SCADA systems-a network based approach," Ph.D. dissertation, Centre Telematics Inf. Technol., Univ. Twente, Enschede, The Netherlands, 2014.
-
(2014)
Anomaly Detection in SCADA Systems - A Network Based Approach
-
-
Barbosa, R.R.R.1
-
9
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
S. M. Bellovin, "Security problems in the TCP/IP protocol suite," ACM SIGCOMM Comput. Commun. Rev., vol. 19, no. 2, pp. 32-48, 1989.
-
(1989)
ACM SIGCOMM Comput. Commun. Rev.
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.M.1
-
10
-
-
78549288504
-
Detection, correlation, and visualization of attacks against critical infrastructure systems
-
Ottawa, ON, Canada
-
L. Briesemeister, S. Cheung, U. Lindqvist, and A. Valdes, "Detection, correlation, and visualization of attacks against critical infrastructure systems," in Proc. IEEE 8th Annu. Int. Conf. Privacy Security Trust (PST), Ottawa, ON, Canada, 2010, pp. 15-22.
-
(2010)
Proc. IEEE 8th Annu. Int. Conf. Privacy Security Trust (PST)
, pp. 15-22
-
-
Briesemeister, L.1
Cheung, S.2
Lindqvist, U.3
Valdes, A.4
-
11
-
-
62849093591
-
Automotive system security: Challenges and state-of-the-art
-
Oak Ridge, TN, USA
-
R. R. Brooks, S. Sander, J. Deng, and J. Taiber, "Automotive system security: Challenges and state-of-the-art," in Proc. ACM 4th Annu. Workshop Cyber Security Inf. Intell. Res. Develop. Strategies Meet Cyber Security Inf. Intell. Challenges Ahead (CSIIRW), Oak Ridge, TN, USA, 2008, pp. 1-3.
-
(2008)
Proc. ACM 4th Annu. Workshop Cyber Security Inf. Intell. Res. Develop. Strategies Meet Cyber Security Inf. Intell. Challenges Ahead (CSIIRW)
, pp. 1-3
-
-
Brooks, R.R.1
Sander, S.2
Deng, J.3
Taiber, J.4
-
13
-
-
22344444992
-
The myths and facts behind cyber security risks for industrial control systems
-
E. Byres and J. Lowe, "The myths and facts behind cyber security risks for industrial control systems," in Proc. VDE Kongress, vol. 116. 2004, pp. 213-218.
-
(2004)
Proc. VDE Kongress
, vol.116
, pp. 213-218
-
-
Byres, E.1
Lowe, J.2
-
14
-
-
84873302493
-
A layered encryption mechanism for networked critical infrastructures
-
Jan./Feb.
-
H. Cao, P. Zhu, X. Lu, and A. Gurtov, "A layered encryption mechanism for networked critical infrastructures," IEEE Netw., vol. 27, no. 1, pp. 12-18, Jan./Feb. 2013.
-
(2013)
IEEE Netw.
, vol.27
, Issue.1
, pp. 12-18
-
-
Cao, H.1
Zhu, P.2
Lu, X.3
Gurtov, A.4
-
16
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, and response
-
Hong Kong
-
A. A. Cárdenas et al., "Attacks against process control systems: Risk assessment, detection, and response," in Proc. 6th ACM Symp. Inf. Comput. Commun. Security, Hong Kong, 2011, pp. 355-366.
-
(2011)
Proc. 6th ACM Symp. Inf. Comput. Commun. Security
, pp. 355-366
-
-
Cárdenas, A.A.1
-
17
-
-
85084140752
-
Research challenges for the security of control systems
-
San Jose, CA, USA
-
A. A. Cárdenas, S. Amin, and S. Sastry, "Research challenges for the security of control systems," in Proc. HotSec, San Jose, CA, USA, 2008, Art. no. 6.
-
(2008)
Proc. HotSec
-
-
Cárdenas, A.A.1
Amin, S.2
Sastry, S.3
-
18
-
-
67650535901
-
Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems
-
A. A. Cárdenas, T. Roosta, and S. Sastry, "Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems," Ad Hoc Netw., vol. 7, no. 8, pp. 1434-1447, 2009.
-
(2009)
Ad Hoc Netw.
, vol.7
, Issue.8
, pp. 1434-1447
-
-
Cárdenas, A.A.1
Roosta, T.2
Sastry, S.3
-
19
-
-
84878337116
-
-
U.S Dept. Defense, Defense Tech. Inf. Center, Fort Belvoir, VA, USA, Tech. Rep. CMU/SEI-2010-TN-028
-
J. L. Cebula and L. R. Young, "A taxonomy of operational cyber security risks," U.S Dept. Defense, Defense Tech. Inf. Center, Fort Belvoir, VA, USA, Tech. Rep. CMU/SEI-2010-TN-028, 2010.
-
(2010)
A Taxonomy of Operational Cyber Security Risks
-
-
Cebula, J.L.1
Young, L.R.2
-
20
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
San Francisco, CA, USA
-
S. Checkoway et al., "Comprehensive experimental analyses of automotive attack surfaces," in Proc. USENIX Security Symp., San Francisco, CA, USA, 2011, p. 6.
-
(2011)
Proc. USENIX Security Symp.
, pp. 6
-
-
Checkoway, S.1
-
21
-
-
84871964962
-
Review of security issues in industrial networks
-
Feb.
-
M. Cheminod, L. Durante, and A. Valenzano, "Review of security issues in industrial networks," IEEE Trans. Ind. Informat., vol. 9, no. 1, pp. 277-293, Feb. 2013.
-
(2013)
IEEE Trans. Ind. Informat.
, vol.9
, Issue.1
, pp. 277-293
-
-
Cheminod, M.1
Durante, L.2
Valenzano, A.3
-
22
-
-
85027958418
-
Preventing occupancy detection from smart meters
-
Sep.
-
D. Chen, S. Kalra, D. Irwin, P. Shenoy, and J. Albrecht, "Preventing occupancy detection from smart meters," IEEE Trans. Smart Grid, vol. 6, no. 5, pp. 2426-2434, Sep. 2015.
-
(2015)
IEEE Trans. Smart Grid
, vol.6
, Issue.5
, pp. 2426-2434
-
-
Chen, D.1
Kalra, S.2
Irwin, D.3
Shenoy, P.4
Albrecht, J.5
-
23
-
-
79956094375
-
Body area networks: A survey
-
M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V. C. Leung, "Body area networks: A survey," Mobile Netw. Appl., vol. 16, no. 2, pp. 171-193, 2011.
-
(2011)
Mobile Netw. Appl.
, vol.16
, Issue.2
, pp. 171-193
-
-
Chen, M.1
Gonzalez, S.2
Vasilakos, A.3
Cao, H.4
Leung, V.C.5
-
24
-
-
79953895474
-
Lessons from stuxnet
-
Apr.
-
T. M. Chen and S. Abu-Nimeh, "Lessons from Stuxnet," Computer, vol. 44, no. 4, pp. 91-93, Apr. 2011.
-
(2011)
Computer
, vol.44
, Issue.4
, pp. 91-93
-
-
Chen, T.M.1
Abu-Nimeh, S.2
-
25
-
-
85084095933
-
W32.duqu: The precursor to the next Stuxnet
-
presented at Berkeley, CA, USA
-
E. Chien, L. Omurchu, and N. Falliere, "W32.duqu: The precursor to the next Stuxnet," presented at the 5th USENIX Workshop Large Scale Exploits Emergent Threats, Berkeley, CA, USA, 2012, p. 5.
-
(2012)
The 5th USENIX Workshop Large Scale Exploits Emergent Threats
, pp. 5
-
-
Chien, E.1
Omurchu, L.2
Falliere, N.3
-
26
-
-
84995468208
-
Error handling of in-vehicle networks makes them vulnerable
-
Vienna, Austria
-
K.-T. Cho and K. G. Shin, "Error handling of in-vehicle networks makes them vulnerable," in Proc. ACM SIGSAC Conf. Comput. Commun. Security, Vienna, Austria, 2016, pp. 1044-1055.
-
(2016)
Proc. ACM SIGSAC Conf. Comput. Commun. Security
, pp. 1044-1055
-
-
Cho, K.-T.1
Shin, K.G.2
-
27
-
-
85074463893
-
Fingerprinting electronic control units for vehicle intrusion detection
-
Austin, TX, USA
-
K.-T. Cho and K. G. Shin, "Fingerprinting electronic control units for vehicle intrusion detection," in Proc. 25th USENIX Security Symp., Austin, TX, USA, 2016, pp. 911-927.
-
(2016)
Proc. 25th USENIX Security Symp.
