-
1
-
-
77953688880
-
A security analysis for wireless sensor mesh networks in highly critical systems
-
Alcaraz, C. and Lopez, J. (2010). A security analysis for wireless sensor mesh networks in highly critical systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 40(4):419-428.
-
(2010)
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
, vol.40
, Issue.4
, pp. 419-428
-
-
Alcaraz, C.1
Lopez, J.2
-
2
-
-
84876124711
-
Wide-area situational awareness for critical infrastructure protection
-
Alcaraz, C. and Lopez, J. (2013). Wide-area situational awareness for critical infrastructure protection. IEEE Computer, 46(4):30-37.
-
(2013)
IEEE Computer
, vol.46
, Issue.4
, pp. 30-37
-
-
Alcaraz, C.1
Lopez, J.2
-
3
-
-
84887937959
-
Critical control system protection in the 21st century: Threats and solutions
-
Alcaraz, C. and Zeadally, S. (2013). Critical control system protection in the 21st century: Threats and solutions. IEEE Computer, 46(10):74-83.
-
(2013)
IEEE Computer
, vol.46
, Issue.10
, pp. 74-83
-
-
Alcaraz, C.1
Zeadally, S.2
-
4
-
-
85029447874
-
-
[Online; Accessed March 2017]
-
AlertEnterprise (2017). Sentry CyberSCADA. http://www.alertenterprise.com/products-EnterpriseSentryCybersecuritySCADA.php. [Online; Accessed March 2017].
-
(2017)
Sentry CyberSCADA
-
-
-
5
-
-
85029408367
-
-
[Online; Accessed March 2017]
-
Attivo Networks (2017). BOTsink. https://attivonetworks.com/product/attivo-botsink/. [Online; Accessed March 2017].
-
(2017)
BOTsink
-
-
-
6
-
-
85015292005
-
Towards a cds-based intrusion detection deployment scheme for securing industrial wireless sensor networks
-
Bayou, L., Cuppens-Boulahia, N., Espès, D., and Cuppen, F. (2016). Towards a cds-based intrusion detection deployment scheme for securing industrial wireless sensor networks. In 2016 11th International Conference on Availability, Reliability and Security (ARES), pages 157-166.
-
(2016)
2016 11th International Conference on Availability, Reliability and Security (ARES
, pp. 157-166
-
-
Bayou, L.1
Cuppens-Boulahia, N.2
Espès, D.3
Cuppen, F.4
-
7
-
-
84894646147
-
Network anomaly detection: Methods
-
Bhuyan, M. H., Bhattacharyya, D. K., and Kalita, J. K. (2014). Network anomaly detection: methods, systems and tools. Ieee communications surveys & tutorials, 16(1):303-336.
-
(2014)
Systems and Tools. Ieee Communications Surveys & Tutorials
, vol.16
, Issue.1
, pp. 303-336
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
9
-
-
85029448151
-
Specification mining for intrusion detection in networked control systems
-
USENIX Association
-
Caselli, M., Zambon, E., Amann, J., Sommer, R., and Kargl, F. (2016). Specification mining for intrusion detection in networked control systems. In 25th USENIX Security Symposium, pages 791-806. USENIX Association.
-
(2016)
25th USENIX Security Symposium
, pp. 791-806
-
-
Caselli, M.1
Zambon, E.2
Amann, J.3
Sommer, R.4
Kargl, F.5
-
10
-
-
85046615690
-
Cyber stealth attacks in critical information infrastructures
-
Cazorla, L., Alcaraz, C., and Lopez, J. (2016). Cyber stealth attacks in critical information infrastructures. IEEE Systems Journal, pages 1-15.
-
(2016)
IEEE Systems Journal
, pp. 1-15
-
-
Cazorla, L.1
Alcaraz, C.2
Lopez, J.3
-
11
-
-
85026917680
-
Detection of attacks based on known vulnerabilities in industrial networked systems
-
In Press
-
Cheminod, M., Durante, L., Seno, L., and Valenzano, A. (2016). Detection of attacks based on known vulnerabilities in industrial networked systems. Journal of Information Security and Applications. In Press.
