On building secure SCADA systems using security patterns
暂无分享,去创建一个
Jie Wu | Eduardo B. Fernández | María M. Larrondo-Petrie | Yifeng Shao | Jie Wu | E. Fernández | Maria Mercedes Larrondo-Petrie | Yifeng Shao
[1] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[2] Ann Miller. Trends in Process Control Systems Security , 2005, IEEE Secur. Priv..
[3] Eduardo B. Fernandez,et al. A pattern language for security models , 2001 .
[4] Stuart A. Boyer. Supervisory Control and Data Acquisition , 1993 .
[5] Eduardo B. Fernández,et al. Security Patterns for Physical Access Control Systems , 2007, DBSec.
[6] Ulf Lindqvist,et al. Using Model-based Intrusion Detection for SCADA Networks , 2006 .
[7] B. Cheng,et al. Security Patterns , 2003 .
[8] Jeffrey B. Roberts,et al. ELECTRONIC SECURITY OF REAL-TIME PROTECTION AND SCADA COMMUNICATIONS , 2003 .
[9] Joseph W. Yoder,et al. Architectural Patterns for Enabling Application Security , 1998 .
[10] Eduardo B. Fernandez,et al. A Methodology to Develop Secure Systems Using Patterns , 2006 .
[11] E. Byres,et al. The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .
[12] Shihong Huang,et al. Defining Security Requirements Through Misuse Actions , 2006, IFIP Workshop on Advanced Software Engineering.
[13] Peter Sommerlad,et al. Security Patterns: Integrating Security and Systems Engineering , 2006 .
[14] Eduardo B. Fernández,et al. A Pattern System for Access Control , 2004, DBSec.