, pp. 911-927
-
-
Cho, K.-T.1
Shin, K.G.2
-
28
-
-
85039172747
-
-
Ph.D. dissertation, Dept. Comput. Sci., State Univ. New York, Incheon, South Korea
-
S. Cho, "Privacy and authentication in smart grid networks," Ph.D. dissertation, Dept. Comput. Sci., State Univ. New York, Incheon, South Korea, 2014.
-
(2014)
Privacy and Authentication in Smart Grid Networks
-
-
Cho, S.1
-
29
-
-
67650661171
-
Advanced key-management architecture for secure SCADA communications
-
Jul.
-
D. Choi, H. Kim, D. Won, and S. Kim, "Advanced key-management architecture for secure SCADA communications," IEEE Trans. Power Del., vol. 24, no. 3, pp. 1154-1163, Jul. 2009.
-
(2009)
IEEE Trans. Power Del.
, vol.24
, Issue.3
, pp. 1154-1163
-
-
Choi, D.1
Kim, H.2
Won, D.3
Kim, S.4
-
30
-
-
84884085646
-
Enhancing cyber-physical security through data patterns
-
R. Chow, E. Uzun, A. A. Cárdenas, Z. Song, and S. Lee, "Enhancing cyber-physical security through data patterns," in Proc. Workshop Found. Depend. Secure Cyber Phys. Syst. (FDSCPS), 2011, p. 25.
-
(2011)
Proc. Workshop Found. Depend. Secure Cyber Phys. Syst. (FDSCPS)
, pp. 25
-
-
Chow, R.1
Uzun, E.2
Cárdenas, A.A.3
Song, Z.4
Lee, S.5
-
33
-
-
84855766673
-
Integrating physical and cyber security resources to detect wireless threats to critical infrastructure
-
Nov.
-
A. D'Amico, C. Verderosa, C. Horn, and T. Imhof, "Integrating physical and cyber security resources to detect wireless threats to critical infrastructure," in Proc. IEEE Int. Conf. Technol. Homeland Security (HST), Nov. 2011, pp. 494-500.
-
(2011)
Proc. IEEE Int. Conf. Technol. Homeland Security (HST)
, pp. 494-500
-
-
D'Amico, A.1
Verderosa, C.2
Horn, C.3
Imhof, T.4
-
34
-
-
84883583254
-
A security layer for smartphone-to-vehicle communication over bluetooth
-
Sep.
-
A. Dardanelli et al., "A security layer for smartphone-to-vehicle communication over bluetooth," IEEE Embedded Syst. Lett., vol. 5, no. 3, pp. 34-37, Sep. 2013.
-
(2013)
IEEE Embedded Syst. Lett.
, vol.5
, Issue.3
, pp. 34-37
-
-
Dardanelli, A.1
-
35
-
-
85014164505
-
-
Waltham, MA, USA: Elsevier
-
S. K. Das, K. Kant, and N. Zhang, Handbook on Securing Cyber-Physical Critical Infrastructure. Waltham, MA, USA: Elsevier, 2012.
-
(2012)
Handbook on Securing Cyber-Physical Critical Infrastructure
-
-
Das, S.K.1
Kant, K.2
Zhang, N.3
-
36
-
-
77953972283
-
Absence makes the heart grow fonder: New directions for implantable medical device security
-
San Jose, CA, USA
-
T. Denning, K. Fu, and T. Kohno, "Absence makes the heart grow fonder: New directions for implantable medical device security," in Proc. HotSec, San Jose, CA, USA, 2008, pp. 5:1-5:7.
-
(2008)
Proc. HotSec
, pp. 51-57
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
37
-
-
84954548473
-
CPS: Beyond usability: Applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices
-
New Orleans, LA, USA
-
T. Denning et al., "CPS: Beyond usability: Applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices," in Proc. 30th Annu. Comput. Security Appl. Conf., New Orleans, LA, USA, 2014, pp. 426-435.
-
(2014)
Proc. 30th Annu. Comput. Security Appl. Conf.
, pp. 426-435
-
-
Denning, T.1
-
38
-
-
84891752381
-
A taxonomy of attacks on the dnp3 protocol
-
C. Palmer and S. Shenoi, Eds. Berlin, Germany: Springer
-
S. East, J. Butts, M. Papa, and S. Shenoi, "A taxonomy of attacks on the dnp3 protocol," in Critical Infrastructure Protection III (IFIP Advances in Information and Communication Technology), vol. 311, C. Palmer and S. Shenoi, Eds. Berlin, Germany: Springer, 2009, pp. 67-81.
-
(2009)
Critical Infrastructure Protection III (IFIP Advances in Information and Communication Technology)
, vol.311
, pp. 67-81
-
-
East, S.1
Butts, J.2
Papa, M.3
Shenoi, S.4
-
39
-
-
85039172783
-
-
Powering Business Worldwide Eaton, [Online]
-
Powering Business Worldwide Eaton. (2014). Power Outage Annual Report: Blackout Tracker. [Online]. Available: http://www.eaton.com/ blackouttracker
-
(2014)
Power Outage Annual Report: Blackout Tracker
-
-
-
40
-
-
77954005795
-
Cyber security and power system communication - Essential parts of a smart grid infrastructure
-
Jul.
-
G. N. Ericsson, "Cyber security and power system communication - Essential parts of a smart grid infrastructure," IEEE Trans. Power Del., vol. 25, no. 3, pp. 1501-1507, Jul. 2010.
-
(2010)
IEEE Trans. Power Del.
, vol.25
, Issue.3
, pp. 1501-1507
-
-
Ericsson, G.N.1
-
41
-
-
84975288599
-
She: Secure hardware extension-Functional specification, version 1.1
-
Apr.
-
R. Escherich et al., "She: Secure hardware extension-Functional specification, version 1.1," Hersteller Initiative Softw. (HIS) AK Security, Apr. 2009.
-
(2009)
Hersteller Initiative Softw. (HIS) AK Security
-
-
Escherich, R.1
-
42
-
-
84898006994
-
Smart grid - The new and improved power grid: A survey
-
4th Quart.
-
X. Fang, S. Misra, G. Xue, and D. Yang, "Smart grid - The new and improved power grid: A survey," IEEE Commun. Surveys Tuts., vol. 14, no. 4, pp. 944-980, 4th Quart., 2012.
-
(2012)
IEEE Commun. Surveys Tuts.
, vol.14
, Issue.4
, pp. 944-980
-
-
Fang, X.1
Misra, S.2
Xue, G.3
Yang, D.4
-
43
-
-
34250215846
-
SCADA systems: Vulnerabilities and remediation
-
J. D. Fernandez and A. E. Fernandez, "SCADA systems: Vulnerabilities and remediation," J. Comput. Sci. Colleges, vol. 20, no. 4, pp. 160-168, 2005.
-
(2005)
J. Comput. Sci. Colleges
, vol.20
, Issue.4
, pp. 160-168
-
-
Fernandez, J.D.1
Fernandez, A.E.2
-
44
-
-
55549097482
-
Towards a taxonomy of attacks against energy control systems
-
M. Papa and S. Shenoi, Eds. Boston, MA, USA: Springer
-
T. Fleury, H. Khurana, and V. Welch, "Towards a taxonomy of attacks against energy control systems," Critical Infrastructure Protection II (The International Federation for Information Processing), vol. 290, M. Papa and S. Shenoi, Eds. Boston, MA, USA: Springer, 2008, pp. 71-85.
-
(2008)
Critical Infrastructure Protection II (The International Federation for Information Processing)
, vol.290
, pp. 71-85
-
-
Fleury, T.1
Khurana, H.2
Welch, V.3
-
47
-
-
84891808534
-
Design and implementation of a secure modbus protocol
-
Germany: Springer
-
I. N. Fovino, A. Carcano, M. Masera, and A. Trombetta, "Design and implementation of a secure modbus protocol," in Critical Infrastructure Protection III. Berlin, Germany: Springer, 2009, pp. 83-96.
-
(2009)
Critical Infrastructure Protection III. Berlin
, pp. 83-96
-
-
Fovino, I.N.1
Carcano, A.2
Masera, M.3
Trombetta, A.4
-
48
-
-
85039168966
-
-
FOX News Network [Online]
-
FOX News Network. (2014). Threat to The Grid? Details Emerge of Sniper Attack on Power Station. [Online]. Available: http://www.foxnews.com/politics/2014/02/06/2013-sniper-attack-onpower-grid-still-concern-in-washington-and-for-utilities/
-
(2014)
Threat to the Grid? Details Emerge of Sniper Attack on Power Station
-
-
-
49
-
-
85039173685
-
Cyberattacks on SCADA systems
-
FL, USA, Jun.
-
G. Francia, III, D. Thornton, and T. Brookshire, "Cyberattacks on SCADA systems," in Proc. 16th Colloquium Inf. Syst. Security Educ. Lake Buena Vista, FL, USA, Jun. 2012, pp. 9-14.
