Methodology for Cyber Security Risk Mitigation in Next Generation SCADA Systems

[1]  Zhiliang Wang,et al.  False sequential logic attack on SCADA system and its physical impact analysis , 2016, Comput. Secur..

[2]  Jasna D. Markovic-Petrovic,et al.  A Fuzzy AHP Approach for Security Risk Assessment in SCADA Networks , 2019 .

[3]  Dilip Patel,et al.  Autonomic Computing Architecture for SCADA Cyber Security , 2017, Int. J. Cogn. Informatics Nat. Intell..

[4]  Bo Chen,et al.  Security and Reliability Perspectives in Cyber-Physical Smart Grids , 2018, 2018 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia).

[5]  Bo Fu,et al.  SCADA communication and security issues , 2014, Secur. Commun. Networks.

[6]  Adriano Valenzano,et al.  Performance Evaluation and Modeling of an Industrial Application-Layer Firewall , 2018, IEEE Transactions on Industrial Informatics.

[7]  David Hutchison,et al.  An Analysis of Cyber Security Attack Taxonomies , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[8]  Bandar Aldawsari,et al.  Security-Oriented Cloud Platform for SOA-Based SCADA , 2015, 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[9]  Jasna D. Markovic-Petrovic,et al.  Analysis of SCADA system vulnerabilities to DDoS attacks , 2013, 2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS).

[10]  Jasna D. Markovic-Petrovic,et al.  Scada systems in the cloud and fog environments: Migration scenarios and security issues , 2019, Facta universitatis - series: Electronics and Energetics.

[11]  Steve Hutchinson,et al.  Intrusion Detection in Industrial Control Systems , 2016 .

[12]  Stephen Hailes,et al.  Security of smart manufacturing systems , 2018 .

[13]  Helge Janicke,et al.  SCADA security in the light of Cyber-Warfare , 2012, Comput. Secur..

[14]  Harold Kirkham,et al.  Secure Data Transfer Guidance for Industrial Control and SCADA Systems , 2011 .

[15]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[16]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[17]  Keith J. Burnham,et al.  Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems , 2019, J. Sens. Actuator Networks.

[18]  Haider Abbas,et al.  Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges , 2016, IEEE Access.

[19]  Mirjana D. Stojanovic,et al.  An Improved Risk Assessment Method for SCADA Information Security , 2014 .