-
(2016)
Journal of Information Security and Applications
-
-
Cheminod, M.1
Durante, L.2
Seno, L.3
Valenzano, A.4
-
12
-
-
84907351844
-
A study on advanced persistent threats
-
Springer
-
Chen, P., Desmet, L., and Huygens, C. (2014). A study on advanced persistent threats. In IFIP International Conference on Communications and Multimedia Security, pages 63-72. Springer.
-
(2014)
IFIP International Conference on Communications and Multimedia Security
, pp. 63-72
-
-
Chen, P.1
Desmet, L.2
Huygens, C.3
-
13
-
-
85029404496
-
-
[Online; Accessed March 2017]
-
CISCO Systems (2017). CISCO: Protecting ICS with Industrial Signatures. http://www.cisco.com/c/en/us/about/securitycenter/protecting-industrial-control-systemsnetworks-ips.html. [Online; Accessed March 2017].
-
(2017)
CISCO: Protecting ICS with Industrial Signatures
-
-
-
14
-
-
85029449676
-
-
[Online; Accessed March 2017]
-
Control-See (2017). UCME-OPC. http://www.controlsee.com/u-c-me-opc/. [Online; Accessed March 2017].
-
(2017)
UCME-OPC
-
-
-
15
-
-
85029458963
-
-
[Online; Accessed March 2017]
-
Cyberbit (2017). SCADAShield. https://www.cyberbit.net/solutions/ics-scadasecurity-continuity/. [Online; Accessed March 2017].
-
(2017)
SCADAShield
-
-
-
16
-
-
85029443882
-
-
[Online; Accessed March 2017]
-
CyberX (2017). XSense. https://cyberxlabs.com/en/xsense/. [Online; Accessed March 2017].
-
(2017)
XSense
-
-
-
17
-
-
85029416353
-
-
[Online; Accessed March 2017]
-
DarkTrace (2017). Enterprise Immune System. https://www.darktrace.com/technology/#enterpriseimmune-system. [Online; Accessed March 2017].
-
(2017)
Enterprise Immune System
-
-
-
19
-
-
84991780822
-
Detecting plc control corruption via on-device runtime verification
-
Garcia, L., Zonouz, S., Wei, D., and de Aguiar, L. P. (2016). Detecting plc control corruption via on-device runtime verification. In 2016 Resilience Week (RWS), pages 67-72.
-
(2016)
2016 Resilience Week (RWS
, pp. 67-72
-
-
Garcia, L.1
Zonouz, S.2
Wei, D.3
De Aguiar, L.P.4
-
20
-
-
85001858107
-
Hamids: Hierarchical monitoring intrusion detection system for industrial control systems
-
New York, NY, USA. ACM
-
Ghaeini, H. R. and Tippenhauer, N. O. (2016). Hamids: Hierarchical monitoring intrusion detection system for industrial control systems. In Proceedings of the 2Nd ACMWorkshop on Cyber-Physical Systems Security and Privacy (CPS-SPC'16), pages 103-111, New York, NY, USA. ACM.
-
(2016)
Proceedings of the 2Nd ACMWorkshop on Cyber-Physical Systems Security and Privacy (CPS-SPC'16
, pp. 103-111
-
-
Ghaeini, H.R.1
Tippenhauer, N.O.2
-
22
-
-
84906342007
-
Taxonomy of anomaly based intrusion detection system: A review
-
Gyanchandani, M., Rana, J., and Yadav, R. (2012). Taxonomy of anomaly based intrusion detection system: a review. International Journal of Scientific and Research Publications, 2(12):1-13.
-
(2012)
International Journal of Scientific and Research Publications
, vol.2
, Issue.12
, pp. 1-13
-
-
Gyanchandani, M.1
Rana, J.2
Yadav, R.3
-
24
-
-
85029408379
-
-
[Online; Accessed March 2017]
-
Halo Analytics (2017). Halo Vision. https://www.haloanalytics.com/. [Online; Accessed March 2017].