-
(2012)
Proc. 16th Colloquium Inf. Syst. Security Educ. Lake Buena Vista
, pp. 9-14
-
-
Francia, G.1
Thornton, D.2
Brookshire, T.3
-
50
-
-
84862696142
-
Wireless vulnerability of SCADA systems
-
Tuscaloosa, AL, USA
-
G. Francia, III, D. Thornton, and T. Brookshire, "Wireless vulnerability of SCADA systems," in Proc. ACM Southeast Regional Conf., Tuscaloosa, AL, USA, 2012, pp. 331-332.
-
(2012)
Proc. ACM Southeast Regional Conf.
, pp. 331-332
-
-
Francia, G.1
Thornton, D.2
Brookshire, T.3
-
51
-
-
84893983506
-
Security best practices and risk assessment of SCADA and industrial control systems
-
G. A. Francia, III, D. Thornton, and J. Dawson, "Security best practices and risk assessment of SCADA and industrial control systems," in Proc. Int. Conf. Security Manag. (SAM) Steering Committee World Congr. Comput. Sci. Comput. Eng. Appl. Comput. (WorldComp), 2012, p. 1.
-
(2012)
Proc. Int. Conf. Security Manag. (SAM) Steering Committee World Congr. Comput. Sci. Comput. Eng. Appl. Comput. (WorldComp)
, pp. 1
-
-
Francia, G.A.1
Thornton, D.2
Dawson, J.3
-
52
-
-
84888171353
-
Relay attacks on passive keyless entry and start systems in modern cars
-
A. Francillon, B. Danev, and S. Capkun, "Relay attacks on passive keyless entry and start systems in modern cars," in Proc. NDSS, 2011, p. 15.
-
(2011)
Proc. NDSS
, pp. 15
-
-
Francillon, A.1
Danev, B.2
Capkun, S.3
-
53
-
-
84885719603
-
Controlling for cybersecurity risks of medical device software
-
Oct.
-
K. Fu and J. Blum, "Controlling for cybersecurity risks of medical device software," Commun. ACM, vol. 56, no. 10, pp. 35-37, Oct. 2013.
-
(2013)
Commun. ACM
, vol.56
, Issue.10
, pp. 35-37
-
-
Fu, K.1
Blum, J.2
-
54
-
-
85076496014
-
Lock it and still lose it-on the (in) security of automotive remote keyless entry systems
-
Austin, TX, USA
-
F. D. Garcia, D. Oswald, T. Kasper, and P. Pavlidès, "Lock it and still lose it-on the (in) security of automotive remote keyless entry systems," in Proc. 25th USENIX Security Symp. (USENIX Security), Austin, TX, USA, 2016, pp. 929-944.
-
(2016)
Proc. 25th USENIX Security Symp. (USENIX Security)
, pp. 929-944
-
-
Garcia, F.D.1
Oswald, D.2
Kasper, T.3
Pavlidès, P.4
-
55
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
Aug.
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: Non-invasive security for implantable medical devices," SIGCOMM Comput. Commun. Rev., vol. 41, no. 4, pp. 2-13, Aug. 2011.
-
(2011)
SIGCOMM Comput. Commun. Rev.
, vol.41
, Issue.4
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
57
-
-
84886002308
-
Oversee a secure and open communication and runtime platform for innovative automotive applications
-
A. Groll et al., "Oversee a secure and open communication and runtime platform for innovative automotive applications," in Proc. 7th Embedded Security Cars Conf. (ESCAR), 2009.
-
(2009)
Proc. 7th Embedded Security Cars Conf. (ESCAR)
-
-
Groll, A.1
-
59
-
-
85007039883
-
From physical to cyber: Escalating protection for personalized auto insurance
-
Stanford, CA, USA
-
L. Guan et al., "From physical to cyber: Escalating protection for personalized auto insurance," in Proc. 14th ACM Conf. Embedded Netw. Sensor Syst. CD-ROM (SenSys), Stanford, CA, USA, 2016, pp. 42-55.
-
(2016)
Proc. 14th ACM Conf. Embedded Netw. Sensor Syst. CD-ROM (SenSys)
, pp. 42-55
-
-
Guan, L.1
-
60
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
May
-
D. Halperin et al., "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses," in Proc. IEEE Symp. Security Privacy (SP), May 2008, pp. 129-142.
-
(2008)
Proc. IEEE Symp. Security Privacy (SP)
, pp. 129-142
-
-
Halperin, D.1
-
61
-
-
38349178199
-
Security and privacy for implantable medical devices
-
Jan./Mar.
-
D. Halperin, T. S. Heydt-Benjamin, K. Fu, T. Kohno, and W. H. Maisel, "Security and privacy for implantable medical devices," IEEE Pervasive Comput., vol. 7, no. 1, pp. 30-39, Jan./Mar. 2008.
-
(2008)
IEEE Pervasive Comput.
, vol.7
, Issue.1
, pp. 30-39
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Fu, K.3
Kohno, T.4
Maisel, W.H.5
-
62
-
-
85092017530
-
Take two software updates and see me in the morning: The case for software security evaluations of medical devices
-
San Francisco, CA, USA
-
S. Hanna et al., "Take two software updates and see me in the morning: The case for software security evaluations of medical devices," in Proc. 2nd USENIX Conf. Health Security Privacy (HealthSec), San Francisco, CA, USA, 2011, p. 6.
-
(2011)
Proc. 2nd USENIX Conf. Health Security Privacy (HealthSec)
, pp. 6
-
-
Hanna, S.1
-
63
-
-
0032645074
-
TCP/IP security threats and attack methods
-
B. Harris and R. Hunt, "TCP/IP security threats and attack methods," Comput. Commun., vol. 22, no. 10, pp. 885-897, 1999.
-
(1999)
Comput. Commun.
, vol.22
, Issue.10
, pp. 885-897
-
-
Harris, B.1
Hunt, R.2
-
64
-
-
54749156341
-
China's cyber militia
-
S. Harris,"China's cyber militia," Nat. J. Mag., no. 31, 2008.
-
(2008)
Nat. J. Mag.
, Issue.31
-
-
Harris, S.1
-
65
-
-
84961627565
-
Secure authentication for remote patient monitoring with wireless medical sensor networks
-
T. Hayajneh, B. J. Mohd, M. Imran, G. Almashaqbeh, and A. V. Vasilakos, "Secure authentication for remote patient monitoring with wireless medical sensor networks," Sensors, vol. 16, no. 4, p. 424, 2016.
-
(2016)
Sensors
, vol.16
, Issue.4
, pp. 424
-
-
Hayajneh, T.1
Mohd, B.J.2
Imran, M.3
Almashaqbeh, G.4
Vasilakos, A.V.5
-
66
-
-
84868101609
-
-
Ph.D. dissertation, J. B. Speed School Eng., Univ. at Louisville, Louisville, KY, USA
-
J. L. Hieb, "Security hardened remote terminal units for SCADA networks," Ph.D. dissertation, J. B. Speed School Eng., Univ. at Louisville, Louisville, KY, USA, 2014.
-
(2014)
Security Hardened Remote Terminal Units for SCADA Networks
-
-
Hieb, J.L.1
-
68
-
-
56449088090
-
Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures
-
Newcastle upon Tyne, U.K.
-
T. Hoppe, S. Kiltz, and J. Dittmann, "Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures," in Proc. 27th Int. Conf. Comput. Safety Rel. Security (SAFECOMP), Newcastle upon Tyne, U.K., 2008, pp. 235-248.
-
(2008)
Proc. 27th Int. Conf. Comput. Safety Rel. Security (SAFECOMP)
, pp. 235-248
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
69
-
-
68949145137
-
Attack taxonomies for the modbus protocols
-
Dec.
-
P. Huitsing, R. Chandia, M. Papa, and S. Shenoi, "Attack taxonomies for the modbus protocols," Int. J. Crit. Infrastruct. Protect., vol. 1, pp. 37-44, Dec. 2008.
-
(2008)
Int. J. Crit. Infrastruct. Protect.
, vol.1
, pp. 37-44
-
-
Huitsing, P.1
Chandia, R.2
Papa, M.3
Shenoi, S.4
-
70
-
-
85039161924
-
-
ICS-CERT, [Online]
-
ICS-CERT. (2010). Common Cybersecurity Vulnerabilities in Industrial Control Systems. [Online]. Available: http://ics-cert.us-cert.gov/sites/ default/files/recommended-practices/DHS-Common-Cybersecurity- Vulnerabilities-ICS-2010.pdf
-
(2010)
Common Cybersecurity Vulnerabilities in Industrial Control Systems
-
-
-
72
-
-
77955021006
-
Anomaly detection in electricity cyber infrastructures
-
X. Jin, J. Bigham, J. Rodaway, D. Gamez, and C. Phillips, "Anomaly detection in electricity cyber infrastructures," in Proc. Int. Workshop Complex Netw. Infrastruct. Protect. (CNIP), 2006.