-
(2017)
Halo Vision
-
-
-
25
-
-
85029429924
-
-
[Online; Accessed March 2017]
-
HeSec (2017). HeSec Smart Agents. http://hesec.com/products/. [Online; Accessed March 2017].
-
(2017)
HeSec Smart Agents
-
-
-
26
-
-
85007188543
-
-
[Online; Accessed March 2017]
-
ICS-CERT (2016). Overview of Cyber Vulnerabilities. http://ics-cert.us-cert.gov/content/overviewcyber-vulnerabilities. [Online; Accessed March 2017].
-
(2016)
Overview of Cyber Vulnerabilities
-
-
-
27
-
-
85029408027
-
-
[Online; Accessed March 2017]
-
ICS2 (2017). ICS2 On-Guard. http://ics2.com/productsolution/. [Online; Accessed March 2017].
-
(2017)
ICS2 On-Guard
-
-
-
28
-
-
85001820446
-
Senami: Selective non-invasive active monitoring for ics intrusion detection
-
New York, NY, USA. ACM
-
Jardine, W., Frey, S., Green, B., and Rashid, A. (2016). Senami: Selective non-invasive active monitoring for ics intrusion detection. In Proceedings of the 2Nd ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC'16), pages 23-34, New York, NY, USA. ACM.
-
(2016)
Proceedings of the 2Nd ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC'16
, pp. 23-34
-
-
Jardine, W.1
Frey, S.2
Green, B.3
Rashid, A.4
-
29
-
-
85029449972
-
-
Industrial Internet Consortium Report
-
Joshi, R., Didier, P., Jimenez, J., and Carey, T. (2017). The Industrial Internet of Things Volume G5: Connectivity Framework. Industrial Internet Consortium Report.
-
(2017)
The Industrial Internet of Things Volume G5: Connectivity Framework
-
-
Joshi, R.1
Didier, P.2
Jimenez, J.3
Carey, T.4
-
30
-
-
84978795140
-
Behaviour-based attack detection and classification in cyber physical systems using machine learning
-
New York, NY, USA. ACM
-
Junejo, K. N. and Goh, J. (2016). Behaviour-based attack detection and classification in cyber physical systems using machine learning. In Proceedings of the 2Nd ACM International Workshop on Cyber-Physical System Security (CPSS'16), pages 34-43, New York, NY, USA. ACM.
-
(2016)
Proceedings of the 2Nd ACM International Workshop on Cyber-Physical System Security (CPSS'16
, pp. 34-43
-
-
Junejo, K.N.1
Goh, J.2
-
33
-
-
79957616447
-
Stuxnet: Dissecting a cyberwarfare weapon
-
Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy, 9(3):49-51.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.3
, pp. 49-51
-
-
Langner, R.1
-
34
-
-
85029438471
-
-
[Online; Accessed March 2017]
-
Leidos (2016). Insider Threat Detection Platform-Wisdom ITI. https://cyber.leidos.com/products/insider-threatdetection. [Online; Accessed March 2017].
-
(2016)
Insider Threat Detection Platform-Wisdom ITI
-
-
-
35
-
-
85029447579
-
Threat landscape and good practice guide for internet infrastructure
-
Lévy-Bencheton, C., Marinos, L., Mattioli, R., King, T., Dietzel, C., Jan, S., et al. (2015). Threat landscape and good practice guide for internet infrastructure. Report, European Union Agency for Network and Information Security (ENISA).
-
(2015)
Report, European Union Agency for Network and Information Security (ENISA
-
-
Lévy-Bencheton, C.1
Marinos, L.2
Mattioli, R.3
King, T.4
Dietzel, C.5
Jan, S.6
-
37
-
-
63349106731
-
Sidd: A framework for detecting sensitive data exfiltration by an insider attack
-
Liu, Y., Corbett, C., Chiang, K., Archibald, R., Mukherjee, B., and Ghosal, D. (2009). Sidd: A framework for detecting sensitive data exfiltration by an insider attack. In 42nd Hawaii International Conference on System Sciences, pages 1-10.