-
(2006)
Proc. Int. Workshop Complex Netw. Infrastruct. Protect. (CNIP)
-
-
Jin, X.1
Bigham, J.2
Rodaway, J.3
Gamez, D.4
Phillips, C.5
-
73
-
-
84983749082
-
Vulnerabilities of android OS-based telematics system
-
H. J. Jo, W. Choi, S. Y. Na, S. Woo, and D. H. Lee, "Vulnerabilities of android OS-based telematics system," Wireless Pers. Commun., vol. 92, no. 4, pp. 1511-1530, 2017.
-
(2017)
Wireless Pers. Commun.
, vol.92
, Issue.4
, pp. 1511-1530
-
-
Jo, H.J.1
Choi, W.2
Na, S.Y.3
Woo, S.4
Lee, D.H.5
-
75
-
-
76249112807
-
Analysis on cyber threats to SCADA systems
-
D.-J. Kang, J.-J. Lee, S.-J. Kim, and J.-H. Park, "Analysis on cyber threats to SCADA systems," in Proc. Transm. Distrib. Conf. Expo. Asia-Pac., 2009, pp. 1-4.
-
(2009)
Proc. Transm. Distrib. Conf. Expo. Asia-Pac.
, pp. 1-4
-
-
Kang, D.-J.1
Lee, J.-J.2
Kim, S.-J.3
Park, J.-H.4
-
76
-
-
0142099692
-
-
U.S. Dept. Commerce, NIST, Gaithersburg, MD, USA, Tech. Rep. 800:48
-
T. Karygiannis and L. Owens, "Wireless network security," U.S. Dept. Commerce, NIST, Gaithersburg, MD, USA, Tech. Rep. 800:48, 2002.
-
(2002)
Wireless Network Security
-
-
Karygiannis, T.1
Owens, L.2
-
77
-
-
77249138261
-
Smart-grid security issues
-
Jan./Feb.
-
H. Khurana, M. Hadley, N. Lu, and D. A. Frincke, "Smart-grid security issues," IEEE Security Privacy, vol. 8, no. 1, pp. 81-85, Jan./Feb. 2010.
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.1
, pp. 81-85
-
-
Khurana, H.1
Hadley, M.2
Lu, N.3
Frincke, D.A.4
-
80
-
-
84913582851
-
Survey in smart grid and smart home security: Issues, challenges and countermeasures
-
4th Quart.
-
N. Komninos, E. Philippou, and A. Pitsillides, "Survey in smart grid and smart home security: Issues, challenges and countermeasures," IEEE Commun. Surveys Tuts., vol. 16, no. 4, pp. 1933-1954, 4th Quart., 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.4
, pp. 1933-1954
-
-
Komninos, N.1
Philippou, E.2
Pitsillides, A.3
-
81
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
Oakland, CA, USA, May
-
K. Koscher et al., "Experimental security analysis of a modern automobile," in Proc. IEEE Symp. Security Privacy (SP), Oakland, CA, USA, May 2010, pp. 447-462.
-
(2010)
Proc. IEEE Symp. Security Privacy (SP)
, pp. 447-462
-
-
Koscher, K.1
-
82
-
-
84942546615
-
The process matters: Ensuring data veracity in cyber-physical systems
-
Singapore
-
M. Krotofil, J. Larsen, and D. Gollmann, "The process matters: Ensuring data veracity in cyber-physical systems," in Proc. 10th ACM Symp. Inf. Comput. Commun. Security (ASIA CCS), Singapore, 2015, pp. 133-144.
-
(2015)
Proc. 10th ACM Symp. Inf. Comput. Commun. Security (Asia CCS)
, pp. 133-144
-
-
Krotofil, M.1
Larsen, J.2
Gollmann, D.3
-
84
-
-
79957616447
-
Stuxnet: Dissecting a cyberwarfare weapon
-
May/Jun.
-
R. Langner, "Stuxnet: Dissecting a cyberwarfare weapon," IEEE Security Privacy, vol. 9, no. 3, pp. 49-51, May/Jun. 2011.
-
(2011)
IEEE Security Privacy
, vol.9
, Issue.3
, pp. 49-51
-
-
Langner, R.1
-
85
-
-
62849122781
-
Securing vehicles against cyber attacks
-
Oak Ridge, TN, USA
-
U. E. Larson and D. K. Nilsson, "Securing vehicles against cyber attacks," in Proc. 4th Annu. Workshop Cyber Security Inf. Intell. Res. Develop. Strategies Meet Cyber Security Inf. Intell. Challenges Ahead (CSIIRW), Oak Ridge, TN, USA, 2008, pp. 1-30.
-
(2008)
Proc. 4th Annu. Workshop Cyber Security Inf. Intell. Res. Develop. Strategies Meet Cyber Security Inf. Intell. Challenges Ahead (CSIIRW)
, pp. 1-30
-
-
Larson, U.E.1
Nilsson, D.K.2
-
86
-
-
57749193296
-
An approach to specification-based attack detection for in-vehicle networks
-
Xi'an, China
-
U. E. Larson, D. K. Nilsson, and E. Jonsson, "An approach to specification-based attack detection for in-vehicle networks," in Proc. IEEE Intell. Veh. Symp., Xi'an, China, 2008, pp. 220-225.
-
(2008)
Proc. IEEE Intell. Veh. Symp.
, pp. 220-225
-
-
Larson, U.E.1
Nilsson, D.K.2
Jonsson, E.3
-
88
-
-
84946221802
-
Fuzzing can packets into automobiles
-
Gwangju, South Korea
-
H. Lee, K. Choi, K. Chung, J. Kim, and K. Yim, "Fuzzing can packets into automobiles," in Proc. IEEE 29th Int. Conf. Adv. Inf. Netw. Appl., Gwangju, South Korea, 2015, pp. 817-821.
-
(2015)
Proc. IEEE 29th Int. Conf. Adv. Inf. Netw. Appl.
, pp. 817-821
-
-
Lee, H.1
Choi, K.2
Chung, K.3
Kim, J.4
Yim, K.5
-
89
-
-
84155167716
-
Challenges and research directions in medical cyber-physical systems
-
Jan.
-
I. Lee et al., "Challenges and research directions in medical cyber-physical systems," Proc. IEEE, vol. 100, no. 1, pp. 75-90, Jan. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 75-90
-
-
Lee, I.1
-
91
-
-
84868520809
-
-
Darwin College, Univ. Cambridge, Cambridge, U.K.
-
E. P. Leverett, "Quantitatively assessing and visualising industrial system attack surfaces," Darwin College, Univ. Cambridge, Cambridge, U.K., 2011.
-
(2011)
Quantitatively Assessing and Visualising Industrial System Attack Surfaces
-
-
Leverett, E.P.1
-
92
-
-
80053973692
-
Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system
-
Columbia, MO, USA, Jun.
-
C. Li, A. Raghunathan, and N. K. Jha, "Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system," in Proc. 13th IEEE Int. Conf. e-Health Netw. Appl. Services (Healthcom), Columbia, MO, USA, Jun. 2011, pp. 150-156.
-
(2011)
Proc. 13th IEEE Int. Conf. E-Health Netw. Appl. Services (Healthcom)
, pp. 150-156
-
-
Li, C.1
Raghunathan, A.2
Jha, N.K.3
-
93
-
-
80051631772
-
Secure information aggregation for smart grids using homomorphic encryption
-
Gaithersburg, MD, USA
-
F. Li, B. Luo, and P. Liu, "Secure information aggregation for smart grids using homomorphic encryption," in Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Gaithersburg, MD, USA, 2010, pp. 327-332.
-
(2010)
Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm)
, pp. 327-332
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
94
-
-
84904127298
-
On false data injection attack against multistep electricity price in electricity market in smart grid
-
Atlanta, GA, USA
-
J. Lin, W. Yu, and X. Yang, "On false data injection attack against multistep electricity price in electricity market in smart grid," in Proc. IEEE Glob. Commun. Conf. (GLOBECOM), Atlanta, GA, USA, 2013, pp. 760-765.
-
(2013)
Proc. IEEE Glob. Commun. Conf. (GLOBECOM)
, pp. 760-765
-
-
Lin, J.1
Yu, W.2
Yang, X.3
-
95
-
-
85028751817
-
A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications
-
to be published
-
J. Lin et al., "A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications," IEEE Internet Things J., to be published.
-
IEEE Internet Things J.
-
-
Lin, J.1
-
96
-
-
84928820166
-
Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for smart grid attack detection
-
Aug.
-
T. Liu et al., "Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for smart grid attack detection," Future Gener. Comput. Syst., vol. 49, pp. 94-103, Aug. 2015.
-
(2015)
Future Gener. Comput. Syst.
, vol.49
, pp. 94-103
-
-
Liu, T.1
-
97
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," ACM Trans. Inf. Syst. Security (TISSEC), vol. 14, no. 1, 2011, Art. no. 13.
-
(2011)
ACM Trans. Inf. Syst. Security (TISSEC)
, vol.14
, Issue.1
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
98
-
-
79951648231
-
Review and evaluation of security threats on the communication networks in the smart grid
-
San Jose, CA, USA
-
Z. Lu, X. Lu, W. Wang, and C. Wang, "Review and evaluation of security threats on the communication networks in the smart grid," in Proc. Mil. Commun. Conf. MILCOM, San Jose, CA, USA, 2010, pp. 1830-1835.
-
(2010)
Proc. Mil. Commun. Conf. MILCOM
, pp. 1830-1835
-
-
Lu, Z.1
Lu, X.2
Wang, W.3
Wang, C.4
-
99
-
-
79960859827
-
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic
-
Shanghai, China
-
Z. Lu, W. Wang, and C. Wang, "From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic," in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 1871-1879.
-
(2011)
Proc. IEEE INFOCOM
, pp. 1871-1879
-
-
Lu, Z.1
Wang, W.2
Wang, C.3
-
101
-
-
84876948543
-
Cyber/physical security vulnerability assessment integration
-
Washington, DC, USA
-
D. MacDonald et al., "Cyber/physical security vulnerability assessment integration," in Proc. IEEE PES Innov. Smart Grid Technol. (ISGT), Washington, DC, USA, 2013, pp. 1-6.
-
(2013)
Proc. IEEE PES Innov. Smart Grid Technol. (ISGT)
, pp. 1-6
-
-
MacDonald, D.1
-
102
-
-
84155171697
-
Dnpsec: Distributed network protocol version 3 (DNP3) security framework
-
M. Majdalawieh, F. Parisi-Presicce, and D. Wijesekera, "Dnpsec: Distributed network protocol version 3 (DNP3) security framework," in Proc. Adv. Comput. Inf. Syst. Sci. Eng., 2006, pp. 227-234.
-
(2006)
Proc. Adv. Comput. Inf. Syst. Sci. Eng.
, pp. 227-234
-
-
Majdalawieh, M.1
Parisi-Presicce, F.2
Wijesekera, D.3
-
105
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
May/Jun.
-
P. McDaniel and S. McLaughlin, "Security and privacy challenges in the smart grid," IEEE Security Privacy, vol. 7, no. 3, pp. 75-77, May/Jun. 2009.
-
(2009)
IEEE Security Privacy
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
106
-
-
77952887452
-
Security technology for smart grid networks
-
Jun.
-
A. R. Metke and R. L. Ekl, "Security technology for smart grid networks," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 99-107, Jun. 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.1
, pp. 99-107
-
-
Metke, A.R.1
Ekl, R.L.2
-
107
-
-
84885889406
-
-
Microsoft Security TechCenter [Online]
-
Microsoft Security TechCenter. (2008). Microsoft Security Bulletin ms08-067 - Critical. [Online]. Available: https://technet.microsoft.com/library/security/ms08-067
-
(2008)
Microsoft Security Bulletin ms08-067 - Critical
-
-
-
108
-
-
85039171695
-
-
Microsoft Security TechCenter [Online]
-
Microsoft Security TechCenter. (2010). Microsoft Security Bulletin Summary for September 2010. [Online]. Available: https://technet.microsoft.com/library/security/ms10-sep
-
(2010)
Microsoft Security Bulletin Summary for September 2010
-
-
-
109
-
-
84869170873
-
A survey SCADA of and critical infrastructure incidents
-
Calgary, AB, Canada
-
B. Miller and D. Rowe, "A survey SCADA of and critical infrastructure incidents," in Proc. 1st Annu. Conf. Res. Inf. Technol., Calgary, AB, Canada, 2012, pp. 51-56.
-
(2012)
Proc. 1st Annu. Conf. Res. Inf. Technol.
, pp. 51-56
-
-
Miller, B.1
Rowe, D.2
-
110
-
-
84901675643
-
Adventures in automotive networks and control units
-
Aug.
-
C. Miller and C. Valasek, "Adventures in automotive networks and control units," A SANS Whitepaper, Aug. 2013.
-
(2013)
A SANS Whitepaper
-
-
Miller, C.1
Valasek, C.2
-
111
-
-
84944090367
-
A survey of remote automotive attack surfaces
-
C. Miller and C. Valasek, "A survey of remote automotive attack surfaces," Black Hat USA, 2014.
-
(2014)
Black Hat USA
-
-
Miller, C.1
Valasek, C.2
-
112
-
-
84953273645
-
Remote exploitation of an unaltered passenger vehicle
-
C. Miller and C. Valasek, "Remote exploitation of an unaltered passenger vehicle," Black Hat USA, 2015.
-
(2015)
Black Hat USA
-
-
Miller, C.1
Valasek, C.2
-
113
-
-
80052477688
-
Survivability analysis of mobile cyber physical systems with voting-based intrusion detection
-
Istanbul, Turkey
-
R. Mitchell and I.-R. Chen, "Survivability analysis of mobile cyber physical systems with voting-based intrusion detection," in Proc. Wireless Commun. Mobile Comput. Conf. (IWCMC), Istanbul, Turkey, 2011, pp. 2256-2261.
-
(2011)
Proc. Wireless Commun. Mobile Comput. Conf. (IWCMC)
, pp. 2256-2261
-
-
Mitchell, R.1
Chen, I.-R.2
-
114
-
-
84867805516
-
Behavior rule based intrusion detection for supporting secure medical cyber physical systems
-
Munich, Germany
-
R. Mitchell and I.-R. Chen, "Behavior rule based intrusion detection for supporting secure medical cyber physical systems," in Proc. Comput. Commun. Netw. (ICCCN), Munich, Germany, 2012, pp. 1-7.
-
(2012)
Proc. Comput. Commun. Netw. (ICCCN)
, pp. 1-7
-
-
Mitchell, R.1
Chen, I.-R.2
-
115
-
-
84874959990
-
Effect of intrusion detection and response on reliability of cyber physical systems
-
Mar.
-
R. Mitchell and I.-R. Chen, "Effect of intrusion detection and response on reliability of cyber physical systems," IEEE Trans. Rel., vol. 62, no. 1, pp. 199-210, Mar. 2013.
-
(2013)
IEEE Trans. Rel.
, vol.62
, Issue.1
, pp. 199-210
-
-
Mitchell, R.1
Chen, I.-R.2
-
116
-
-
84901192690
-
A survey of intrusion detection techniques for cyber-physical systems
-
R. Mitchell and I.-R. Chen, "A survey of intrusion detection techniques for cyber-physical systems," ACM Comput. Surveys, vol. 46, no. 4, 2014, Art. no. 55.
-
(2014)
ACM Comput. Surveys
, vol.46
, Issue.4
-
-
Mitchell, R.1
Chen, I.-R.2
-
117
-
-
84883281959
-
Behavior-rule based intrusion detection systems for safety critical smart grid applications
-
Sep.
-
R. Mitchell and I.-R. Chen, "Behavior-rule based intrusion detection systems for safety critical smart grid applications," IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1254-1263, Sep. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.3
, pp. 1254-1263
-
-
Mitchell, R.1
Chen, I.-R.2
-
118
-
-
84155167232
-
Cyber-physical security of a smart grid infrastructure
-
Jan.
-
Y. Mo et al., "Cyber-physical security of a smart grid infrastructure," Proc. IEEE, vol. 100, no. 1, pp. 195-209, Jan. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 195-209
-
-
Mo, Y.1
-
119
-
-
78650887542
-
Private memoirs of a smart meter
-
Zürich, Switzerland
-
A. Molina-Markham, P. Shenoy, K. Fu, E. Cecchet, and D. Irwin, "Private memoirs of a smart meter," in Proc. 2nd ACM Workshop Embedded Sens. Syst. Energy-Efficiency Build., Zürich, Switzerland, 2010, pp. 61-66.
-
(2010)
Proc. 2nd ACM Workshop Embedded Sens. Syst. Energy-Efficiency Build.
, pp. 61-66
-
-
Molina-Markham, A.1
Shenoy, P.2
Fu, K.3
Cecchet, E.4
Irwin, D.5
-
120
-
-
84867834950
-
Deconstructing flame: The limitations of traditional defences
-
K. Munro, "Deconstructing flame: The limitations of traditional defences," Comput. Fraud Security, vol. 2012, no. 10, pp. 8-11, 2012.