-
(2009)
42nd Hawaii International Conference on System Sciences
, pp. 1-10
-
-
Liu, Y.1
Corbett, C.2
Chiang, K.3
Archibald, R.4
Mukherjee, B.5
Ghosal, D.6
-
38
-
-
84962184075
-
Remotely inferring device manipulation of industrial control systems via network behavior
-
Lontorfos, G., Fairbanks, K. D., Watkins, L., and Robinson, W. H. (2015). Remotely inferring device manipulation of industrial control systems via network behavior. In IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops'15), pages 603-610.
-
(2015)
IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops'15
, pp. 603-610
-
-
Lontorfos, G.1
Fairbanks, K.D.2
Watkins, L.3
Robinson, W.H.4
-
39
-
-
84921378651
-
Monitoring security of networked control systems: It's the physics
-
McParland, C., Peisert, S., and Scaglione, A. (2014). Monitoring security of networked control systems: It's the physics. IEEE Security Privacy, 12(6):32-39.
-
(2014)
IEEE Security Privacy
, vol.12
, Issue.6
, pp. 32-39
-
-
McParland, C.1
Peisert, S.2
Scaglione, A.3
-
40
-
-
85029422860
-
-
[Online; Accessed March 2017]
-
Mission Secure (2017). MSi Secure Sentinel Platform. http://www.missionsecure.com/solutions/. [Online; Accessed March 2017].
-
(2017)
MSi Secure Sentinel Platform
-
-
-
41
-
-
0013347631
-
-
[Online; Accessed March 2017]
-
Mitre (2017). Common Vulnerabilities and Exposures. https://cve.mitre.org/. [Online; Accessed March 2017].
-
(2017)
Common Vulnerabilities and Exposures
-
-
-
42
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
IEEE
-
Moser, A., Kruegel, C., and Kirda, E. (2007). Exploring multiple execution paths for malware analysis. In Security and Privacy, 2007. SP'07. IEEE Symposium on, pages 231-245. IEEE.
-
(2007)
Security and Privacy, 2007. SP'07 IEEE Symposium on
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
43
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
Patcha, A. and Park, J.-M. (2007). An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer networks, 51(12):3448-3470.
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
44
-
-
84963984264
-
Industrial control system network intrusion detection by telemetry analysis
-
Ponomarev, S. and Atkison, T. (2016). Industrial control system network intrusion detection by telemetry analysis. IEEE Transactions on Dependable and Secure Computing, 13(2):252-260.
-
(2016)
IEEE Transactions on Dependable and Secure Computing
, vol.13
, Issue.2
, pp. 252-260
-
-
Ponomarev, S.1
Atkison, T.2
-
45
-
-
84885616228
-
Structural controllability of multi-agent networks: Robustness against simultaneous failures
-
Rahimian, M. A. and Aghdam, A. G. (2013). Structural controllability of multi-agent networks: Robustness against simultaneous failures. Automatica, 49(11):3149-3157.
-
(2013)
Automatica
, vol.49
, Issue.11
, pp. 3149-3157
-
-
Rahimian, M.A.1
Aghdam, A.G.2
-
46
-
-
84944088568
-
Security and privacy challenges in industrial internet of things
-
New York, NY, USA ACM
-
Sadeghi, A.-R., Wachsmann, C., and Waidner, M. (2015). Security and privacy challenges in industrial internet of things. In Proceedings of the 52Nd Annual Design Automation Conference, DAC '15, pages 54:1-54:6, New York, NY, USA. ACM.
-
(2015)
Proceedings of the 52Nd Annual Design Automation Conference, DAC '15
, pp. 541-546
-
-
Sadeghi, A.-R.1
Wachsmann, C.2
Waidner, M.3
-
47
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
ACM
-
Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A., Yang, H., and Zhou, S. (2002). Specification-based anomaly detection: a new approach for detecting network intrusions. In Proceedings of the 9th ACM conference on Computer and communications security, pages 265-274. ACM.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 265-274
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
49
-
-
85029425707
-
-
[Online; Accessed March 2017]
-
Siemens (2017). SIMATIC OPC UA. http://www.industry.siemens.com/topics/global/en/tiaportal/software/details/pages/opc-ua.aspx. [Online; Accessed March 2017].