-
(2012)
Comput. Fraud Security
, vol.2012
, Issue.10
, pp. 8-11
-
-
Munro, K.1
-
121
-
-
71649109185
-
An experimental investigation of malware attacks on SCADA systems
-
I. N. Fovino, A. Carcano, M. Masera, and A. Trombetta, "An experimental investigation of malware attacks on SCADA systems," Int. J. Critical Infrastruct. Protect., vol. 2, no. 4, pp. 139-145, 2009.
-
(2009)
Int. J. Critical Infrastruct. Protect.
, vol.2
, Issue.4
, pp. 139-145
-
-
Fovino, I.N.1
Carcano, A.2
Masera, M.3
Trombetta, A.4
-
122
-
-
77952028560
-
Hackers have attacked foreign utilities, CIA analyst says
-
E. Nakashima and S. Mufson, "Hackers have attacked foreign utilities, CIA analyst says," Washington Post, 2008.
-
(2008)
Washington Post
-
-
Nakashima, E.1
Mufson, S.2
-
123
-
-
84857563249
-
Challenges in security for cyber-physical systems
-
Newark, NJ, USA
-
C. Neuman, "Challenges in security for cyber-physical systems," in Proc. DHS Workshop Future Directions Cyber-Phys. Syst. Security, Newark, NJ, USA, 2009, pp. 22-24.
-
(2009)
Proc. DHS Workshop Future Directions Cyber-Phys. Syst. Security
, pp. 22-24
-
-
Neuman, C.1
-
124
-
-
84861093550
-
SCADA security in the light of cyber-warfare
-
A. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke, "SCADA security in the light of cyber-warfare," Comput. Security, vol. 31, no. 4, pp. 418-436, 2012.
-
(2012)
Comput. Security
, vol.31
, Issue.4
, pp. 418-436
-
-
Nicholson, A.1
Webber, S.2
Dyer, S.3
Patel, T.4
Janicke, H.5
-
125
-
-
78650062267
-
-
[Online]
-
L. O. Murchu and N. Falliere. (2011). W32.Stuxnet Dossier. [Online]. Available: http://www.symantec.com/content/en/us/enterprise/media/ security%5C-response/whitepapers/w32%5C-stuxnet%5C-dossier.pdf
-
(2011)
W32.Stuxnet Dossier
-
-
Murchu, L.O.1
Falliere, N.2
-
126
-
-
84876748434
-
Vehicle ECU classification based on safety-security characteristics
-
Manchester, U.K.
-
D. K. Nilsson, P. H. Phung, and U. E. Larson, "Vehicle ECU classification based on safety-security characteristics," in Proc. IET Road Transp. Inf. Control RTIC, Manchester, U.K., 2008, pp. 1-7.
-
(2008)
Proc. IET Road Transp. Inf. Control RTIC
, pp. 1-7
-
-
Nilsson, D.K.1
Phung, P.H.2
Larson, U.E.3
-
127
-
-
79954605963
-
-
NIST Nistir, Gaithersburg, MD, USA, Tech. Rep. 7628
-
"Guidelines for smart grid cyber security," NIST Nistir, Gaithersburg, MD, USA, Tech. Rep. 7628, 2010.
-
(2010)
Guidelines for Smart Grid Cyber Security
-
-
-
128
-
-
85001075189
-
Wearable security: Key derivation for body area sensor networks based on host movement
-
D. Oberoi et al., "Wearable security: Key derivation for body area sensor networks based on host movement," in Proc. IEEE Ind. Electron. (ISIE), 2016, pp. 1116-1121.
-
(2016)
Proc. IEEE Ind. Electron. (ISIE)
, pp. 1116-1121
-
-
Oberoi, D.1
-
129
-
-
33746511443
-
SCADA security: A new concerning issue of an inhouse EGAT-SCADA
-
Dalian, China
-
T. Paukatong, "SCADA security: A new concerning issue of an inhouse EGAT-SCADA," in Proc. IEEE/PES Transm. Distrib. Conf. Exhibit. Asia-Pac., Dalian, China, 2005, pp. 1-5.
-
(2005)
Proc. IEEE/PES Transm. Distrib. Conf. Exhibit. Asia-Pac.
, pp. 1-5
-
-
Paukatong, T.1
-
130
-
-
85028151945
-
Potential cyberattacks on automated vehicles
-
Apr.
-
J. Petit and S. E. Shladover, "Potential cyberattacks on automated vehicles," IEEE Trans. Intell. Transp. Syst., vol. 16, no. 2, pp. 546-556, Apr. 2015.
-
(2015)
IEEE Trans. Intell. Transp. Syst.
, vol.16
, Issue.2
, pp. 546-556
-
-
Petit, J.1
Shladover, S.E.2
-
132
-
-
78650891506
-
Cybersecurity myths on power control systems: 21 misconceptions and false beliefs
-
Jan.
-
L. Piètre-Cambacédès, M. Tritschler, and G. N. Ericsson, "Cybersecurity myths on power control systems: 21 misconceptions and false beliefs," IEEE Trans. Power Del., vol. 26, no. 1, pp. 161-172, Jan. 2011.
-
(2011)
IEEE Trans. Power Del.
, vol.26
, Issue.1
, pp. 161-172
-
-
Piètre-Cambacédès, L.1
Tritschler, M.2
Ericsson, G.N.3
-
134
-
-
82155185205
-
Distributed Internet-based load altering attacks against smart power grids
-
Dec.
-
A. H. Mohsenian-Rad and A. Leon-Garcia, "Distributed Internet-based load altering attacks against smart power grids," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 667-674, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 667-674
-
-
Mohsenian-Rad, A.H.1
Leon-Garcia, A.2
-
135
-
-
84885876349
-
Hacking medical devices for fun and insulin: Breaking the human SCADA system
-
J. Radcliffe, "Hacking medical devices for fun and insulin: Breaking the human SCADA system," in Proc. Black Hat Conf. Presentation Slides, 2011.
-
(2011)
Proc. Black Hat Conf. Presentation Slides
-
-
Radcliffe, J.1
-
136
-
-
84861589650
-
Smartanalyzer: A noninvasive security threat analyzer for ami smart grid
-
Orlando, FL, USA, Mar.
-
M. A. Rahman, P. Bera, and E. Al-Shaer, "Smartanalyzer: A noninvasive security threat analyzer for ami smart grid," in Proc. IEEE INFOCOM, Orlando, FL, USA, Mar. 2012, pp. 2255-2263.
-
(2012)
Proc. IEEE INFOCOM
, pp. 2255-2263
-
-
Rahman, M.A.1
Bera, P.2
Al-Shaer, E.3
-
137
-
-
84880713047
-
-
U.S. Dept. Commerce, NIST, Gaithersburg, MD, USA, Tech. Rep.
-
R. S. Ross, "Guide for conducting risk assessments NIST special publication 800-30 revision 1," U.S. Dept. Commerce, NIST, Gaithersburg, MD, USA, Tech. Rep., 2012.
-
(2012)
Guide for Conducting Risk Assessments NIST Special Publication 800-30 Revision 1
-
-
Ross, R.S.1
-
138
-
-
84879868277
-
Balancing security and utility in medical devices?
-
Austin, TX, USA
-
M. Rostami, W. Burleson, F. Koushanfar, and A. Juels, "Balancing security and utility in medical devices?" in Proc. 50th Annu. Design Autom. Conf., Austin, TX, USA, 2013, Art. no. 13.
-
(2013)
Proc. 50th Annu. Design Autom. Conf.
-
-
Rostami, M.1
Burleson, W.2
Koushanfar, F.3
Juels, A.4
-
139
-
-
85040565418
-
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
-
Washington, DC, USA
-
I. Rouf et al., "Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study," in Proc. 19th USENIX Security Symp., Washington, DC, USA, 2010, pp. 11-13.
-
(2010)
Proc. 19th USENIX Security Symp.
, pp. 11-13
-
-
Rouf, I.1
-
140
-
-
84914104968
-
Sok: Security and privacy in implantable medical devices and body area networks
-
Berkeley, CA, USA
-
M. Rushanan, A. D. Rubin, D. F. Kune, and C. M. Swanson, "Sok: Security and privacy in implantable medical devices and body area networks," in Proc. IEEE Symp. Security Privacy (SP), Berkeley, CA, USA, 2014, pp. 524-539.
-
(2014)
Proc. IEEE Symp. Security Privacy (SP)
, pp. 524-539
-
-
Rushanan, M.1
Rubin, A.D.2
Kune, D.F.3
Swanson, C.M.4
-
141
-
-
71649085971
-
Reducing security vulnerabilities for critical infrastructure
-
D. H. Ryu, H. Kim, and K. Um, "Reducing security vulnerabilities for critical infrastructure," J. Loss Prevent. Process Ind., vol. 22, no. 6, pp. 1020-1024, 2009.