-
(2017)
SIMATIC OPC UA
-
-
-
50
-
-
85029449580
-
-
[Online; Accessed March 2017]
-
SIGA (2017). SIGA Guard. http://www.sigasec.com. [Online; Accessed March 2017].
-
(2017)
SIGA Guard
-
-
-
51
-
-
85073085170
-
A comprehensive study on apt attacks and countermeasures for future networks and communications: Challenges and solutions
-
Singh, S., Sharma, P. K., Moon, S. Y., Moon, D., and Park, J. H. (2016). A comprehensive study on apt attacks and countermeasures for future networks and communications: challenges and solutions. The Journal of Supercomputing, pages 1-32.
-
(2016)
The Journal of Supercomputing
, pp. 1-32
-
-
Singh, S.1
Sharma, P.K.2
Moon, S.Y.3
Moon, D.4
Park, J.H.5
-
52
-
-
84929282641
-
Detecting anomalous programmable logic controller behavior using rf-based hilbert transform features and a correlation-based verification process
-
Stone, S. J., Temple, M. A., and Baldwin, R. O. (2015). Detecting anomalous programmable logic controller behavior using rf-based hilbert transform features and a correlation-based verification process. International Journal of Critical Infrastructure Protection, 9:41-51.
-
(2015)
International Journal of Critical Infrastructure Protection
, vol.9
, pp. 41-51
-
-
Stone, S.J.1
Temple, M.A.2
Baldwin, R.O.3
-
53
-
-
84935007320
-
-
International Journal of Distributed Sensor Networks
-
Sun, Y., Zhang, J., Xiong, Y., and Zhu, G. (2014). Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks.
-
(2014)
Data Security and Privacy in Cloud Computing
-
-
Sun, Y.1
Zhang, J.2
Xiong, Y.3
Zhu, G.4
-
54
-
-
84984969085
-
-
Technical report
-
Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A., and Richardson, M. (2015). A security threat analysis for the routing protocol for low-power and lossy networks (rpls). Technical report.
-
(2015)
A Security Threat Analysis for the Routing Protocol for Low-power and Lossy Networks (Rpls
-
-
Tsao, T.1
Alexander, R.2
Dohler, M.3
Daza, V.4
Lozano, A.5
Richardson, M.6
-
57
-
-
84906832119
-
Cloud-based design and manufacturing: A new paradigm in digital manufacturing and design innovation
-
Wu, D., Rosen, D. W., Wang, L., and Schaefer, D. (2015). Cloud-based design and manufacturing: A new paradigm in digital manufacturing and design innovation. Computer-Aided Design, 59:1-14.
-
(2015)
Computer-Aided Design
, vol.59
, pp. 1-14
-
-
Wu, D.1
Rosen, D.W.2
Wang, L.3
Schaefer, D.4
-
58
-
-
85029411498
-
-
[Online; Accessed March 2017]
-
WurldTech (GE) (2017). OPShield. https://www.wurldtech.com/products/opshield. [Online; Accessed March 2017].
-
(2017)
OPShield
-
-
-
59
-
-
84906834039
-
Internet of things in industries: A survey
-
Xu, L. D., He, W., and Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4):2233-2243.
-
(2014)
IEEE Transactions on Industrial Informatics
, vol.10
, Issue.4
, pp. 2233-2243
-
-
Xu, L.D.1
He, W.2
Li, S.3
-
60
-
-
84908454906
-
Sybil attacks and their defenses in the internet of things
-
Zhang, K., Liang, X., Lu, R., and Shen, X. (2014). Sybil attacks and their defenses in the internet of things. IEEE Internet of Things Journal, 1(5):372-383.
-
(2014)
IEEE Internet of Things Journal
, vol.1
, Issue.5
, pp. 372-383
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Shen, X.4
|