-
(2009)
J. Loss Prevent. Process Ind.
, vol.22
, Issue.6
, pp. 1020-1024
-
-
Ryu, D.H.1
Kim, H.2
Um, K.3
-
142
-
-
84885584568
-
Security challenges in automotive hardware/ software architecture design
-
Grenoble, France
-
F. Sagstetter et al., "Security challenges in automotive hardware/ software architecture design," in Proc. Conf. Design Autom. Test Europe, Grenoble, France, 2013, pp. 458-463.
-
(2013)
Proc. Conf. Design Autom. Test Europe
, pp. 458-463
-
-
Sagstetter, F.1
-
144
-
-
84978471938
-
Secure key-exchange protocol for implants using heartbeats
-
Como, Italy
-
R. M. Seepers, J. H.Weber, Z. Erkin, I. Sourdis, and C. Strydis, "Secure key-exchange protocol for implants using heartbeats," in Proc. ACM Int. Conf. Comput. Front., Como, Italy, 2016, pp. 119-126.
-
(2016)
Proc. ACM Int. Conf. Comput. Front.
, pp. 119-126
-
-
Seepers, R.M.1
Weber, J.H.2
Erkin, Z.3
Sourdis, I.4
Strydis, C.5
-
145
-
-
84914128714
-
Secure automotive gateway - Secure communication for future cars
-
Porto Alegre, Brazil
-
S. Seifert and R. Obermaisser, "Secure automotive gateway - Secure communication for future cars," in Proc. IEEE Int. Conf. Ind. Inf., Porto Alegre, Brazil, 2014, pp. 213-220.
-
(2014)
Proc. IEEE Int. Conf. Ind. Inf.
, pp. 213-220
-
-
Seifert, S.1
Obermaisser, R.2
-
146
-
-
85039170807
-
-
[Online]
-
R. Setola. (2011). Cyber Threats to SCADA Systems. [Online]. Available: http://panzieri.dia.uniroma3.it/MICIE/docs/Setola%20WS% 20Micie%202011.pdf
-
(2011)
Cyber Threats to SCADA Systems
-
-
Setola, R.1
-
147
-
-
85024385702
-
Non-invasive spoofing attacks for anti-lock braking systems
-
Berlin, Germany: Springer
-
Y. Shoukry, P. Martin, P. Tabuada, and M. Srivastava, "Non-invasive spoofing attacks for anti-lock braking systems," in Cryptographic Hardware and Embedded Systems. Berlin, Germany: Springer, 2013.
-
(2013)
Cryptographic Hardware and Embedded Systems
-
-
Shoukry, Y.1
Martin, P.2
Tabuada, P.3
Srivastava, M.4
-
148
-
-
84954099736
-
PyCRa: Physical challenge-response authentication for active sensors under spoofing attacks
-
Denver, CO, USA
-
Y. Shoukry, P. Martin, Y. Yona, S. Diggavi, and M. Srivastava, "PyCRa: Physical challenge-response authentication for active sensors under spoofing attacks," in Proc. 22nd ACM Conf. Comput. Commun. Security, Denver, CO, USA, 2015, pp. 1004-1015.
-
(2015)
Proc. 22nd ACM Conf. Comput. Commun. Security
, pp. 1004-1015
-
-
Shoukry, Y.1
Martin, P.2
Yona, Y.3
Diggavi, S.4
Srivastava, M.5
-
149
-
-
36249010910
-
Lessons learned from the Maroochy water breach
-
MA, USA: Springer
-
J. Slay and M. Miller, "Lessons learned from the Maroochy water breach," in Critical Infrastructure Protection. Boston, MA, USA: Springer, 2007, pp. 73-82.
-
(2007)
Critical Infrastructure Protection. Boston
, pp. 73-82
-
-
Slay, J.1
Miller, M.2
-
150
-
-
78649548146
-
SCADA system cyber security - A comparison of standards
-
Providence, RI, USA
-
T. Sommestad, G. N. Ericsson, and J. Nordlander, "SCADA system cyber security - A comparison of standards," in Proc. IEEE Power Energy Soc. Gener. Meeting, Providence, RI, USA, 2010, pp. 1-8.
-
(2010)
Proc. IEEE Power Energy Soc. Gener. Meeting
, pp. 1-8
-
-
Sommestad, T.1
Ericsson, G.N.2
Nordlander, J.3
-
151
-
-
84155167085
-
Cyber-physical system security for the electric power grid
-
Jan.
-
S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid," Proc. IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
152
-
-
1842829828
-
-
NIST, Gaithersburg, MD, USA, Tech. Rep. Sp 800-30
-
G. Stoneburner, A. Y. Goguen, and A. Feringa, "Risk management guide for information technology systems," NIST, Gaithersburg, MD, USA, Tech. Rep. Sp 800-30, 2002.
-
(2002)
Risk Management Guide for Information Technology Systems
-
-
Stoneburner, G.1
Goguen, A.Y.2
Feringa, A.3
-
153
-
-
84898399610
-
-
NIST, Gaithersburg, MD, USA, Tech. Rep. Sp 800-82
-
K. A. Stouffer, J. A. Falco, and K. A. Scarfone, "Guide to industrial control systems (ICS) security: Supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic controllers (PLC)," NIST, Gaithersburg, MD, USA, Tech. Rep. Sp 800-82, 2011.
-
(2011)
Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations Such As Programmable Logic Controllers (PLC)
-
-
Stouffer, K.A.1
Falco, J.A.2
Scarfone, K.A.3
-
154
-
-
85039171889
-
Security of embedded automotive networks: State of the art and a research proposal
-
Toulouse, France
-
I. Studnia et al., "Security of embedded automotive networks: State of the art and a research proposal," in Proc. 2nd Workshop Crit. Autom. Appl. Robustness Safety, Toulouse, France, 2013.
-
(2013)
Proc. 2nd Workshop Crit. Autom. Appl. Robustness Safety
-
-
Studnia, I.1
-
155
-
-
84885965762
-
Survey on security threats and protection mechanisms in embedded automotive networks
-
Budapest, Hungary
-
I. Studnia et al., "Survey on security threats and protection mechanisms in embedded automotive networks," in Proc. Depend. Syst. Netw. Workshop, Budapest, Hungary, 2013, pp. 1-12.
-
(2013)
Proc. Depend. Syst. Netw. Workshop
, pp. 1-12
-
-
Studnia, I.1
-
156
-
-
84969389897
-
-
Symantec Security Response, [Online]
-
Symantec Security Response. (2014). Dragonfly: Western Energy Companies Under Sabotage Threat. [Online]. Available: http://www.symantec.com/connect/blogs/dragonfly-western-energycompanies-under-sabotage-threat
-
(2014)
Dragonfly: Western Energy Companies under Sabotage Threat
-
-
-
157
-
-
84971330353
-
Frequency-based anomaly detection for the automotive can bus
-
London, U.K.
-
A. Taylor, N. Japkowicz, and S. Leblanc, "Frequency-based anomaly detection for the automotive can bus," in Proc. World Congr. Ind. Control Syst. Security, London, U.K., 2015, pp. 45-49.
-
(2015)
Proc. World Congr. Ind. Control Syst. Security
, pp. 45-49
-
-
Taylor, A.1
Japkowicz, N.2
Leblanc, S.3
-
160
-
-
84874293568
-
Supervisory command and data acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbed
-
Orlando, FL, USA
-
V. Urias, B. Van Leeuwen, and B. Richardson, "Supervisory command and data acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbed," in Proc. Mil. Commun. Conf. MILCOM, Orlando, FL, USA, 2012, pp. 1-8.
-
(2012)
Proc. Mil. Commun. Conf. MILCOM
, pp. 1-8
-
-
Urias, V.1
Van Leeuwen, B.2
Richardson, B.3
-
161
-
-
84861097886
-
-
[Online]
-
US-CERT. (2009). Cyber Threat Source Descriptions. [Online]. Available: https://ics-cert.us-cert.gov/content/cyber-threat-sourcedescriptions
-
(2009)
Cyber Threat Source Descriptions
-
-
-
163
-
-
84873320171
-
Authentication and authorization mechanisms for substation automation in smart grid network
-
Jan./Feb.
-
B. Vaidya, D. Makrakis, and H. T. Mouftah, "Authentication and authorization mechanisms for substation automation in smart grid network," IEEE Netw., vol. 27, no. 1, pp. 5-11, Jan./Feb. 2013.
-
(2013)
IEEE Netw.
, vol.27
, Issue.1
, pp. 5-11
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.T.3
-
164
-
-
84875747087
-
Cyber security in the smart grid: Survey and challenges
-
W. Wang and Z. Lu, "Cyber security in the smart grid: Survey and challenges," Comput. Netw., vol. 57, no. 5, pp. 1344-1371, 2013.
-
(2013)
Comput. Netw.
, vol.57
, Issue.5
, pp. 1344-1371
-
-
Wang, W.1
Lu, Z.2
-
165
-
-
33644591555
-
Wireless security threat taxonomy
-
West Point, NY, USA
-
D. Welch and S. Lathrop, "Wireless security threat taxonomy," in Proc. IEEE Syst. Man Cybern. Soc. Inf. Assurance Workshop,West Point, NY, USA, 2003, pp. 76-83.
-
(2003)
Proc. IEEE Syst. Man Cybern. Soc. Inf. Assurance Workshop
, pp. 76-83
-
-
Welch, D.1
Lathrop, S.2
-
167
-
-
84864682117
-
Design, implementation, and evaluation of a vehicular hardware security module
-
Berlin, Germany: Springer
-
M. Wolf and T. Gendrullis, "Design, implementation, and evaluation of a vehicular hardware security module," in Information Security and Cryptology-ICISC 2011. Berlin, Germany: Springer, 2012, pp. 302-318.
-
(2012)
Information Security and Cryptology-ICISC 2011
, pp. 302-318
-
-
Wolf, M.1
Gendrullis, T.2
-
169
-
-
85027931391
-
A practical wireless attack on the connected car and security protocol for in-vehicle can
-
Apr.
-
S. Woo, H. J. Jo, and D. H. Lee, "A practical wireless attack on the connected car and security protocol for in-vehicle can," IEEE Trans. Intell. Transp. Syst., vol. 16, no. 2, pp. 993-1006, Apr. 2015.
-
(2015)
IEEE Trans. Intell. Transp. Syst.
, vol.16
, Issue.2
, pp. 993-1006
-
-
Woo, S.1
Jo, H.J.2
Lee, D.H.3
-
170
-
-
85039149931
-
Introduction to cyber-physical system security: A cross-layer perspective
-
to be published
-
J. Wurm et al., "Introduction to cyber-physical system security: A cross-layer perspective," IEEE Trans. Multi-Scale Comput. Syst., to be published.
-
IEEE Trans. Multi-Scale Comput. Syst.
-
-
Wurm, J.1
-
171
-
-
79955998041
-
False data injection attacks in electricity markets
-
Gaithersburg, MD, USA
-
L. Xie, Y. Mo, and B. Sinopoli, "False data injection attacks in electricity markets," in Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Gaithersburg, MD, USA, 2010, pp. 226-231.
-
(2010)
Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm)
, pp. 226-231
-
-
Xie, L.1
Mo, Y.2
Sinopoli, B.3
-
172
-
-
79960873920
-
Imdguard: Securing implantable medical devices with the external wearable guardian
-
Shanghai, China, Apr.
-
F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li, "Imdguard: Securing implantable medical devices with the external wearable guardian," in Proc. IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 1862-1870.
-
(2011)
Proc. IEEE INFOCOM
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.C.3
Wang, B.4
Li, Q.5
-
173
-
-
85052566153
-
A unified framework for secured energy resource management in smart grid
-
Boca Raton, FL, USA: CRC Press
-
G. Xu, P. Moulema, L. Ge, H. Song, and W. Yu, "A unified framework for secured energy resource management in smart grid," in Smart Grid: Networking, Data Management, and Business Models. Boca Raton, FL, USA: CRC Press, 2016, pp. 73-96.
-
(2016)
Smart Grid: Networking, Data Management, and Business Models
, pp. 73-96
-
-
Xu, G.1
Moulema, P.2
Ge, L.3
Song, H.4
Yu, W.5
-
174
-
-
84877598718
-
Taxonomy for description of cross-domain attacks on CPS
-
Philadelphia, PA, USA
-
M. Yampolskiy, P. Horvath, X. D. Koutsoukos, Y. Xue, and J. Sztipanovits, "Taxonomy for description of cross-domain attacks on CPS," in Proc. 2nd ACM Int. Conf. High Confidence Netw. Syst., Philadelphia, PA, USA, 2013, pp. 135-142.
-
(2013)
Proc. 2nd ACM Int. Conf. High Confidence Netw. Syst.
, pp. 135-142
-
-
Yampolskiy, M.1
Horvath, P.2
Koutsoukos, X.D.3
Xue, Y.4
Sztipanovits, J.5
-
175
-
-
84883332180
-
A survey on cyber security for smart grid communications
-
4th Quart.
-
Y. Yan, Y. Qian, H. Sharif, and D. Tipper, "A survey on cyber security for smart grid communications," IEEE Commun. Surveys Tuts., vol. 14, no. 4, pp. 998-1010, 4th Quart., 2012.
-
(2012)
IEEE Commun. Surveys Tuts.
, vol.14
, Issue.4
, pp. 998-1010
-
-
Yan, Y.1
Qian, Y.2
Sharif, H.3
Tipper, D.4
-
176
-
-
84964896253
-
On false data injection attacks against Kalman filtering in power system dynamic state estimation
-
Q. Yang, L. Chang, and W. Yu, "On false data injection attacks against Kalman filtering in power system dynamic state estimation," Security Commun. Netw., vol. 9, no. 9, pp. 833-849, 2016.
-
(2016)
Security Commun. Netw.
, vol.9
, Issue.9
, pp. 833-849
-
-
Yang, Q.1
Chang, L.2
Yu, W.3
-
177
-
-
84894537318
-
On false data-injection attacks against power system state estimation: Modeling and countermeasures
-
Mar.
-
Q. Yang et al., "On false data-injection attacks against power system state estimation: Modeling and countermeasures," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 3, pp. 717-729, Mar. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.3
, pp. 717-729
-
-
Yang, Q.1
-
178
-
-
84919466772
-
A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems
-
Jan.
-
X. Yang et al., "A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems," IEEE Trans. Comput., vol. 64, no. 1, pp. 4-18, Jan. 2015.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.1
, pp. 4-18
-
-
Yang, X.1
-
179
-
-
84919339871
-
An integrated detection system against false data injection attacks in the smart grid
-
W. Yu, D. Griffith, L. Ge, S. Bhattarai, and N. Golmie, "An integrated detection system against false data injection attacks in the smart grid," Security Commun. Netw., vol. 8, no. 2, pp. 91-109, 2015.
-
(2015)
Security Commun. Netw.
, vol.8
, Issue.2
, pp. 91-109
-
-
Yu, W.1
Griffith, D.2
Ge, L.3
Bhattarai, S.4
Golmie, N.5
-
180
-
-
80055005133
-
Myth or reality - Does the aurora vulnerability pose a risk to my generator?
-
College Station, TX, USA
-
M. Zeller, "Myth or reality - Does the aurora vulnerability pose a risk to my generator?" in Proc. 64th Annu. Conf. Protect. Relay Eng., College Station, TX, USA, 2011, pp. 130-136.
-
(2011)
Proc. 64th Annu. Conf. Protect. Relay Eng.
, pp. 130-136
-
-
Zeller, M.1
-
181
-
-
84959857821
-
Encryption for implantable medical devices using modified one-time pads
-
Jun.
-
G. Zheng, G. Fang, R. Shankaran, and M. A. Orgun, "Encryption for implantable medical devices using modified one-time pads," IEEE Access, vol. 3, pp. 825-836, Jun. 2015.
-
(2015)
IEEE Access
, vol.3
, pp. 825-836
-
-
Zheng, G.1
Fang, G.2
Shankaran, R.3
Orgun, M.A.4
-
182
-
-
84857516371
-
A taxonomy of cyber attacks on SCADA systems
-
Dalian, China
-
B. Zhu, A. Joseph, and S. Sastry, "A taxonomy of cyber attacks on SCADA systems," in Proc. Int. Conf. Internet Things 4th Int. Conf. Cyber Phys. Soc. Comput., Dalian, China, 2011, pp. 380-388.
-
(2011)
Proc. Int. Conf. Internet Things 4th Int. Conf. Cyber Phys. Soc. Comput.
, pp. 380-388
-
-
Zhu, B.1
Joseph, A.2
Sastry, S.3
-
183
-
-
84893445259
-
Scada-specific intrusion detection/prevention systems: A survey and taxonomy
-
Stockholm, Sweden
-
B. Zhu and S. Sastry, "Scada-specific intrusion detection/prevention systems: A survey and taxonomy," in Proc. 1st Workshop Secure Control Syst. (SCS), Stockholm, Sweden, 2010.
-
(2010)
Proc. 1st Workshop Secure Control Syst. (SCS)
-
-
Zhu, B.1
Sastry, S.2
|